L2 SOC Analyst - 6 months - Inside IR35 - Hybrid

L2 SOC Analyst - 6 months - Inside IR35 - Hybrid

Posted 5 days ago by Hamilton Barnes

£450 Per day
Inside
Hybrid
3x Per Week Reading/Remote, UK

Summary: We are seeking an experienced Level 2 SOC Analyst for a 6-month contract within a global enterprise's Security Operations Centre. The role involves defending against advanced cyber threats and requires collaboration with various teams while utilizing tools like Splunk and CrowdStrike. The position is hybrid, requiring three days a week onsite in Reading. The contract is classified as inside IR35.

Key Responsibilities:

  • Lead investigation and remediation of escalated Tier 2 security incidents including APTs, malware, and data breaches.
  • Conduct advanced threat hunting using behavioral analysis and threat intelligence platforms.
  • Utilize SIEM tools (eg, Splunk, Sentinel) and EDR/XDR platforms (eg, CrowdStrike, Defender) to correlate, triage, and analyze alerts.
  • Perform forensic analysis to assess scope, impact, and root cause of incidents.
  • Develop and refine detection logic, hunting queries, and incident response playbooks.
  • Provide incident containment, eradication, and recovery guidance to internal teams.

Key Skills:

  • Proven track record responding to high-severity security incidents in enterprise environments.
  • Hands-on expertise with Splunk, Microsoft Sentinel, CrowdStrike, and Defender suite.
  • Strong analytical and investigative skills, with experience in malware and memory analysis.
  • Familiarity with MITRE ATT&CK framework and threat intelligence methodologies.

Salary (Rate): £450 daily

City: Reading

Country: UK

Working Arrangements: hybrid

IR35 Status: inside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

L2 SOC Analyst - 6 months - Inside IR35 - Hybrid

We are working with a global enterprise seeking an experienced Level 2 SOC Analyst to join their mature Security Operations Centre on an initial 6-month contract. You'll play a key role in defending a large-scale environment against advanced cyber threats using tools like Splunk, Sentinel, Defender, and CrowdStrike, while collaborating with L1/L3 analysts and cross-functional teams.

Responsibilities:

  • Lead investigation and remediation of escalated Tier 2 security incidents including APTs, malware, and data breaches.
  • Conduct advanced threat hunting using behavioral analysis and threat intelligence platforms.
  • Utilize SIEM tools (eg, Splunk, Sentinel) and EDR/XDR platforms (eg, CrowdStrike, Defender) to correlate, triage, and analyze alerts.
  • Perform forensic analysis to assess scope, impact, and root cause of incidents.
  • Develop and refine detection logic, hunting queries, and incident response playbooks.
  • Provide incident containment, eradication, and recovery guidance to internal teams.

Requirements:

  • Proven track record responding to high-severity security incidents in enterprise environments.
  • Hands-on expertise with Splunk, Microsoft Sentinel, CrowdStrike, and Defender suite.
  • Strong analytical and investigative skills, with experience in malware and memory analysis.
  • Familiarity with MITRE ATT&CK framework and threat intelligence methodologies.

Contract Details:

  • Duration: 6 months (initial, with extension likely)
  • Location: Hybrid - 3 days/week onsite in Reading
  • Rate: Up to £450 per day (Inside IR35)

L2 SOC Analyst - 6 months - Inside IR35 - Hybrid