Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst -SPLUNK-SIEM-SC/DV Cleared- Glasgow - 12Mths -Up To £610

SmartSourcing Ltd

Glasgow

On-site

GBP 100,000 - 125,000

Full time

3 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A government services provider in Scotland is seeking a Cyber Security Lead SOC Analyst with DV Security Clearance. This role involves monitoring security tools, responding to incidents, and reporting findings. The ideal candidate should have experience with SPLUNK and a bachelor's degree in computer science or Cyber Security. The position requires working in a 24/7 shift pattern including weekends and bank holidays, with a pay rate of £610 per day inside IR35.

Qualifications

  • Must hold a current DV or SC Security Clearance, or be eligible to undertake.
  • Experience in monitoring security tools is essential.
  • Strong analytical skills for incident triage required.

Responsibilities

  • Monitor security tools to detect suspicious activity.
  • Analyse alerts and logs to classify security incidents.
  • Perform initial containment actions for confirmed incidents.
  • Create detailed tickets and reports for incidents.
  • Assist in maintenance and optimization of security tools.

Skills

Experience of SPLUNK in a Security Operations Centre (SOC)
Foundational understanding of networking concepts (TCP/IP, DNS)
Understanding of operating systems (Windows, Linux)
Certifications like CompTIA Security+ or Cybersecurity Analyst (CySA+)

Education

Bachelor's degree in computer science or Cyber Security
Job description

Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared, required by our government services client in their East Kilbride, Glasgow base.

Paying £610 per day inside IR35 - Umbrella Company

Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake.

The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays. To start in the New Year

Skills and Experience Required:
  • Experience of SPLUNK with in a Security Operations Centre (SOC).
  • A bachelor's degree in computer science, Cyber Security or relevant experience.
  • You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques.
  • Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role.
Key Responsibilities
  • Continuous Monitoring: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes.
  • Incident Triage: You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents.
  • Initial Incident Response: For confirmed incidents, you will perform initial containment actions, such as isolating affected systems, and elevate the incident to a Level 2 or 3 analyst for deeper investigation.
  • Reporting and Documentation: You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis.
  • Tool Management: You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively.

Please apply online in the first instance.

SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.