Negotiable
Undetermined
Undetermined
London
Summary: The SOC L2 Analyst role involves supporting the investigation, response, and remediation of complex cyber security incidents within a high-performing Security Operations Centre. This hands-on position focuses on incident response, threat detection, and forensic investigation, utilizing enterprise-scale security tools while collaborating with various IT teams. The analyst will be responsible for managing escalations, conducting forensics, and producing incident reports. The ideal candidate will have proven experience in a SOC environment and a strong technical background in security tools.
Key Responsibilities:
- Investigate and respond to Tier 2 security incidents, including malware, ransomware, data breaches and APTs
- Analyse alerts using SIEM tools (Splunk) and EDR platforms (Microsoft Defender)
- Perform incident forensics, root cause analysis and impact assessments
- Own escalations from SOC L1 and provide technical guidance and quality assurance
- Support containment, eradication and recovery activities
- Produce clear incident reports and technical documentation
- Contribute to detection improvement, playbooks and post-incident reviews
Key Skills:
- Proven experience as a SOC Analyst L2 / Tier 2 / Incident Response Analyst
- Strong hands-on experience with Splunk or other SIEM platforms
- Experience with EDR / endpoint detection tools (Defender preferred)
- Solid understanding of incident response, threat hunting and security investigations
- Knowledge of Windows, Linux and enterprise environments
- Ability to work under pressure in a SOC environment
- Cyber security certifications (GIAC, GCIH, GCIA, GCFA, CISSP) - desirable
- Digital forensics or malware analysis experience - desirable
Salary (Rate): undetermined
City: London
Country: United Kingdom
Working Arrangements: undetermined
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
description: SOC L2 Analyst (Security Operations Centre)
We’re recruiting an experienced SOC L2 Analyst / Tier 2 Security Analyst to join a high-performing Security Operations Centre (SOC) environment, supporting the investigation, response and remediation of complex cyber security incidents.
This is a hands-on role focused on incident response, threat detection and forensic investigation, working with enterprise-scale security tooling and collaborating closely with Tier 1, Tier 3 and wider IT teams.
Key Responsibilities
- Investigate and respond to Tier 2 security incidents, including malware, ransomware, data breaches and APTs
- Analyse alerts using SIEM tools (Splunk) and EDR platforms (Microsoft Defender)
- Perform incident forensics, root cause analysis and impact assessments
- Own escalations from SOC L1 and provide technical guidance and quality assurance
- Support containment, eradication and recovery activities
- Produce clear incident reports and technical documentation
- Contribute to detection improvement, playbooks and post-incident reviews
Required Skills & Experience
- Proven experience as a SOC Analyst L2 / Tier 2 / Incident Response Analyst
- Strong hands-on experience with Splunk or other SIEM platforms
- Experience with EDR / endpoint detection tools (Defender preferred)
- Solid understanding of incident response, threat hunting and security investigations
- Knowledge of Windows, Linux and enterprise environments
- Ability to work under pressure in a SOC environment
Desirable
- Cyber security certifications (GIAC, GCIH, GCIA, GCFA, CISSP)
- Digital forensics or malware analysis experience
This role suits someone who enjoys owning incidents end-to-end rather than monitoring alerts.
Apply now to discuss further.