L2 SOC Analyst - Remote - Outside IR35

L2 SOC Analyst - Remote - Outside IR35

Posted Today by Hamilton Barnes

£300 Per day
Outside
Remote
Remote , UK

Summary: We are looking for an experienced L2 SOC Analyst for a 6-month remote contract with a major Cyber Security client. The role focuses on advanced incident investigation, threat hunting, and analysis across various data sources and security platforms. The position requires strong hands-on skills with SIEM tools and a solid understanding of threat intelligence and incident response. This role is classified as outside IR35, allowing for greater flexibility in contract arrangements.

Key Responsibilities:

  • Conduct proactive threat hunts across host, network, vulnerability, and Active Directory data.
  • Investigate escalated security incidents and perform root cause analysis.
  • Analyse incidents using threat intelligence (IOCs, TTPs) and diverse data sets.
  • Monitor and respond to events across Windows, macOS, and Linux environments.
  • Leverage SIEM tools including CrowdStrike SIEM, Splunk, and Microsoft Defender.

Key Skills:

  • Experience in a Level 2 SOC or equivalent security operations role.
  • Strong hands-on skills with SIEM platforms (CrowdStrike, Splunk, Defender).
  • Solid understanding of threat intelligence, incident response, and data correlation.
  • Familiarity with enterprise environments and operating system security (Windows/macOS/Linux).
  • Excellent analytical and communication skills.

Salary (Rate): £300 per day

City: undetermined

Country: UK

Working Arrangements: remote

IR35 Status: outside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

L2 SOC Analyst - 6 months - Remote- Outside IR35

We are seeking a skilled L2 SOC Analyst to join our team on a 6-month contract with a major Cyber Security client. This role involves advanced incident investigation, threat hunting, and analysis across a range of data sources and security platforms.

Key Responsibilities:

  • Conduct proactive threat hunts across host, network, vulnerability, and Active Directory data.

  • Investigate escalated security incidents and perform root cause analysis.

  • Analyse incidents using threat intelligence (IOCs, TTPs) and diverse data sets.

  • Monitor and respond to events across Windows, macOS, and Linux environments.

  • Leverage SIEM tools including CrowdStrike SIEM, Splunk, and Microsoft Defender.

What You'll Bring:

  • Experience in a Level 2 SOC or equivalent security operations role.

  • Strong hands-on skills with SIEM platforms (CrowdStrike, Splunk, Defender).

  • Solid understanding of threat intelligence, incident response, and data correlation.

  • Familiarity with enterprise environments and operating system security (Windows/macOS/Linux).

  • Excellent analytical and communication skills.

Contract Details:

  • Duration: 6 months (view to extend)

  • Location: Remote

  • Rate: £300 per day (Outside IR35)

  • Start: ASAP

L2 SOC Analyst - 6 months - Remote- Outside IR35