Enable job alerts via email!

Senior SOC Analyst

JR United Kingdom

Basingstoke

On-site

GBP 40,000 - 70,000

Full time

8 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

Join a leading managed service provider as a Senior SOC Analyst, responsible for monitoring, investigating, and securing client systems using state-of-the-art tools. This role is ideal for experienced SOC Analysts looking to advance their careers and will involve significant responsibilities in incident response and security posture improvement strategies.

Qualifications

  • Experience handling critical incidents using SIEMs.
  • Knowledge of best practice configurations for EDR/XDR.
  • Understanding of MITRE ATT&CK framework.

Responsibilities

  • Drive the development of security monitoring tools.
  • Monitor security alerts using various tools.
  • Produce reports on security posture.

Skills

Knowledge of SIEMs
Knowledge of EDR/XDR
Incident response knowledge
Knowledge of VM
Knowledge of CTI

Tools

Rapid 7
Tenable
Vulcan
Open CTI
MISP
The Hive
Recorded Future

Job description

Social network you want to login/join with:

An established and expanding MSP are looking for an MSP to join the team. As a Senior SOC Analyst, you will be at the forefront of monitoring, investigating, and securing our customers' estates through state-of-the-art tooling. This role would suit an experienced SOC Analyst looking to take the next step in their career or a current Senior Security Analyst looking for their next challenge!

Working closely with our analysts and SOC Operations Management, you will have day-to-day responsibility for responding to incidents, ensuring either their swift resolution or escalation if required and helping to maintain and improve best practice and operational efficiency in everything we do.

Key Responsibilities:

  • Drive the development and tuning of security monitoring and detection toolsets, post creation, champion and lead testing and implementation strategies alongside our SOC engineering function to ensure high fidelity rulesets are continually implemented across our customers estates.
  • Monitor security alerts and incidents using a wide range of security tools and technologies.
  • Produce regular reports and updates on customers security posture.
  • Conduct identification, analysis, and qualification of security alerts, escalating internally to Tier 3 and externally to customers where required.
  • Participate in SOC improvement projects (tooling, process, increase in SOC coverage).
  • Participate in delivering investigation reports, including continual improvement steps to both internal and external stakeholders.

Required technical skills:

  • Excellent Knowledge of SIEMs – Focused on day-to-day utilisation with experience in handling critical and high severity incidents from initial detection to resolution, including the general navigation/engineering and creation of rulesets & dashboards aligned to the MITRE ATT&CK framework.
  • Excellent Knowledge of EDR/XDR – including incident investigation at a priority 1 and 2 severity and general day-to-day usage alongside best-practice configurations for common toolsets.
  • Good Knowledge of incident response, aligned to MITRE ATT&CK with a good knowledge of common tactics, tools and techniques attackers utilise in the wild.
  • Good Knowledge of VM – including analysis, classification and prioritisation to create tangible and actionable insights.
  • Preferred Solutions: Rapid 7, Tenable, Vulcan.
  • Good Knowledge of CTI – Including its utilisation within a SOC environment.
  • Preferred Solutions: Open CTI, MISP, The Thive, Recorded Future.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.