£400 Per day
Undetermined
Undetermined
London, UK
Summary: As a Lead SOC Analyst, you will be responsible for advanced incident analysis, investigation, and response to security threats. The role involves acting as a technical escalation point for complex incidents and contributing to the development of playbooks and tooling improvements. You will also engage with stakeholders across various platforms to ensure effective threat remediation and compliance with security frameworks.
Key Responsibilities:
- Analyse and investigate complex security incidents using SIEM, EDR/XDR, cloud, and forensic data.
- Lead incident response activities, providing technical expertise to remediate threats.
- Advise on improvements to SOC playbooks, tooling, and processes.
- Liaise with stakeholders across cloud platforms (AWS/Azure), endpoints, and critical business systems.
- Translate technical findings into clear management briefings and risk insights.
- Support compliance with frameworks such as NCSC CAF, ISO27001, and other CNI standards.
- Provide input into crisis management exercises and major incident support.
Key Skills:
- 3-5 years of SOC operations and cyber incident response experience.
- Strong knowledge of adversary TTPs and frameworks (MITRE ATT&CK).
- Hands-on experience with enterprise cloud security (Azure and/or AWS).
- Skilled in log analysis, SIEM, forensic artefacts, and endpoint security tooling.
- Ability to present complex information clearly to technical and non-technical stakeholders.
- Professional certifications such as GCIH or equivalent are desirable.
Salary (Rate): £400 per day
City: London
Country: UK
Working Arrangements: undetermined
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
Contract
SC Cleared
SOC Analyst L3
The Role
As a Lead SOC Analyst, you will take responsibility for advanced incident analysis, investigation, and response, ensuring threats are identified, contained, and remediated effectively. You will act as a technical escalation point for complex security incidents and contribute to playbook development, tooling improvements, and incident reporting.
Key Responsibilities
Analyse and investigate complex security incidents using SIEM, EDR/XDR, cloud, and forensic data.
Lead incident response activities, providing technical expertise to remediate threats.
Advise on improvements to SOC playbooks, tooling, and processes.
Liaise with stakeholders across cloud platforms (AWS/Azure), endpoints, and critical business systems.
Translate technical findings into clear management briefings and risk insights.
Support compliance with frameworks such as NCSC CAF, ISO27001, and other CNI standards.
Provide input into crisis management exercises and major incident support.
Skills & Experience
3-5 years of SOC operations and cyber incident response experience.
Strong knowledge of adversary TTPs and frameworks (MITRE ATT&CK).
Hands-on experience with enterprise cloud security (Azure and/or AWS).
Skilled in log analysis, SIEM, forensic artefacts, and endpoint security tooling.
Ability to present complex information clearly to technical and non-technical stakeholders.
Professional certifications such as GCIH or equivalent are desirable.
GCS is acting as an Employment Business in relation to this vacancy.
