Soc Analyst | Security Operations Center (soc).

Soc Analyst | Security Operations Center (soc).

Posted 1 week ago by Summer-Browning Associates

Negotiable
Undetermined
Hybrid
Milton Keynes, UK

Summary: The SOC Analyst role at Summer-Browning Associates involves supporting a Central Government client in a hybrid capacity for an initial 6-month assignment, potentially extendable. Candidates must possess active SC or DV clearance and have experience in Cyber Security Operations within high-threat environments. The position requires expertise in SOC operations, incident response, and various security tools.

Key Responsibilities:

  • Experience in SOC operations, incident response, and forensic analysis.
  • Proficiency in Security Information and Event Management (SIEM), including tools such as Sentinel, Splunk, Defender, Qualys, Tenable, Huntsman & LogRhyth.
  • Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation.
  • Experience in network security principles, firewalls, and access control mechanisms.
  • Knowledge of navigating secure environments in the public sector/defence sector effectively.

Key Skills:

  • Active SC or DV clearance.
  • Proven background in Cyber Security Operation Centres.
  • Experience with incident response and forensic analysis.
  • Proficiency in SIEM tools.
  • Understanding of network security principles and access control mechanisms.
  • Ability to navigate secure environments in public/defence sectors.

Salary (Rate): £0.00 per day

City: Milton Keynes

Country: UK

Working Arrangements: hybrid

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

SOC ANALYST | CYBER SECURITY ANALYST

Summer-Browning Associates is supporting our client in the Central Government who is seeking a SOC/Cyber Security Analyst for an initial 6-month assignment, with the possibility of extension.

Location: Milton Keynes |London | Hybrid

The ideal candidates will hold active SC or DV clearance and have a proven background in Cyber Security Operation Centres working within a high-threat government environment:

  • Experience in SOC operations, incident response, and forensic analysis.
  • Proficiency in Security Information and Event Management (SIEM), including tools such as Sentinel, Splunk, Defender, Qualys, Tenable, Huntsman & LogRhyth
  • Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation.
  • Experience in network security principles, firewalls, and access control mechanisms
  • Knowledge of navigating secure environments in the public sector/defence sector effectively.

To apply, please submit your latest CV for review.