Job Search and Career Advice Platform

Enable job alerts via email!

SOC Engineer (SC Cleared)

Stealth iT Consulting

Remote

GBP 60,000 - 80,000

Part time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology consulting firm is looking for a SOC Engineer (SC Cleared) to provide security monitoring and incident response while working remotely. The role requires strong skills in network protocols, security frameworks, and various security tools. The ideal candidate will have experience in monitoring alerts, investigating incidents, and performing threat hunting. This position offers a competitive rate of £400 per day and is an excellent opportunity for professionals in the cybersecurity field.

Qualifications

  • Experience monitoring security alerts and events from SIEM systems.
  • Ability to analyse logs and network traffic to identify anomalies.
  • Experience in investigating and triaging security incidents.

Responsibilities

  • Respond to security incidents in real-time, following established playbooks.
  • Conduct root cause analysis and document findings.
  • Perform proactive threat hunting to detect hidden threats.

Skills

TCP/IP, DNS, HTTP/S
Operating systems (Windows, Linux)
Security frameworks (MITRE ATT&CK, NIST, ISO 27001)
SIEM tools (Splunk, QRadar, Sentinel)
EDR solutions (CrowdStrike, Carbon Black)
Firewalls, proxies, IDS/IPS systems
Scripting skills (Python, PowerShell, Bash)

Education

Relevant certifications (CompTIA Security+, CEH, GCIA, GCIH, CISSP)
Job description

SOC Engineer (SC Cleared) - £400 Per Day - Remote

Strong understanding of:

  • TCP/IP, DNS, HTTP/S, and other network protocols.
  • Operating systems (Windows, Linux).
  • Security frameworks (MITRE ATT&CK, NIST, ISO 27001).
  • SIEM tools (eg, Splunk, QRadar, Sentinel).
  • EDR solutions (eg, CrowdStrike, Carbon Black).
  • Firewalls, proxies, and IDS/IPS systems.
  • Scripting skills (Python, PowerShell, Bash) are a plus.
  • Relevant certifications (eg, CompTIA Security+, CEH, GCIA, GCIH, CISSP) are desirable.

Potential previous experience:

  • Monitor security alerts and events from SIEM (Security Information and Event Management) systems.
  • Analyse logs and network traffic to identify anomalies and potential threats.
  • Investigate and triage security incidents, escalating as necessary.
  • Respond to security incidents in real-time, following established playbooks.
  • Conduct root cause analysis and document findings.
  • Support containment, eradication, and recovery efforts.
  • Leverage threat intelligence feeds to identify emerging threats.
  • Perform proactive threat hunting to detect hidden threats in the environment.
  • Maintain and tune SOC tools such as SIEM, EDR (Endpoint Detection and Response), IDS/IPS, and SOAR platforms.
  • Develop scripts and automation to improve detection and response efficiency.
  • Create incident reports, dashboards, and metrics for stakeholders.
  • Maintain accurate documentation of incidents, investigations, and response actions.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.