£300 Per day
Outside
Remote
Remote , UK
Summary: We are looking for an experienced L2 SOC Analyst for a 6-month remote contract with a major Cyber Security client. The role focuses on advanced incident investigation, threat hunting, and analysis across various data sources and security platforms. The position requires strong hands-on skills with SIEM tools and a solid understanding of threat intelligence and incident response. This role is classified as outside IR35, allowing for greater flexibility in contract arrangements.
Key Responsibilities:
- Conduct proactive threat hunts across host, network, vulnerability, and Active Directory data.
- Investigate escalated security incidents and perform root cause analysis.
- Analyse incidents using threat intelligence (IOCs, TTPs) and diverse data sets.
- Monitor and respond to events across Windows, macOS, and Linux environments.
- Leverage SIEM tools including CrowdStrike SIEM, Splunk, and Microsoft Defender.
Key Skills:
- Experience in a Level 2 SOC or equivalent security operations role.
- Strong hands-on skills with SIEM platforms (CrowdStrike, Splunk, Defender).
- Solid understanding of threat intelligence, incident response, and data correlation.
- Familiarity with enterprise environments and operating system security (Windows/macOS/Linux).
- Excellent analytical and communication skills.
Salary (Rate): £300 per day
City: undetermined
Country: UK
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: undetermined
Industry: IT
Detailed Description From Employer:
L2 SOC Analyst - 6 months - Remote- Outside IR35
We are seeking a skilled L2 SOC Analyst to join our team on a 6-month contract with a major Cyber Security client. This role involves advanced incident investigation, threat hunting, and analysis across a range of data sources and security platforms.
Key Responsibilities:
-
Conduct proactive threat hunts across host, network, vulnerability, and Active Directory data.
-
Investigate escalated security incidents and perform root cause analysis.
-
Analyse incidents using threat intelligence (IOCs, TTPs) and diverse data sets.
-
Monitor and respond to events across Windows, macOS, and Linux environments.
-
Leverage SIEM tools including CrowdStrike SIEM, Splunk, and Microsoft Defender.
What You'll Bring:
-
Experience in a Level 2 SOC or equivalent security operations role.
-
Strong hands-on skills with SIEM platforms (CrowdStrike, Splunk, Defender).
-
Solid understanding of threat intelligence, incident response, and data correlation.
-
Familiarity with enterprise environments and operating system security (Windows/macOS/Linux).
-
Excellent analytical and communication skills.
Contract Details:
-
Duration: 6 months (view to extend)
-
Location: Remote
-
Rate: £300 per day (Outside IR35)
-
Start: ASAP
L2 SOC Analyst - 6 months - Remote- Outside IR35
