Enable job alerts via email!

SOC Analyst - L2

Stott and May

City Of London

Hybrid

GBP 80,000 - 100,000

Full time

Today
Be an early applicant

Job summary

A leading cybersecurity firm is seeking an experienced SOC Analyst - L2 to join their team. The role focuses on detecting and responding to advanced cyber threats, requiring 6–8 years of experience in cybersecurity, particularly in SOC and threat hunting. The ideal candidate will have hands-on experience with SIEM and EDR tools. This position offers a hybrid work model, with a competitive rate of up to £460 per day.

Qualifications

  • 6–8+ years of cybersecurity experience, particularly in SOC, IR, threat hunting, or forensics.
  • Hands-on experience with SIEM and EDR platforms.
  • Strong knowledge of Windows, Linux, and cloud environments.

Responsibilities

  • Investigate and lead response efforts for complex cyber threats.
  • Handle escalations from Tier 1 analysts and provide guidance.
  • Proactively hunt threats using behavioral analysis.

Skills

Incident response
Threat hunting
Security operations
Forensic analysis
Scripting (Python, PowerShell)
Communication skills

Education

Relevant certifications (e.g., CISSP, GCIH)

Tools

Splunk
Microsoft Sentinel
CrowdStrike
Defender
Job description

SOC Analyst - L2

Start: ASAP
Location: Hybrid, 3 days per week in Reading
Rate: Inside IR35, paying up to £460 /day

We are seeking an experienced SOC L2 Analyst to join a high-performing Security Operations Center (SOC) team, focused on detecting, investigating, and responding to advanced cyber threats. This role is ideal for professionals with strong technical knowledge in incident response, threat hunting, and security operations, using tools such as Splunk, Microsoft Sentinel, Defender, and CrowdStrike.

Key Responsibilities
  • Investigate and lead response efforts for complex cyber threats, including APTs, malware, and data breaches
  • Handle escalations from Tier 1 analysts and provide technical guidance
  • Proactively hunt threats using behavioral analysis and threat intelligence
  • Perform in-depth forensic analysis of logs, networks, endpoints, and malware
  • Create detailed incident reports with technical analysis and remediation guidance
  • Collaborate with internal teams (IT, DevOps, Network Security) to enhance security posture
  • Maintain compliance with standards such as NIST, ISO 27001, and GDPR
  • Contribute to development of detection playbooks and response procedures
  • Participate in post-incident reviews and continuous improvement initiatives
  • Stay updated on the latest threats, vulnerabilities, and security tools
Your Profile
  • 6–8+ years of cybersecurity experience, particularly in SOC, IR, threat hunting, or forensics
  • Hands-on experience with SIEM tools (e.g., Splunk, Sentinel) and EDR platforms (e.g., CrowdStrike, Defender)
  • Strong knowledge of Windows, Linux, and cloud environments
  • Experience in malware analysis, memory forensics, and incident containment
  • Proficiency in scripting languages (Python, PowerShell) preferred
  • Relevant certifications are a strong plus: CISSP, GCIH, GCFA, GCIA, CFCE
  • Excellent communication and reporting skills for technical and non-technical stakeholders
  • Ability to work under pressure, including after-hours and on-call support as needed
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.