Job Search and Career Advice Platform

Enable job alerts via email!

Senior SOC Analyst

Trades Workforce Solutions

Milton Keynes

On-site

GBP 100,000 - 125,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity company is seeking a Senior SOC Analyst with DV clearance to join their government client's security team. The role involves monitoring systems for potential security incidents, analyzing alerts, and initiating response procedures. Essential skills include experience with SPLUNK, problem-solving abilities, and knowledge of networking concepts. Successful candidates will demonstrate a methodical approach to incident management within a dynamic 24/7 team environment. Competitive daily rate of £600 offered for this 12-month contract.

Qualifications

  • Experience working in a security operations centre (SOC) with a clear focus on security clearance requirements.
  • Capability to follow strict procedures for detecting and responding to security incidents.

Responsibilities

  • Monitor security tools to detect suspicious activity.
  • Analyse alerts and logs to classify security incidents.
  • Perform initial containment for confirmed incidents.
  • Create detailed tickets and reports for tracking incidents.

Skills

Current security clearance to DV Level
Experience of SPLUNK within a security operations centre (SOC)
Excellent problem-solving abilities
Attention to detail
Good understanding of networking concepts
Windows and Linux operating systems
Common cyber attack techniques
Cyber security certifications
Job description
Senior SOC Analyst (DV Cleared)

Duration: 12 Months

Location: London

Rate: £600 per day

IR35 Status: Inside

Start: ASAP

A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats.

You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process.

Essential skills & experience required:
  • Current security clearance to DV Level
  • Experience of SPLUNK within a security operations centre (SOC)
  • Excellent problem‑solving abilities, attention to detail and capacity to work under pressure
  • Comfortable working within a team environment
  • Good understanding of networking concepts (TCP/IP, DNS etc.)
  • Windows and Linux operating systems
  • Common cyber attack techniques
  • Any Cyber security certifications would be desirable
Responsibilities include:

You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity.

Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents.

For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalade the incident to a Level 2 or 3 analyst for deeper investigation.

Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis.

Also assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively.

To apply for this role please email your CV to: joanne.stanley@certes.co.uk

Certes IT Service Solutions welcome applications from all sections of the community and from people with diverse experience and backgrounds.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.