L3 SOC Analyst - 6 months - Inside IR35 - Hybrid

L3 SOC Analyst - 6 months - Inside IR35 - Hybrid

Posted 1 week ago by Hamilton Barnes

£575 Per day
Inside
Hybrid
3x Per Week Manchester/Remote, UK

Summary: The L3 SOC Analyst role is a 6-month contract position within a large enterprise organization, focusing on high-severity security incidents in a mature Security Operations Centre. The position requires leading investigations, conducting threat hunting, and collaborating with engineering teams to enhance security operations. The role is hybrid, allowing for both on-site and remote work, and is classified as inside IR35.

Key Responsibilities:

  • Lead investigations and response efforts for high-severity security incidents.
  • Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite.
  • Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel.
  • Perform deep-dive analysis of malware, phishing, and lateral movement techniques.
  • Collaborate with engineering teams to optimise Microsoft security tool integrations.
  • Maintain and enhance incident response procedures and documentation.

Key Skills:

  • Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role.
  • Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation.
  • Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365.
  • Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs.
  • Solid understanding of Windows, Linux, and core network security principles.
  • Skilled in incident response, digital forensics, and proactive threat hunting.
  • Experience working with SOAR platforms and building automated workflows.

Salary (Rate): £575 daily

City: Manchester

Country: UK

Working Arrangements: hybrid

IR35 Status: inside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

L3 SOC Analyst - 6 months - Inside IR35 - Hybrid

We are working with a large enterprise organisation that is looking to engage an experienced Level 3 SOC Analyst on an initial 6-month rolling contract. This is a key role within a mature Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing security function.

Responsibilities:

  • Lead investigations and response efforts for high-severity security incidents.
  • Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite.
  • Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel.
  • Perform deep-dive analysis of malware, phishing, and lateral movement techniques.
  • Collaborate with engineering teams to optimise Microsoft security tool integrations.
  • Maintain and enhance incident response procedures and documentation.

What you will Ideally Bring:

  • Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role.
  • Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation.
  • Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365.
  • Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs.
  • Solid understanding of Windows, Linux, and core network security principles.
  • Skilled in incident response, digital forensics, and proactive threat hunting.
  • Experience working with SOAR platforms and building automated workflows.

Contract Details:

  • Duration: 6 Months
  • Location: 3x Per Week Manchester/Remote
  • Daily Rate: Up to £575 Per Day (Inside IR35)

L3 SOC Analyst - 6 months - Inside IR35 - Hybrid