Cyber Security SOC Analyst
Location: Remote (you must be based near London, Leeds, Manchester, or Gloucester)
Salary: Up to £42,000 DOE + £7,000 bonus
Clearance: You must be eligible for DV clearance.
Our client is enhancing their cyber security team and is seeking a skilled SOC Analyst to play a crucial role in identifying and investigating complex threats in a vast operational environment. This position is a standard Monday to Friday role with no shift work.
We're looking for a candidate with a minimum of one year of commercial SOC experience, who is adept at using Microsoft Sentinel, and has the ability to write, refine, and analyze KQL queries for detection, investigation, and threat-hunting purposes.
Key Responsibilities
• Monitor and evaluate security events to detect threats, attacks, and suspicious behavior.
• Conduct comprehensive triage and investigation of alerts.
• Utilize KQL in Microsoft Sentinel to create analytics, detection rules, and perform hunts for indicators of compromise.
• Contribute to SIEM/SOAR playbooks and enhance detection capabilities.
• Document incidents, tactics, techniques, and procedures (TTPs), and root cause analyses.
• Collaborate with internal and external stakeholders during investigations.
• Assist in continuous improvement initiatives for threat awareness and team proficiency.
Required Qualifications
• 12+ months of commercial SOC experience.
• Significant experience with Microsoft Sentinel.
• Proficiency in using KQL for detection rules or threat-hunting.
• Understanding of intrusion analysis, particularly in Windows and Azure environments.
• Solid knowledge of MITRE ATT&CK, networking, and fundamental security principles.
• A quick learner, able to adapt to new tools, techniques, and attacker behaviors efficiently.
If you possess hands-on experience with Sentinel and KQL and are seeking a role that allows you to enhance your threat detection skills without the commitment of shift work, we encourage you to apply.