SOC Analyst

SOC Analyst

Posted 1 day ago by DCV Technologies

Negotiable
Undetermined
Undetermined
London

Summary: The SOC L2 Analyst role involves supporting the investigation, response, and remediation of complex cyber security incidents within a high-performing Security Operations Centre. This hands-on position focuses on incident response, threat detection, and forensic investigation, utilizing enterprise-scale security tools while collaborating with various IT teams. The analyst will be responsible for managing escalations, conducting forensics, and producing incident reports. The ideal candidate will have proven experience in a SOC environment and a strong technical background in security tools.

Key Responsibilities:

  • Investigate and respond to Tier 2 security incidents, including malware, ransomware, data breaches and APTs
  • Analyse alerts using SIEM tools (Splunk) and EDR platforms (Microsoft Defender)
  • Perform incident forensics, root cause analysis and impact assessments
  • Own escalations from SOC L1 and provide technical guidance and quality assurance
  • Support containment, eradication and recovery activities
  • Produce clear incident reports and technical documentation
  • Contribute to detection improvement, playbooks and post-incident reviews

Key Skills:

  • Proven experience as a SOC Analyst L2 / Tier 2 / Incident Response Analyst
  • Strong hands-on experience with Splunk or other SIEM platforms
  • Experience with EDR / endpoint detection tools (Defender preferred)
  • Solid understanding of incident response, threat hunting and security investigations
  • Knowledge of Windows, Linux and enterprise environments
  • Ability to work under pressure in a SOC environment
  • Cyber security certifications (GIAC, GCIH, GCIA, GCFA, CISSP) - desirable
  • Digital forensics or malware analysis experience - desirable

Salary (Rate): undetermined

City: London

Country: United Kingdom

Working Arrangements: undetermined

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

description: SOC L2 Analyst (Security Operations Centre)
We’re recruiting an experienced SOC L2 Analyst / Tier 2 Security Analyst to join a high-performing Security Operations Centre (SOC) environment, supporting the investigation, response and remediation of complex cyber security incidents.
This is a hands-on role focused on incident response, threat detection and forensic investigation, working with enterprise-scale security tooling and collaborating closely with Tier 1, Tier 3 and wider IT teams.

Key Responsibilities

  • Investigate and respond to Tier 2 security incidents, including malware, ransomware, data breaches and APTs
  • Analyse alerts using SIEM tools (Splunk) and EDR platforms (Microsoft Defender)
  • Perform incident forensics, root cause analysis and impact assessments
  • Own escalations from SOC L1 and provide technical guidance and quality assurance
  • Support containment, eradication and recovery activities
  • Produce clear incident reports and technical documentation
  • Contribute to detection improvement, playbooks and post-incident reviews

Required Skills & Experience

  • Proven experience as a SOC Analyst L2 / Tier 2 / Incident Response Analyst
  • Strong hands-on experience with Splunk or other SIEM platforms
  • Experience with EDR / endpoint detection tools (Defender preferred)
  • Solid understanding of incident response, threat hunting and security investigations
  • Knowledge of Windows, Linux and enterprise environments
  • Ability to work under pressure in a SOC environment

Desirable

  • Cyber security certifications (GIAC, GCIH, GCIA, GCFA, CISSP)
  • Digital forensics or malware analysis experience

This role suits someone who enjoys owning incidents end-to-end rather than monitoring alerts.
Apply now to discuss further.