Enable job alerts via email!

SOC Analyst

Sopra Steria - UK

Hemel Hempstead

On-site

GBP 40,000 - 70,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking SOC Analysts to join their dynamic Security team in a rapidly growing sector. This role offers the chance to work with enterprise-scale clients, providing exciting challenges and opportunities for career progression. You will be involved in monitoring and investigating security incidents, analyzing network traffic, and providing incident response support. The company values innovation and offers flexible benefits to meet your needs, along with training and development opportunities. If you're ready to take your career to the next level in a supportive environment, this position is perfect for you.

Benefits

Career progression opportunities
Flexible benefits
Training and development opportunities
Referral bonus of £1500.00

Qualifications

  • Proven experience in a Security Operations Centre with a tech-first approach.
  • Knowledge of Microsoft Sentinel and Splunk implementations.

Responsibilities

  • Monitor and investigate security incidents on client infrastructure.
  • Analyze logs and system events to identify security threats.

Skills

Security Operations Centre experience
Microsoft Sentinel
Splunk
Mitre Att&ck Framework
Incident Response
Network traffic analysis
TCP/IP networking principles

Tools

MISP Threat sharing
SIEM technologies
QRadar

Job description

Are you in a Security Operations Centre and want more excitement, more of a challenge? Then just look at this!

We are searching for SOC Analysts to join our growing Security team in Sopra Steria's Aerospace Defence and Security sector. This incredible new journey will see you working with a growing team supporting enterprise scale clients. This role will require you to have proven experience working in a busy SOC with a tech-first approach.

The team that you will be joining is on the cusp of continued growth, so we are looking for hardworking individuals who can lead from the front. From a technical perspective, we are using Microsoft Sentinel, Splunk, and MISP Threat sharing, so any knowledge of these technologies would be a substantial benefit.

This role is based out of our head office in Hemel Hempstead and will work on a shift pattern with 12-hour shifts (Nights and Days).

You do need to be eligible for SC and DV Clearance.

We can offer great career progression opportunities, benefits which you can flex to meet your needs, and training and development opportunities.

What you'll be doing:

  • Monitor, triage, and investigate security incidents on critical client infrastructure.
  • In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities.
  • Provide Incident Response support.
  • Maintain, improve and develop team knowledge of SOC tools, security operations, and triage.
  • Prepare reports for managed clients for both technical and non-technical audiences and continuously improve their content and presentation.
  • Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies.

What you’ll bring:

  • Demonstrable experience in a Security Operations Centre.
  • Demonstrable experience of managing Microsoft Sentinel or Splunk implementations.
  • Knowledge and experience with the Mitre Att&ck Framework.
  • Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products.
  • Deep technical knowledge in the analysis of log data and intrusion detection systems.
  • Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, and LDAP.

It would be great if you had:

  • Understanding of static malware analysis and reverse engineering.
  • CREST Practitioner Intrusion Analyst.
  • Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar.

If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do apply; we’d love to hear from you!

Referral Bonus: £1500.00

Clearance: Eligible for SC and DV Clearance

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Level 3 SOC Analyst

Telefónica Tech (EN)

Greater London

Remote

GBP 40,000 - 50,000

9 days ago

SOC Analyst

Tiger Resourcing Group

Remote

GBP 30,000 - 50,000

Yesterday
Be an early applicant

Level 3 SOC Analyst

Telefónica Tech

Greater London

Remote

GBP 45,000 - 75,000

20 days ago

SOC Analyst

JR United Kingdom

Hemel Hempstead

On-site

GBP 35,000 - 55,000

Today
Be an early applicant

Senior SOC Analyst

Alight Solutions

London

Remote

GBP 60,000 - 100,000

3 days ago
Be an early applicant

SOC Analyst

NCC Group

London

Remote

GBP 35,000 - 65,000

30+ days ago

SOC Analyst

context recruitment

London

Remote

GBP 40,000 - 50,000

30+ days ago

Level 2/3 SOC Analyst - SC Cleared - Inside IR35

JR United Kingdom

London

On-site

GBP 50,000 - 70,000

Today
Be an early applicant

SOC Analyst – OT Security

Wipro

Greater London

On-site

GBP 50,000 - 90,000

4 days ago
Be an early applicant