Negotiable
Undetermined
Remote
Gloucestershire, UK
Summary: The SOC Analyst role is a 6-month remote contract position requiring SC clearance, focused on investigating and remediating anomalous events detected by the SOC. The ideal candidate will possess 3-5 years of SOC operations and cyber incident response experience, with familiarity in enterprise cloud technologies such as Azure or AWS. Responsibilities include engaging with stakeholders and presenting complex information to leadership. The position offers a high likelihood of extension and occasional office attendance.
Key Responsibilities:
- Investigate and remediate anomalous events detected by the SOC.
- Engage with multiple stakeholders and present complex information to leadership.
- Utilize SOC operations techniques and tools in both traditional and cloud environments.
- Analyze logs and use cyber defense toolsets to identify root causes and remediate activities.
- Provide business-friendly updates and reports on technical issues.
Key Skills:
- 3-5 years of SOC operations and cyber incident response experience.
- Strong knowledge of adversary TTPs and frameworks like MITRE ATT&CK.
- Experience with enterprise cloud technologies, preferably Azure and AWS.
- Ability to distill complex technical issues into concise updates.
- SC Clearance required.
Salary (Rate): undetermined
City: Gloucestershire
Country: UK
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
SOC Analyst - 6 Month Contract/Remote/Must have SC clearance.
Our client, a leading consultancy, is looking for a SOC Tier 3 Analyst responsible for working with business teams investigating and re-mediating anomalous events detected by the SOC. This is a 6 month contract with a high likelihood of extension working from home with Occasional Office attendance.
You will need to have strong SOC analyst skills, with 3-5 years of SOC operations and Cyber incident response experience. You will have worked with enterprise cloud technologies, either Azure or AWS, and ideally with both. You may be looking for a new challenge with more senior responsibilities and you should also have experience of engaging with multiple stakeholders and demonstrate an ability to present complex information to leadership.
- Familiarity with and experience of SOC operations and associated techniques and tools, in both traditional and cloud environments.
- Strong knowledge of adversary TTPs and frameworks like MITRE ATT&CK.
- Able to distil complex technical issues into concise, business-friendly updates and reports.
- Skilled at analysing logs and working in other cyber defence toolsets to identify root cause and remediate anomalous activity.
- SC Clearance required
