£600 Per day
Outside
Remote
City of London (EC1A)
Summary: The Senior SOC Analyst (L2 / L3) role involves supporting a major cyber security programme for a financial services organisation through monitoring and incident response activities. This position is a 6-month contract that allows for remote work with occasional travel to London. The successful candidate will have experience with security operations in enterprise environments and relevant SIEM platforms. The role is classified as outside IR35 and offers a competitive daily rate.
Key Responsibilities:
- Monitoring security alerts and events across enterprise environments
- Investigating potential cyber security incidents and responding appropriately
- Working with SIEM platforms such as Splunk, Sentinel or QRadar
- Conducting threat analysis and triaging security alerts
- Supporting incident response and remediation activities
- Working with security engineering teams to improve detection capabilities
Key Skills:
- Proven skills in monitoring security alerts and events
- Experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar)
- Ability to investigate and respond to cyber security incidents
- Experience in threat analysis and triaging security alerts
- Background in incident response and remediation activities
- Experience within financial services, fintech or regulated environments
Salary (Rate): £600 per day
City: City of London
Country: United Kingdom
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: Senior
Industry: IT
We’re looking for a Senior SOC Analyst (L2 / L3) for our consultancy client supporting a major cyber security programme for a financial services organisation. This is an initial 6 month contract paying up to £600 per day Outside IR35.The role focuses on supporting security operations monitoring and incident response activities within a large enterprise environment.This role allows remote working with occasional travel to London when required.The successful SOC Analyst will possess proven skills working with the following –
- Monitoring security alerts and events across enterprise environments
- Investigating potential cyber security incidents and responding appropriately
- Working with SIEM platforms such as Splunk, Sentinel or QRadar
- Conducting threat analysis and triaging security alerts
- Supporting incident response and remediation activities
- Working with security engineering teams to improve detection capabilities
Experience within financial services, fintech or other regulated environments would be beneficial.Interested?Please apply belowSOC Analyst, Security Operations Analyst, Cyber Security Analyst, SIEM Analyst, Splunk, Microsoft Sentinel, Incident Response, Outside IR35 Contract