Enable job alerts via email!
A technology recruitment firm in the UK is seeking an experienced Incident Response (CSIRT) / SOC Level 3 Analyst to manage high-severity cybersecurity incidents. Candidates should have notable experience in advanced threat hunting and incident response, along with strong mentoring abilities for junior analysts. The role includes significant responsibilities in ensuring cyber resilience for IT and OT environments.
Incident Response (CSIRT) / Security Operations Centre (SOC) Level 3 Analyst
2-3 Days onsite - Crawley
6-9 Month duration
Reporting line: The Analyst will report to the Cyber Security Response Manager and work within the Information Systems directorate, based in the Crawley office.
The role of an Incident Response (CSIRT) / SOC Level 3 Analyst is to respond to high-severity cybersecurity incidents and escalated events or alerts, using experience and industry tools to expedite containment, eradication, and recovery strategies that minimise business impact and protect network systems and customer data from cyber threats.
The Information Systems Department provides and optimises technology solutions to improve organisational operations. This role underpins that mission by strengthening cyber security operations. The main measure of success is upholding IT, OT, and organisational resilience against cyber threats and incidents.
Considerable experience in a SOC Level 2 or 3 role with expertise in advanced threat hunting and incident response across IT and OT environments.
SOC-specific training, qualifications, or a degree in Computer Science, Cybersecurity, IT, or a related subject.
Ideally hold recognised security qualifications such as CISSP, AZ-500, GIAC/GCIA/GCIH, CASP+, CEH, or SIEM certifications.
Strong knowledge of log correlation, analysis, forensics, and chain of custody requirements.
Familiarity with regulatory frameworks (NCSC CAF, ISO/IEC 27001/27002, GDPR, CIS, NIST).
Practical knowledge of SIEM, SOAR, EDR, AV, IDS/IPS, NAC, AD, DLP, web/email filtering, behavioural analytics, TCP/IP and OT protocols, and security applications.
Understanding of adversarial TTPs and frameworks such as MITRE ATT&CK.
Experience with SIEM and SOAR solutions, IAM, and DLP tools (e.g. FortiSIEM, Q-Radar, Microsoft Secure Gateway, Darktrace, Microsoft Defender, Sentinel).
Experience developing incident response playbooks, SOAR workflows, red-team exercises, and tabletop simulations.
Experience in investigating advanced intrusions, such as targeted ransomware or state-sponsored attacks.
Summary: My client are looking for an experienced Incident Response (CSIRT) / SOC Level 3 Analyst with deep expertise in advanced threat hunting, incident response, and cyber defence operations, capable of leading on high-severity incidents and mentoring junior analysts while strengthening resilience across IT and OT environments.