SOC Analyst | Remote Contract | Outside IR35

SOC Analyst | Remote Contract | Outside IR35

Posted 1 week ago by Korn Ferry

Negotiable
Outside
Remote
Remote , UK

Summary: The role of SOC Analyst involves monitoring and investigating security alerts, conducting threat-hunting activities, and collaborating with incident response teams. This is a remote contract position for experienced professionals, operating outside of IR35. Candidates must be based in the UK and are expected to enhance SOC processes and documentation. The contract duration is initially set for six months.

Key Responsibilities:

  • Monitor and investigate security alerts using SIEM tools (eg, Splunk, Microsoft Sentinel).
  • Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats.
  • Analyze logs and network traffic to identify anomalies.
  • Collaborate with incident response teams to contain and remediate threats.
  • Create and maintain documentation, playbooks, and incident reports.
  • Continuously improve SOC processes and detection capabilities.

Key Skills:

  • Strong background in cybersecurity with hands-on SOC experience.
  • Proficiency in threat-hunting methodologies and investigative techniques.
  • Experience with SIEM platforms such as Splunk, Sentinel, or similar.
  • Solid understanding of security frameworks, malware analysis, and network protocols.
  • Strong analytical and problem-solving skills.
  • Relevant certifications (eg, CompTIA Security+, CEH, GCIA, or Splunk Certified) are a plus.

Salary (Rate): undetermined

City: undetermined

Country: UK

Working Arrangements: remote

IR35 Status: outside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

SOC Analyst | Remote Contract | Outside IR35

Our client is looking for two experienced SOC Analysts to join them on a 6-month initial contract, working remotely.

This role is operating outside of IR35. Candidates must be based in the UK.

Key Responsibilities:

  • Monitor and investigate security alerts using SIEM tools (eg, Splunk, Microsoft Sentinel).
  • Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats.
  • Analyze logs and network traffic to identify anomalies.
  • Collaborate with incident response teams to contain and remediate threats.
  • Create and maintain documentation, playbooks, and incident reports.
  • Continuously improve SOC processes and detection capabilities.

What We're Looking For:

  • Strong background in cybersecurity with hands-on SOC experience .
  • Proficiency in threat-hunting methodologies and investigative techniques.
  • Experience with SIEM platforms such as Splunk, Sentinel, or similar.
  • Solid understanding of security frameworks, malware analysis, and network protocols.
  • Strong analytical and problem-solving skills.
  • Relevant certifications (eg, CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus.