£650 Per day
Inside
Onsite
Milton Keynes, UK
Summary: A Senior SOC Analyst (SC Cleared) is sought for a 12-month role with a government client in Milton Keynes, responsible for providing 24x7 security monitoring and incident response. The position requires current SC security clearance and expertise in SPLUNK within a security operations center. The analyst will monitor security tools, analyze alerts, and manage security incidents while ensuring the effectiveness of security tools. This role is full-time on-site, with an option to work at a Glasgow location if preferred.
Key Responsibilities:
- Monitor security tools, including SIEM systems, to detect suspicious activity.
- Analyze alerts and logs to classify and prioritize incidents.
- Perform initial containment actions for confirmed incidents and escalate as necessary.
- Create detailed tickets and reports for all detected incidents.
- Assist in the maintenance and optimization of security tools.
Key Skills:
- Current SC Level security clearance.
- Experience with SPLUNK in a SOC environment.
- Excellent problem-solving abilities and attention to detail.
- Understanding of networking concepts (TCP/IP, DNS).
- Familiarity with Windows and Linux operating systems.
- Knowledge of common cyber attack techniques.
- Desirable: Cyber security certifications.
Salary (Rate): £600 per day
City: Milton Keynes
Country: UK
Working Arrangements: on-site
IR35 Status: inside IR35
Seniority Level: Senior
Industry: IT
Senior SOC Analyst (SC Cleared)
Duration: 12 Months
Location: Milton Keynes
Rate: £600 per day
IR35 Status: Inside
Start: ASAP
A Senior SOC Analyst (SC Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats.
You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process.
Essential skills & experience required:
As the Senior SOC Analyst you will possess current security clearance to SC Level together with experience of SPLUNK within a security operations centre (SOC)
Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment.
Have a good understanding of networking concepts (TCP/IP, DNS etc..)
Windows and Linux O/Systems
Common cyber attack techniques
Any Cyber security certifications would be desirable.
Responsibilities include:
You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity.
Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents.
For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation.
Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis.
Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively.
Please be advised this role is based full time on the client site in Milton Keynes (However, if preferred you can choose their other site in Glasgow).