£633 Per day
Inside
Undetermined
Glasgow
Summary: The Lead SOC Analyst role involves overseeing a 24/7 Security Operations Centre in Glasgow, focusing on protecting critical systems from cyber threats. The position requires leadership in monitoring incidents, guiding junior analysts, and managing security tools. This is a 12-month contract offering a competitive daily rate. The role is classified as inside IR35.
Key Responsibilities:
- Continuous Monitoring: Oversee SIEM tools (including Splunk) to detect suspicious activity and ensure timely response.
- Incident Triage: Analyse alerts and logs to confirm genuine incidents and prioritise effectively.
- Initial Incident Response: Execute containment actions and escalate complex cases to senior analysts.
- Reporting & Documentation: Maintain detailed records of incidents and actions taken for tracking and analysis.
- Team Leadership: Provide direction and support to junior analysts during shifts and ensure smooth handovers.
- Tool Management: Assist in maintaining and optimising security tools for peak performance.
Key Skills:
- Strong leadership skills with the ability to guide and mentor junior team members.
- Excellent problem-solving abilities, attention to detail, and ability to work under pressure.
- Hands-on experience with Splunk in a SOC environment.
- Solid understanding of networking (TCP/IP, DNS), operating systems (Windows/Linux), and common cyber-attack techniques.
- A degree in Computer Science, Cybersecurity, IT, or equivalent experience.
- Certifications such as CompTIA Security+, CySA+, or similar are highly desirable.
Salary (Rate): £633 daily
City: Glasgow
Country: United Kingdom
Working Arrangements: undetermined
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Your New Company and Role
We’re partnering with a leading organisation seeking an experienced Lead SOC Analyst to join their team in Glasgow on a 12-month contract. This is a fantastic opportunity to take a leadership role within a 24/7 Security Operations Centre (SOC), protecting critical systems from cyber threats.
As a Level 2 SOC Analyst, you’ll not only monitor and respond to incidents but also provide guidance and support to junior team members. Your responsibilities will include:
- Continuous Monitoring: Oversee SIEM tools (including Splunk) to detect suspicious activity and ensure timely response.
- Incident Triage: Analyse alerts and logs to confirm genuine incidents and prioritise effectively.
- Initial Incident Response: Execute containment actions and escalate complex cases to senior analysts.
- Reporting & Documentation: Maintain detailed records of incidents and actions taken for tracking and analysis.
- Team Leadership: Provide direction and support to junior analysts during shifts and ensure smooth handovers.
- Tool Management: Assist in maintaining and optimising security tools for peak performance.
What You’ll Need to Succeed
- Strong leadership skills with the ability to guide and mentor junior team members.
- Excellent problem-solving abilities, attention to detail, and ability to work under pressure.
- Hands-on experience with Splunk in a SOC environment.
- Solid understanding of networking (TCP/IP, DNS), operating systems (Windows/Linux), and common cyber-attack techniques.
- A degree in Computer Science, Cybersecurity, IT, or equivalent experience.
- Certifications such as CompTIA Security+, CySA+, or similar are highly desirable.
What You’ll Get in Return
- Competitive daily rate up to £633.
- 12-month contract with potential for extension.
- Opportunity to lead within a high-performing SOC team on mission-critical projects.
What you need to do now
If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now.
If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career.