Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst

Gazelle Global Consulting

England

Hybrid

GBP 80,000 - 100,000

Part time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A prominent consultancy in the telecommunications sector is looking for a SOC Analyst L2 to support their Security Operations Centre in Reading. This hands-on role involves investigating and remediating security incidents across enterprise-scale infrastructure. The ideal candidate should have experience in cybersecurity incident response, particularly in analyzing threats and producing reports. This contract position offers a flexible working pattern of four days onsite and one day remote.

Qualifications

  • Proven experience as a Security Operations Centre Analyst.
  • Strong understanding of cybersecurity incident response.
  • Ability to produce clear technical incident reports.

Responsibilities

  • Investigate and remediate Tier 2 security incidents.
  • Drive escalated incidents through to resolution.
  • Conduct forensic analysis to determine root cause.

Skills

Investigation of security incidents
Experience with SIEM tools
Forensic analysis skills
Incident response knowledge

Tools

Splunk
Microsoft Defender
Job description

Role: SOC Analyst L2

Location: Reading

Contract: Contract

Working Pattern: 4 days onsite, 1 day remote

Client: Major consultancy delivering for a leading telecommunications provider

Overview

We are seeking an experienced SOC L2 Analyst to strengthen a high-performing Security Operations Centre supporting a large-scale telecoms environment. This is a hands-on Tier 2 CERT role focused on investigation, response, and remediation of security incidents across enterprise-scale infrastructure.

If you enjoy solving real incidents rather than just closing tickets, this role will suit you.

Key Responsibilities
  1. Investigate and remediate Tier 2 security incidents including malware, ransomware, data breaches, and APT activity
  2. Take ownership of escalations from SOC L1 and drive incidents through to resolution
  3. Perform detailed analysis using SIEM and EDR tools such as Splunk and Microsoft Defender
  4. Conduct forensic analysis to determine root cause, scope, and impact
  5. Support containment, eradication, and recovery activities with IT and engineering teams
  6. Produce clear incident reports with technical findings and remediation actions
  7. Quality assurance of SOC L1 triage and alert handling
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.