Senior Security Operations Analyst x3
Contract Duration: 6 month contract
Salary: To £525 a day
Location: Hybrid (remote + site 5-6 days a month) in Manchester, Birmingham or Maidenhead
High Level Overview:
We are looking for 3x Microsoft Security advanced L2 SOC Analysts, or L3 SOC Analysts, to review security incidents occurring in customers' environments, alerting them to malicious activities, and working with them to investigate and remediate the incidents to resolution. SC Level Security clearance will be provided (5 years minimum in the UK only to pass clearance).
The Company:
You will work for one of Microsoft UK's deepest embedded partners in their Managed XDR Security Operations Center (SOC) team. They deliver Microsoft security services and solutions to enterprise customers across Commercial, Public Sector, Government, and Microsoft fronted critical national infrastructure, focusing on Microsoft XDR SOC services for Sentinel, Defender, and more!
They are a Microsoft Security Solutions Partner with multiple Microsoft Advanced specializations, including all security designations, and have a Microsoft certified MXDR SOC. As a member of the Microsoft Intelligent Security Association (MISA), they are one of the biggest names in IT Services in the UK with a multi-award winning culture built around the values of its people.
The Role:
As a Senior level SOC analyst/incident response expert in the Microsoft Security operations team, you'll be responsible for:
1. Monitoring for security alerts from Security Platforms, primarily Microsoft Sentinel/Defender, providing advanced second line security incident management and analysis to customers through effective monitoring, reporting, and technical guidance for successful resolution.
2. Maintaining high levels of ownership through the security incident lifecycle.
3. Documenting and managing cases to utilize information for customer reports, providing insight and intelligent recommendations.
4. Interfacing with customers to resolve issues, provide additional information, and answer questions related to incidents and monitoring.
5. Maintaining high quality security incident resolution and performance adherence.
6. Identifying and reporting tuning and automation opportunities.
Ideally, you will have:
1. Experience working in a Microsoft MDR/XDR SOC.
2. Preferably MSSP environment experience, although experience in a busy end customer SOC environment will also be considered.
3. The ability to dynamically assess risks, threats & threat actors for new and existing customers.
4. KQL (Kusto Query Language) experience.
5. Cyber qualifications such as the Microsoft SC-200 or related certs.
6. Previous experience with SIEM tools including Microsoft Sentinel and Defender.
7. Familiarity with cyber security concepts and their application in different business environments.
8. Detail oriented, with excellent communication skills and the ability to take a structured approach to procedures and working instructions for incident response/resolution.
#J-18808-Ljbffr