SOC Analyst required for this Cyber Attack / Threat team. This is a Level 1 / Level 2 SOC Analyst role .... Serving as the Tier 1 function, being responsible for investigating cyber events and advising on escalating to incident response and mitigation teams. The role is officially based in the City of London but is 100% remote working.
£450 - 550 per day Inside of IR35
6 months ++
The SOC Analyst will play a key role in the Group's response to cyber-attacks.
You will:
Monitor the Group's computer systems' for suspicious activity using enterprise grade cyber tools and critical thought. Leveraging multiple data sources to analyse detection alerts and staff reported cyber incidents to identify which events require response activities.
Triage and manage all sorts of incidents, events and queries from the business to the relevant resolver group.
Maintain event response documentation, participate in post-mortems, and write event reports.
Identify potential new detection logic and escalate to the Detection and Response Engineering team. Along with identifying and recording gaps in visibility and security posture through the course of investigations.
You will have experience with:
TCP/IP networking and services such as DNC, SMTP, DHCP, etc.
Experience with OSX, Windows and Linux operating systems.
Experience in incident management, with a strong emphasis on comprehensive documentation, integrity and accountability.
Knowledge of enterprise systems, infrastructure and security controls.
Prior experience in a security operations centre is highly valued.
Proficiency or a strong interest in the use of SIEM tools, e.g. Splunk...