Negotiable
Inside
Undetermined
Milton Keynes, UK
Summary: The Cyber Security Lead SOC Analyst role requires a DV Security Cleared professional to work in a 24/7 shift pattern within a government services environment in Milton Keynes. The position involves monitoring security tools, incident triage, initial incident response, and managing junior team members. Candidates must have experience with SPLUNK and a foundational understanding of networking and cyber-attack techniques. A bachelor's degree in computer science or Cyber Security and relevant certifications are preferred.
Key Responsibilities:
- Continuous Monitoring of security tools, including SIEM systems, to detect suspicious activity.
- Incident Triage to analyze alerts and logs for genuine security incidents.
- Initial Incident Response for confirmed incidents, including containment actions.
- Reporting and Documentation of all detected incidents and actions taken.
- Managing and providing direction to junior team members and shift handover.
- Tool Management to assist in the maintenance and optimization of security tools.
Key Skills:
- Experience of SPLUNK within a Security Operations Centre (SOC).
- Bachelor's degree in computer science or Cyber Security.
- Foundational understanding of networking concepts (TCP/IP, DNS, etc.) and operating systems (Windows, Linux).
- Knowledge of common cyber-attack techniques.
- Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or similar are a bonus.
Salary (Rate): £655/day
City: Milton Keynes
Country: UK
Working Arrangements: undetermined
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Cyber Security Lead SOC Analysts, Splunk, DV Security Cleared, required by our government services client based Milton Keynes, Bucks commutable from Northampton, East Midlands, Bedford, Luton, Peterborough.
Paying 655 a day - Umbrella Company
Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake.
The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays.
To start in the New Year
Skills and Experience Required:
Experience of SPLUNK with in a Security Operations Centre (SOC).
A bachelor's degree in computer science, Cyber Security
You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques.
Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role
Key Responsibilities
Continuous Monitoring You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes.
Incident Triage You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents.
Initial Incident Response For confirmed incidents, youll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation.
Reporting and Documentation You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis.
Managing You'll provide direction and support to the junior member of the shift and provide handover to the next shift leader.
Tool Management: You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively.
Please apply on line in the first instance
SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.