Job Search and Career Advice Platform

Enable job alerts via email!

Soc Analyst - Buckinghamshire - 610-650 Pd

SmartSourcing Ltd

Milton Keynes

On-site

GBP 80,000 - 100,000

Full time

3 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm is seeking a Senior SOC Analyst to work onsite in Milton Keynes. The role requires active DV security clearance and involves continuous monitoring of security tools to detect potential threats. Candidates should have a background in computer science or Cyber Security and experience with SPLUNK and incident response. This position demands flexibility to work within a 24/7 shift rota, including weekends and bank holidays. Commitment to diversity and inclusion is key for applicants.

Benefits

Disability Confident Employer
Promotion of diversity and inclusion

Qualifications

  • Must have active DV clearance or be eligible for DV vetting.
  • Experience with cybersecurity tools and incident response.
  • Ability to work in a 24/7 shift pattern, including weekends.

Responsibilities

  • Monitor security tools to detect suspicious activity.
  • Analyse alerts and logs for genuine security incidents.
  • Perform initial containment actions for confirmed incidents.
  • Create detailed tickets and reports for detected incidents.
  • Assist in maintaining and optimising security tools.

Skills

Experience of SPLUNK in a Security Operations Centre (SOC)
Foundational understanding of networking concepts
Knowledge of operating systems (Windows, Linux)
Certifications such as CompTIA Security+ or Cybersecurity Analyst (CySA+)

Education

Bachelor's degree in computer science or Cyber Security
Job description
Senior SOC Analyst

Lead SOC Analysts with active Senior or (ideally) DV clearance. Fully onsite working on a 24/7 shift rota.

Must be eligible for DV vetting – Single British Nationality required by our government services client in Milton Keynes or Glasgow.

Rate #removed# per day inside IR35 – Umbrella Company.

Working in a DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake.

The role requires working as part of a 24/7 shift pattern, which will include weekends and bank holidays.

Skills and Experience Required
  • Experience of SPLUNK in a Security Operations Centre (SOC).
  • A bachelor's degree in computer science, Cyber Security or relevant experience.
  • Foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber‑attack techniques.
  • Certifications such as CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus.
Key Responsibilities
  • Continuous Monitoring: Monitor security tools, including SIEM systems, to detect suspicious activity. Be the first to see potential threats and respond efficiently and professionally according to defined processes.
  • Incident Triage: Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. Follow established procedures to classify and prioritize incidents.
  • Initial Incident Response: For confirmed incidents, perform initial containment actions such as isolating affected systems and escalating to a Level 2 or 3 analyst for deeper investigation.
  • Reporting and Documentation: Create detailed tickets and reports for all detected incidents, documenting findings and steps taken.
  • Tool Management: Assist in the maintenance and optimisation of security tools, ensuring they work correctly and effectively.

Please apply online in the first instance.

SmartSourcing is a Disability Confident Employer and we promote, celebrate and value diversity. We are committed to promoting equality and inclusion for all.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.