£575 Per day
Inside
Hybrid
3x Per Week Manchester/Remote, UK
Summary: The L3 SOC Analyst role is a 6-month contract position within a large enterprise organization, focusing on high-severity security incidents in a mature Security Operations Centre. The position requires leading investigations, conducting threat hunting, and collaborating with engineering teams to enhance security operations. The role is hybrid, allowing for both on-site and remote work, and is classified as inside IR35.
Key Responsibilities:
- Lead investigations and response efforts for high-severity security incidents.
- Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite.
- Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel.
- Perform deep-dive analysis of malware, phishing, and lateral movement techniques.
- Collaborate with engineering teams to optimise Microsoft security tool integrations.
- Maintain and enhance incident response procedures and documentation.
Key Skills:
- Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role.
- Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation.
- Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365.
- Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs.
- Solid understanding of Windows, Linux, and core network security principles.
- Skilled in incident response, digital forensics, and proactive threat hunting.
- Experience working with SOAR platforms and building automated workflows.
Salary (Rate): £575 daily
City: Manchester
Country: UK
Working Arrangements: hybrid
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
L3 SOC Analyst - 6 months - Inside IR35 - Hybrid
We are working with a large enterprise organisation that is looking to engage an experienced Level 3 SOC Analyst on an initial 6-month rolling contract. This is a key role within a mature Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing security function.
Responsibilities:
- Lead investigations and response efforts for high-severity security incidents.
- Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite.
- Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel.
- Perform deep-dive analysis of malware, phishing, and lateral movement techniques.
- Collaborate with engineering teams to optimise Microsoft security tool integrations.
- Maintain and enhance incident response procedures and documentation.
What you will Ideally Bring:
- Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role.
- Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation.
- Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365.
- Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs.
- Solid understanding of Windows, Linux, and core network security principles.
- Skilled in incident response, digital forensics, and proactive threat hunting.
- Experience working with SOAR platforms and building automated workflows.
Contract Details:
- Duration: 6 Months
- Location: 3x Per Week Manchester/Remote
- Daily Rate: Up to £575 Per Day (Inside IR35)
L3 SOC Analyst - 6 months - Inside IR35 - Hybrid