Job Search and Career Advice Platform

Enable job alerts via email!

SOC ANALYST SECURITY OPERATIONS CENTRE (SOC)

Summer-Browning Associates

England

Hybrid

GBP 45,000 - 65,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading consultancy in the United Kingdom is seeking a SOC / Cyber Security Analyst for a 6-month assignment with possible extension. Ideal candidates will have active SC or DV clearance and a strong background in Cyber Security Operations within a high-threat government environment. Duties include incident response, forensic analysis, and event triage. Proficiency in SIEM tools like Sentinel and Splunk is essential. This role includes a hybrid work arrangement based in Milton Keynes.

Qualifications

  • Active SC or DV clearance required.
  • Proven background in Cyber Security Operation Centres.
  • Experience in a high-threat government environment.

Responsibilities

  • Perform triage of security events and determine their scope.
  • Make recommendations for efficient remediation.
  • Navigate secure environments in the public/defense sector.

Skills

SOC operations
incident response
forensic analysis
Security Information and Event Management (SIEM)
network security principles
firewalls and access control

Tools

Sentinel
Splunk
Defender
Qualys
Tenable
Huntsman
LogRhythm
Job description
SOC ANALYST CYBER SECURITY ANALYST

Summer-Browning Associates is supporting our client in the Central Government who is seeking a SOC / Cyber Security Analyst for an initial 6-month assignment, with the possibility of extension.

Location: Milton Keynes London Hybrid

The ideal candidates will hold active SC or DV clearance and have a proven background in Cyber Security Operation Centres working within a high-threat government environment:

  • Experience in SOC operations, incident response, and forensic analysis.
  • Proficiency in Security Information and Event Management (SIEM), including tools such as Sentinel, Splunk, Defender, Qualys, Tenable, Huntsman & LogRhyth
  • Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation.
  • Experience in network security principles, firewalls, and access control mechanisms
  • Knowledge of navigating secure environments in the public sector/defence sector effectively.

To apply, please submit your latest CV for review.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.