£550 Per day
Inside
Hybrid
City of London, London
Summary: The SOC Analyst role involves managing and triaging security tickets, enhancing alert mechanisms, and collaborating with third-party SOCs to ensure alignment with security policies. The position also includes supporting the rollout of SIEM solutions, contributing to cyber reporting, and participating in threat detection and incident response activities. Continuous improvement and collaboration with cross-functional teams are essential to adapt to evolving security threats. This role is based in London and requires working through an umbrella company due to its IR35 status.
Key Responsibilities:
- Support the Cyber Security Operations team in managing and triaging security tickets.
- Proactively suggest improvements to alerting and tuning mechanisms.
- Act as a key point of contact for the third-party Security Operations Center.
- Provide support in the rollout and implementation of Sentinel as the SIEM solution.
- Utilize experience with SIEM platforms to monitor, analyze, and respond to security events.
- Contribute to the preparation and presentation of monthly cyber security reports.
- Continuously monitor security events and incidents within the organization's network.
- Stay informed about the latest security threats and participate in ongoing training.
- Collaborate with cross-functional teams to enhance the security operations program.
Key Skills:
- Experience in security ticket management and incident response.
- Knowledge of SIEM platforms, particularly Sentinel and M365 Defender.
- Strong analytical and problem-solving skills.
- Ability to collaborate effectively with cross-functional teams.
- Excellent communication skills for reporting and stakeholder engagement.
- Understanding of current security threats and trends.
- Experience in refining operational processes for security monitoring.
Salary (Rate): £550
City: London
Country: United Kingdom
Working Arrangements: Hybrid
IR35 Status: Inside IR35
Seniority Level: Mid-Level
Industry: IT