Threat Hunter/Threat Detection/SOC Analyst/TTP/Threats/Monitoring/Detection/ZTNA
Posted 4 days ago by Sentinel
£600 Per day
Inside
Hybrid
London, UK
Summary: The role of Threat Hunter/SOC Analyst involves proactive threat detection and hunting within a busy SOC team, focusing on cloud environments such as AWS, Azure, and GCP. The position requires strategic thinking to anticipate and mitigate potential threats rather than responding to them reactively. This hybrid role combines both remote and on-site work, emphasizing the importance of collaboration and communication within the team. The position is classified as inside IR35, indicating specific tax implications for contractors.
Key Responsibilities:
- Conduct threat detection and hunting activities within a SOC team.
- Focus on proactive strategies to identify potential threats before they occur.
- Work across cloud environments including AWS, Azure, and GCP.
- Provide direction and strategy for threat management within the business.
Key Skills:
- Experience in SOC operations and threat detection.
- Proficiency in tools such as Sentinel and Splunk.
- Knowledge of Zero Trust Network Access (ZTNA) principles.
- Strong analytical and strategic thinking skills.
Salary (Rate): £600 per day
City: London
Country: UK
Working Arrangements: hybrid
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Threat Hunter/Threat Detector/SOC Analyst/TTP/Threats/Monitoring/Detection/ZTNA/Sentinel/Splunk. Superb London based client have an Urgent role, Inside IR35, Hybrid Remote and Onsite for an experienced SOC Analyst/TTP/Threats Monitoring/Detection/ZTNA/Sentinel/Splunk.
This role, working across Cloud (AWS/Azure and GCP) will see you focusing on threat detection and threat hunting as part of a busy SOC Team. This role isn't about dealing with threats when they happen, it is about hunting them out. Thinking ahead of the curve and providing direction, thoughts and strategy as to how the business deals with threats.