Negotiable
Undetermined
Hybrid
Milton Keynes, UK
Summary: The SOC Analyst role at Summer-Browning Associates involves supporting a Central Government client in a hybrid capacity for an initial 6-month assignment, potentially extendable. Candidates must possess active SC or DV clearance and have experience in Cyber Security Operations within high-threat environments. The position requires expertise in SOC operations, incident response, and various security tools.
Key Responsibilities:
- Experience in SOC operations, incident response, and forensic analysis.
- Proficiency in Security Information and Event Management (SIEM), including tools such as Sentinel, Splunk, Defender, Qualys, Tenable, Huntsman & LogRhyth.
- Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation.
- Experience in network security principles, firewalls, and access control mechanisms.
- Knowledge of navigating secure environments in the public sector/defence sector effectively.
Key Skills:
- Active SC or DV clearance.
- Proven background in Cyber Security Operation Centres.
- Experience with incident response and forensic analysis.
- Proficiency in SIEM tools.
- Understanding of network security principles and access control mechanisms.
- Ability to navigate secure environments in public/defence sectors.
Salary (Rate): £0.00 per day
City: Milton Keynes
Country: UK
Working Arrangements: hybrid
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
SOC ANALYST | CYBER SECURITY ANALYST
Summer-Browning Associates is supporting our client in the Central Government who is seeking a SOC/Cyber Security Analyst for an initial 6-month assignment, with the possibility of extension.
Location: Milton Keynes |London | Hybrid
The ideal candidates will hold active SC or DV clearance and have a proven background in Cyber Security Operation Centres working within a high-threat government environment:
- Experience in SOC operations, incident response, and forensic analysis.
- Proficiency in Security Information and Event Management (SIEM), including tools such as Sentinel, Splunk, Defender, Qualys, Tenable, Huntsman & LogRhyth
- Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation.
- Experience in network security principles, firewalls, and access control mechanisms
- Knowledge of navigating secure environments in the public sector/defence sector effectively.
To apply, please submit your latest CV for review.