£85 Per hour
Inside
Undetermined
Stevenage, England, United Kingdom
Summary: The Senior SOC Analyst role is a 6-month contract position based in Stevenage, focused on monitoring and improving security operations within a leading Defence and Aerospace company. The position requires hands-on experience with IDS/IPS technologies and involves effective triage of security events, threat hunting, and collaboration with various teams. The role aims to enhance the skills of the analyst while contributing to the company's growth and security posture. Candidates should possess a strong background in Cyber Security and relevant technical skills.
Key Responsibilities:
- Effective Tier 1 to 2 alert triage of security events
- Monitoring of Cyber Security tools
- Monitoring the SOC email notification mailboxes
- Assists with the maintenance of Security technologies
- Assisting the SOC Solutions Lead with project activity
- Assist proactive threat hunting in collaboration with the CTI function
- Assist IR in HR and InfoSec related investigations
- Ensure the timely triage and remediation of any incident or request tickets raised to the SOC
- Participate in the activity of adding/removing URLs from the AcceptList and BlockList
- Conduct activities in line with SOC Maturity and continuous improvement
Key Skills:
- Background in Cyber Security
- Security awareness
- Experience in Network Security, Infrastructure, and Operating Systems & Applications
- Knowledge of IT Security standard methodologies
- Demonstrable understanding of the OSI Reference Model and network communication protocols
- Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools
- Hands-on experience with IDS/IPS technologies and threat-hunting activities
- Experience within Defensive Cyber-attack methodologies and frameworks
- Understanding of Malware capabilities, attack vectors, propagation, and impact
- Root cause analysis and leading T2 incident investigations
- Process / Playbook / Runbook development
- Working knowledge of detection engineering, false positive improvements
- Capability to tune SIEM rules or create custom detections
- Scripted automation experience e.g. Python, SOAR, PowerShell
Salary (Rate): £85.00/hr
City: Stevenage
Country: United Kingdom
Working Arrangements: undetermined
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Senior SOC Analyst 6 month contract Based in Stevenage Offering £85ph Inside IR35 Are you an experienced SOC Analyst? Do you have hands-on experience with IDS/IPS technologies? Do you want to work with an industry-leading company? If your answer to these is yes, then this could be the role for you! As the Senior SOC Analyst, you will be working alongside a market-leading Defence and Aerospace company who are constantly growing and developing. They are always looking to bring on new talents such as yourself and further develop your skills to enable you to grow within the company and industry.
You will be involved in:
- Effective Tier 1 to 2 alert triage of security events
- Monitoring of Cyber Security tools
- Monitoring the SOC email notification mailboxes
- Assists with the maintenance of Security technologies
- Assisting the SOC Solutions Lead with project activity
- Assist proactive threat hunting in collaboration with the CTI function
- Assist IR in HR and InfoSec related investigations
- Ensure the timely triage and remediation of any incident or request tickets raised to the SOC
- Participate in the activity of adding/removing URLs from the AcceptList and BlockList
- Conduct activities in line with SOC Maturity and continuous improvement
Your skillset may include:
- Background in Cyber Security
- Security awareness
- Experience in Network Security, Infrastructure, and Operating Systems & Applications
- Knowledge of IT Security standard methodologies
- Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
- Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools
- Hands-on experience with IDS/IPS technologies and threat-hunting activities
- Experience within Defensive Cyber-attack methodologies and frameworks.
- Understanding of Malware capabilities, attack vectors, propagation, and impact.
- Root cause analysis and leading T2 incident investigations
- Process / Playbook / Runbook development
- Working knowledge of detection engineering, false positive improvements
- Capability to tune SIEM rules or create custom detections
- Scripted automation experience e.g. Python, SOAR, PowerShell
If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further!