SOC Analyst

DCV Technologies Limited
Charing Cross, United Kingdom
5 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English

Job location

Charing Cross, United Kingdom

Tech stack

Microsoft Windows
Computer Security
Linux
Digital Forensics
Intrusion Detection and Prevention
Security Information and Event Management
Malware
Cybercrime
3-tier Architectures
Splunk

Job description

We're recruiting an experienced SOC L2 Analyst / Tier 2 Security Analyst to join a high-performing Security Operations Centre (SOC) environment, supporting the investigation, response and remediation of complex cyber security incidents.

This is a hands-on role focused on incident response, threat detection and forensic investigation, working with enterprise-scale security tooling and collaborating closely with Tier 1, Tier 3 and wider IT teams.

Key Responsibilities

  • Investigate and respond to Tier 2 security incidents, including malware, ransomware, data breaches and APTs

  • Analyse alerts using SIEM tools (Splunk) and EDR platforms (Microsoft Defender)

  • Perform incident forensics, root cause analysis and impact assessments

  • Own escalations from SOC L1 and provide technical guidance and quality assurance

  • Support containment, eradication and recovery activities

  • Produce clear incident reports and technical documentation

  • Contribute to detection improvement, playbooks and post-incident reviews

Requirements

  • Proven experience as a SOC Analyst L2 / Tier 2 / Incident Response Analyst

  • Strong hands-on experience with Splunk or other SIEM platforms

  • Experience with EDR / endpoint detection tools (Defender preferred)

  • Solid understanding of incident response, threat hunting and security investigations

  • Knowledge of Windows, Linux and enterprise environments

  • Ability to work under pressure in a SOC environment

Desirable

  • Cyber security certifications (GIAC, GCIH, GCIA, GCFA, CISSP)

  • Digital forensics or malware analysis experience

This role suits someone who enjoys owning incidents end-to-end rather than monitoring alerts.

Apply for this position