Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst - DV

LA International

East Kilbride

On-site

GBP 80,000 - 100,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm is seeking Lead and Senior SOC Analysts to join their team in East Kilbride. You will be responsible for monitoring systems and responding to potential security incidents. Successful candidates will have problem-solving skills, experience with SPLUNK, and a background in cybersecurity or IT. This role requires a high level of Security Clearance and will involve working in a 24/7 team environment. Applications from diverse backgrounds are encouraged.

Qualifications

  • Excellent problem-solving abilities and strong attention to detail.
  • Capacity to work under pressure.
  • Strong communication skills in a team environment.

Responsibilities

  • Monitor security tools, including SIEM systems for suspicious activity.
  • Analyze alerts to determine genuine security incidents.
  • Perform initial containment actions for confirmed incidents.
  • Create detailed tickets and reports for detected incidents.
  • Assist in the maintenance of security tools.

Skills

Problem-solving
Attention to detail
Communication skills
Experience with SPLUNK

Education

Bachelor's degree in computer science, Cyber Security, IT or related field
Job description

We have a number of Lead and Senior SOC Analyst roles requiring a high level of Security Clearance. The roles will be based fully onsite in East Kilbride covering a 24/7 shift rota. You will be part of a 24/7 team responsible for monitoring our systems, detecting potential security incidents, and initiating the incident response process.

Key Responsibilities
  • Continuous Monitoring: Monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity and respond efficiently following defined processes.
  • Incident Triage: Analyse alerts and logs to determine if an event is a genuine security incident or a false positive, and classify and prioritise incidents following established procedures.
  • Initial Incident Response: For confirmed incidents, perform initial containment actions such as isolating affected systems and escalating the incident to a Level 2 or 3 analyst for deeper investigation.
  • Reporting and Documentation: Create detailed tickets and reports for all detected incidents, documenting findings and the actions taken.
  • Tool Management: Assist in the maintenance and optimisation of security tools to ensure they operate correctly and effectively.
Essential Skills & Experience
  • Excellent problem-solving abilities, strong attention to detail, and capacity to work under pressure.
  • Strong communication skills, both written and verbal, and ability to work in a team environment.
  • Experience with SPLUNK within a Security Operations Centre (SOC).
Education
  • A bachelor's degree in computer science, Cyber Security, Information Technology, or a related field is preferred. Relevant experience may be substituted for a degree.
Knowledge
  • Foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques.
Certifications
  • CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus (not required).

Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Successful applicants will be required to be security cleared prior to appointment, which can take up to a minimum of 18 weeks.

LA International welcomes applications from all sections of the community and from people with diverse experience and backgrounds.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.