SOC Analysts (BBBH37824) Stevenage, England
MERITUS are recruiting for x2 SOC Analysts specialising in Threat Detection to join our client on an initial 12 month contract with very likely extensions (or employment) thereafter.
SOC ANALYST (THREAT DETECTION) - INSIDE IR35 - £650 PER DAY - STEVENAGE - DV CLEARED (CAN START ON SC) - 12 MONTHS - FAST INTERVIEW PROCESS
To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems).
It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies.
KEY RESPONSIBILITIES:
* Effective Tier 1 to 2 alert triage of security events
* Monitoring of Cyber Security tools
* Monitoring the SOC email notification mailboxes
* Assists with the maintenance of our client's Security technologies
* Assisting the SOC Solutions Lead with project activity
* Conduct proactive threat hunting in collaboration with the CTI function
* Conduct HR and InfoSec related investigations
* Ensure the timely triage and remediation of any incident or request tickets raised to the SOC
* Participate in the activity of adding/removing URLs from the AcceptList and BlockList
* Attend routine security meetings
EXPERIENCE REQUIRED:
* A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications.
* Knowledge of IT Security standard methodologies.
* Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
* Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools.
* Hands on experience with IDS/IPS technologies and threat hunting activities.
* Strong analytical experience and mind-set.
* Experience within Defensive Cyber-attack methodologies and frameworks.
* Understanding of Malware capabilities, attack vectors, propagation and impact.
* Good communication skills liaising with the business and suppliers.
#J-18808-Ljbffr