Negotiable
Outside
Remote
Remote , UK
Summary: The role of SOC Analyst involves monitoring and investigating security alerts, conducting threat-hunting activities, and collaborating with incident response teams. This is a remote contract position for experienced professionals, operating outside of IR35. Candidates must be based in the UK and are expected to enhance SOC processes and documentation. The contract duration is initially set for six months.
Key Responsibilities:
- Monitor and investigate security alerts using SIEM tools (eg, Splunk, Microsoft Sentinel).
- Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats.
- Analyze logs and network traffic to identify anomalies.
- Collaborate with incident response teams to contain and remediate threats.
- Create and maintain documentation, playbooks, and incident reports.
- Continuously improve SOC processes and detection capabilities.
Key Skills:
- Strong background in cybersecurity with hands-on SOC experience.
- Proficiency in threat-hunting methodologies and investigative techniques.
- Experience with SIEM platforms such as Splunk, Sentinel, or similar.
- Solid understanding of security frameworks, malware analysis, and network protocols.
- Strong analytical and problem-solving skills.
- Relevant certifications (eg, CompTIA Security+, CEH, GCIA, or Splunk Certified) are a plus.
Salary (Rate): undetermined
City: undetermined
Country: UK
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: undetermined
Industry: IT
SOC Analyst | Remote Contract | Outside IR35
Our client is looking for two experienced SOC Analysts to join them on a 6-month initial contract, working remotely.
This role is operating outside of IR35. Candidates must be based in the UK.
Key Responsibilities:
- Monitor and investigate security alerts using SIEM tools (eg, Splunk, Microsoft Sentinel).
- Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats.
- Analyze logs and network traffic to identify anomalies.
- Collaborate with incident response teams to contain and remediate threats.
- Create and maintain documentation, playbooks, and incident reports.
- Continuously improve SOC processes and detection capabilities.
What We're Looking For:
- Strong background in cybersecurity with hands-on SOC experience .
- Proficiency in threat-hunting methodologies and investigative techniques.
- Experience with SIEM platforms such as Splunk, Sentinel, or similar.
- Solid understanding of security frameworks, malware analysis, and network protocols.
- Strong analytical and problem-solving skills.
- Relevant certifications (eg, CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus.
