SOC Analyst T3 - 6 months - Inside IR35 - Hybrid
We are seeking a highly experienced SOC L3 Analyst to lead the detection, investigation, and remediation of advanced cyber threats within our Security Operations Center. This role focuses on architecting and optimizing security monitoring solutions, enhancing incident response capabilities, and ensuring seamless integration of security tools such as Splunk, Microsoft Sentinel, CrowdStrike, and Defender. The ideal candidate will drive proactive threat hunting and collaborate with cross-functional teams to strengthen our cybersecurity posture. This position offers a hybrid working model on an initial 6-month contract with strong potential for extensions.
Key Responsibilities:
* Lead investigations into advanced security threats, such as APTs, malware, and data breaches.
* Conduct proactive threat hunting using SIEM, EDR, and threat intelligence data.
* Perform forensic investigations to determine the scope and root cause of incidents.
* Develop and implement incident containment and recovery strategies.
What you Will Ideally Bring:
* Expertise in SIEM tools (e.g., Splunk, Microsoft Sentinel) and EDR solutions (e.g., CrowdStrike, Defender).
* Strong knowledge of malware analysis, digital forensics, and root cause analysis.
* Ability to leverage threat intelligence platforms to detect and respond to evolving cyber threats.
Contract Details:
* Duration: 6 months
* Location: Hybrid/3 days a week in Reading
* Day Rate: Up to GBP500 per day - (Inside IR35)
#J-18808-Ljbffr