We are rapidly growing our SOC team and our roles offer serious career growth and very exciting work with multiple, high profile clients!
SOC Analysts come and join our growing Cyber practice in the Aerospace Defence and Security sector. This role will require you to have proven experience working in a busy SOC with a tech-first approach.
The team that you will be joining is on the cusp of continued growth, so we are looking for you to lead from the front. From a technical perspective we are using Microsoft Sentinel, Splunk and MISP Threat sharing so any knowledge of these technologies would be a substantial benefit.
This role is based out of our head office in Hemel Hempstead and will work on a shift pattern with 12 hour shifts (Nights and Days). 2 x 6am to 6PM, 2 x 6PM to 6AM and 4 days off.
You do need to be eligible for Developed Vetting (DV)
We can offer great career progression opportunities, benefits which you can flex to meet your needs and training and development opportunities.
What you'll be doing:
* Monitor, triage, and investigate security incidents on critical client infrastructure.
* In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities.
* Provide Incident Response support.
* Maintain, improve and develop team knowledge of SOC tools, security operations and triage.
* Prepare reports for managed clients to both technical and non-technical audiences and continuously improve their content and presentation.
* Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies.
What you’ll bring:
* Experience in Security Operations Centre.
* Demonstrable experience of Managing Microsoft Sentinel and Splunk implementations.
* Knowledge and experience with Mitre Att&ck Framework.
* Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products.
* Deep technical knowledge in the analysis of log data and intrusion detection systems.
* Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP.
It would be great if you had:
* Understanding of static malware analysis and reverse engineering.
* CREST Practitioner Intrusion Analyst.
* Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated.
If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do apply, we’d love to hear from you!
Employment Type: Permanent
Location: Hemel Hempstead
Security Clearance Level: Eligible or currently holding Developed Vetting (DV)
Salary: To £58K
Benefits: 25 days annual leave with the choice to buy additional days, health cash plan, life assurance, pension, and generous flexible benefits fund
#J-18808-Ljbffr