£45 Per hour
Inside
Onsite
Stevenage, Hertfordshire
Summary: The SOC Analyst (Mid-Level) role is a 6-month contract position based in Stevenage, focusing on supporting the cyber security operations centre (SOC) through threat detection and analysis. The position requires proactive engagement in a dynamic cyber environment, utilizing various security technologies. Candidates will be involved in monitoring, reporting, and investigating security events while collaborating with other teams. This role is ideal for individuals with a strong background in cyber security and network security practices.
Key Responsibilities:
- Drive a proactive ethos in cyber security within the 24x7 SOC.
- Conduct analysis, monitoring, reporting, alerting, and investigation activities.
- Perform effective Tier 1 to 2 alert triage of security events.
- Monitor Cyber Security tools and SOC email notification mailboxes.
- Assist with the maintenance of MBDA Security technologies.
- Support the SOC Solutions Lead with project activities.
- Engage in proactive threat hunting in collaboration with the CTI function.
- Ensure timely triage and remediation of incident or request tickets.
- Participate in adding/removing URLs from the AcceptList and BlockList.
- Attend routine security meetings and conduct activities for SOC Maturity and continuous improvement.
Key Skills:
- Experience in Cyber Security with a focus on Network Security, Infrastructure, and Operating Systems & Applications.
- Knowledge of IT Security standard methodologies.
- Understanding of the OSI Reference Model and network communication protocols.
- Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools.
- Hands-on experience with IDS/IPS technologies and threat hunting activities.
- Strong analytical skills and a keen mindset.
- Good communication skills for liaising with business units and suppliers.
Salary (Rate): £45/hour
City: Stevenage
Country: United Kingdom
Working Arrangements: on-site
IR35 Status: inside IR35
Seniority Level: Mid-Level
Industry: IT
Location: Stevenage (shift pattern - detailed below) Duration: 6 month initial contractRate for Mid-Level: £45ph UMB (Inside IR35)Hours: 28 hours per week. Role details: Our client, a leading defence company, are looking to bring in multiple SOC Analysts due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the most dynamic fields in defence.
Key Responsibilities:The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies.Effective Tier 1 to 2 alert triage of security eventsMonitoring of Cyber Security toolsMonitoring the SOC email notification mailboxesAssists with the maintenance of MBDA Security technologiesAssisting the SOC Solutions Lead with project activityAssist proactive threat hunting in collaboration with the CTI functionAssist IR in HR and InfoSec related investigationsEnsure the timely triage and remediation of any incident or request tickets raised to the SOCParticipate in the activity of adding/removing URLs from the AcceptList and BlockListAttend routine security meetingsConduct activities in line with SOC Maturity and continuous improvement
What we are looking for in you: Experience in Cyber Security with a focus on Network Security, Infrastructure and Operating Systems & ApplicationsKnowledge of IT Security standard methodologiesUnderstanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/SExperience with Security Information Event Monitoring Tools and/or Network Packet Capture toolsHands-on experience with IDS/IPS technologies and threat hunting activitiesStrong analytical skills and a keen mindsetExperience within Defensive Cyber-attack methodologies and frameworksUnderstanding of Malware capabilities, attack vectors, propagation and impactGood communication skills for liaising with business units and suppliers
Desirable Skills for Senior grade:Root cause analysis and leadership in T2 incident investigationsProcess / Playbook / Runbook developmentWorking knowledge of detection engineering, false positive improvementsCapability to tune SIEM rules or create custom detectionsScripted automation experience e.g. Python, SOAR, PowerShellThreat modelling and hunting methodologies
Additional information: These roles are fully site based in StevenageShift Pattern: Blocks on 4-5 days on, and 4-5 das off with either early, lates or nights across the shift blocks (rotating pattern). 2 weekend per 28 days will also be requiredThese roles are 28 hours per weekSC will be required prior to starting the role, with a view of applying candidates for DV clearance (bonus if you already hold this!) If you have the required experience and skills and are looking for a challenging role in the Defence & Security sector, we encourage you to apply now!