Enable job alerts via email!

SOC Tier 3 Analyst

LA International

United Kingdom

Remote

GBP 80,000 - 100,000

Full time

9 days ago

Job summary

A leading ICT Recruitment Consultancy in the UK is seeking a SOC Tier 3 Analyst for a hybrid role. You will investigate advanced cyber threats and manage incidents using tools like Splunk and CrowdStrike. The ideal candidate has strong expertise in incident response and cybersecurity principles. This position offers competitive market rates and the opportunity to work with a top-tier organization.

Qualifications

  • Proficient in incident response tools and techniques.
  • Expertise in analyzing and responding to threats on different platforms.
  • Strong experience in handling complex cyber incidents.

Responsibilities

  • Utilize advanced SIEM tools to analyze and correlate security alerts.
  • Proactively search for threats using behavioural analysis.
  • Perform in-depth forensic analysis to determine scope of security incidents.
  • Collaborate with teams to identify indicators of compromise.
  • Ensure response activities align with industry standards and regulations.

Skills

Incident response tools
Network and system forensics
Malware analysis
Memory analysis
Scripting languages (Python, PowerShell)

Tools

Splunk
ArcSight
LogRhythm
Job description
Overview

SOC Tier 3 Analyst — 6 Month contract initially. Based: Remote/Reading - Hybrid. Max 3 days p/w onsite. Rate: Market rates p/d (via Umbrella company).

We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We a great opportunity for a SOC Tier 3 Analyst to strengthen the Security Operations Center. As a Tier 3 CERT Analyst you will lead the investigation and remediation of advanced cyber threats, leveraging cutting-edge tools such as Splunk, Microsoft Sentinel, CrowdStrike, Defender and other security stacks. You will handle complex incidents like APTs, malware, and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients.

Responsibilities
  • Incident Detection and Response: Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts.
  • Threat Hunting & Analysis: Proactively search for threats across the environment using behavioural analysis and threat intelligence data. Analyze data from logs, network traffic, endpoint activities, and threat intelligence feeds to detect unusual or malicious activity.
  • Incident Forensics: Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements.
  • Remediation and Recovery: Collaborate with threat intelligence teams to identify indicators of compromise (IOCs) and ensure proper actions are taken to block further attacks.
  • Compliance and Risk Management: Ensure all incident response activities align with industry standards, regulations, and best practices (e.g., NIST, ISO 27001, GDPR, HIPAA). Work with legal and compliance teams to manage incidents within the scope of data privacy laws and regulations.
Key Skills & Experience
  • Proficient in incident response tools and techniques, including network and system forensics, malware analysis, and memory analysis.
  • Expertise in analyzing and responding to threats on different platforms (Windows, Linux, cloud environments, etc.).
  • Familiarity with scripting languages (Python, PowerShell, etc.) to automate tasks or create custom detection methods.
  • Strong experience in handling complex cyber incidents (e.g., APTs, ransomware, data breaches).
  • Hands-on experience with SIEM platforms (e.g., Splunk, ArcSight, LogRhythm) and endpoint detection/response (EDR) tools.
Certifications (Preferred)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Incident Handler (GCIH, EC-Council)
  • Certified Forensic Computer Examiner (CFCE)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Intrusion Analyst (GCIA)
About LA International

LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies. LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds.

Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured The Queens Award for Enterprise: International Trade, for the second consecutive period.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.