Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst -SPLUNK-SIEM-SC/DV Cleared- Glasgow - 12mths -up to -610

SmartSourcing Ltd

United Kingdom

On-site

GBP 80,000 - 100,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A government services client is seeking a Cyber Security Lead SOC Analyst in East Kilbride, Glasgow. The role requires DV security clearance or eligibility, experience with Splunk, and a solid understanding of networking and operating systems. Responsibilities include monitoring security tools, incident analysis, and initial response actions. This position offers GBP610 per day, and applicants should apply online in the first instance. The company values diversity and inclusion.

Qualifications

  • Experience with Splunk in a Security Operations Centre (SOC).
  • A bachelor's degree in computer science or equivalent experience.
  • Understanding of networking concepts and operating systems.

Responsibilities

  • Monitor security tools for suspicious activity.
  • Analyze alerts and logs for incidents.
  • Perform initial containment actions for confirmed incidents.
  • Create tickets and reports for documented incidents.
  • Assist in the maintenance of security tools.

Skills

Experience of SPLUNK in a Security Operations Centre (SOC)
Foundational understanding of networking concepts (TCP/IP, DNS)
Operating systems (Windows, Linux)
Certifications like CompTIA Security+, CySA+

Education

Bachelor's degree in computer science or Cyber Security
Job description
Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared

Required by our government services client in their East Kilbride, Glasgow base.

Paying GBP610 per day inside IR35 – Umbrella Company

Working in a DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake.

The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays.

To start in the New Year

Skills and Experience Required
  • Experience of SPLUNK in a Security Operations Centre (SOC)
  • A bachelor's degree in computer science, Cyber Security or relevant experience
  • Foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber–attack techniques
  • Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification (significant bonus)
Key Responsibilities
  • Continuous Monitoring: monitor security tools, including SIEM systems, to detect suspicious activity; respond efficiently according to defined processes.
  • Incident Triage: analyze alerts and logs to determine genuine incidents or false positives; classify and prioritize following established procedures.
  • Initial Incident Response: for confirmed incidents, perform initial containment actions (e.g., isolate affected systems) and echo to Level 2 or 3 analyst.
  • Reporting and Documentation: create detailed tickets and reports for all detected incidents, documenting findings and steps taken.
  • Tool Management: assist in maintenance and optimization of security tools, ensuring they are working correctly and effectively.

Please apply online in the first instance.

SmartSourcing is a Disability Confident Employer and we promote, celebrate and value diversity. We are committed to promoting equality and inclusion for all.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.