SOC Analyst – Active SC, Cyber, Cloud

SOC Analyst – Active SC, Cyber, Cloud

Posted 1 week ago by 1755659059

£400 Per day
Inside
Remote
London

Summary: The SOC Analyst role requires an individual with Active SC Clearance to support a critical programme within a well-known consultancy. The position focuses on leveraging expertise in cloud technologies and incident response to ensure compliance with relevant regulations. Strong communication skills are essential for translating technical threats to non-technical stakeholders. The role is primarily remote and offers a competitive daily rate.

Key Responsibilities:

  • Work as a SOC Analyst in large, complex organisations.
  • Ensure compliance with relevant regulations and control frameworks.
  • Utilize strong knowledge of cloud technologies including AWS and Azure.
  • Engage with GRC teams for adherence to compliance standards.
  • Apply knowledge of adversary TTPs and frameworks like MITRE ATT&CK.
  • Conduct incident response, investigation, analysis, logging, and reporting.
  • Communicate complex technical threats to non-technical audiences.

Key Skills:

  • Proven commercial experience as a SOC Analyst.
  • Active SC clearance.
  • Strong working knowledge of cloud technologies (AWS, Azure).
  • Knowledge of compliance regulations (NCSC CAF, ONR SyAPs, ISO27001).
  • Understanding of adversary TTPs and MITRE ATT&CK framework.
  • Strong incident response and analysis skills.
  • Excellent communication and stakeholder management skills.
  • GIAC Certified Incident Handler (GCIH) Certification or similar (nice to have).
  • Immediate availability (nice to have).

Salary (Rate): £400 daily

City: London

Country: United Kingdom

Working Arrangements: remote

IR35 Status: inside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

SOC Analyst – Active SC, Cyber, Cloud
Up to £400 per day – Inside IR35
Primarily Remote
6 months

My client is an instantly recognisable consultancy who require a SOC Analyst with Active SC Clearance to join a business-critical programme.

Key Requirements:

  • Proven commercial experience working as a SOC Analyst in large, complex organisations.
  • Active SC clearance.
  • Strong working knowledge of cloud technologies including AWS and Azure.
  • The ability to liaise with GRC teams to ensure compliance with and company adherence to relevant regulations and control frameworks e.g. NCSC CAF, ONR SyAPs, ISO27001.
  • Proven knowledge of adversary TTPs and frameworks like MITRE ATT&CK.
  • Strong incident response, investigation, analysis, logging and reporting skills.
  • Excellent communication and stakeholder management skills with the ability to translate complex technical threats and attack paths to non-technical audiences.

Nice to have:

  • GIAC Certified Incident Handler (GCIH) Certification or similar.
  • Immediate availability.