£650 Per day
Inside
Undetermined
London, UK
Summary: The Senior SOC Analyst (DV Cleared) role involves joining a government client's security team to provide 24x7 monitoring and incident response against cyber threats. The position requires current DV security clearance and expertise in SPLUNK within a security operations center. The analyst will be responsible for detecting security incidents, performing initial containment actions, and documenting findings. This role is critical for maintaining the organization's cybersecurity posture and ensuring effective incident management.
Key Responsibilities:
- Monitor security tools, including SIEM systems, to detect suspicious activity.
- Analyse alerts and logs to classify and prioritise incidents.
- Perform initial containment actions for confirmed incidents and escalate as necessary.
- Create detailed tickets and reports documenting findings and actions taken.
- Assist in the maintenance and optimisation of security tools.
Key Skills:
- Current DV security clearance.
- Experience with SPLUNK in a SOC environment.
- Excellent problem-solving abilities and attention to detail.
- Understanding of networking concepts (TCP/IP, DNS).
- Familiarity with Windows and Linux operating systems.
- Knowledge of common cyber attack techniques.
- Desirable: Cybersecurity certifications.
Salary (Rate): £650 per day
City: London
Country: UK
Working Arrangements: undetermined
IR35 Status: Inside IR35
Seniority Level: Senior
Industry: IT
Senior SOC Analyst (DV Cleared)
Duration: 12 Months
Location: London
Rate: £600-£650 per day
IR35 Status: Inside
Start: ASAP
A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats.
You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process.
Essential skills & experience required:
As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC)
Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment.
Have a good understanding of networking concepts (TCP/IP, DNS etc..)
Windows and Linux O/Systems
Common cyber attack techniques
Any Cyber security certifications would be desirable.
Responsibilities include:
You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity.
Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents.
For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation.
Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis.
Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively.
To apply for this role please email your CV to: (see below)
Certes IT Service Solutions welcome applications from all sections of the community and from people with diverse experience and backgrounds
Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations.