T2 SOC Analyst
Role details
Job location
Tech stack
Job description
Another fantastic opportunity has opened for an experienced SOC Analyst to join a UK-based Managed Security Service Provider as a Tier 2 SOC Analyst, supporting one of their key clients.
This is a fully remote role operating Monday to Friday, 9am-5:30pm, with no night shifts required. As part of this team, you will work alongside Tier 1 and Tier 3 Analysts, as well as a SOC Lead, to deliver continuous security monitoring, analysis, and incident response for the client.
This is an excellent opportunity for a current Tier 2 SOC Analyst looking for their next challenge, or for an experienced Tier 1 Analyst ready to step up into a Tier 2 role.
Key Responsibilites:
- Monitor, assess, and investigate security alerts using security monitoring tools in line with agreed procedures and SLAs.
- Classify and prioritise potential incidents according to SOC processes and recognised industry frameworks.
- Produce clear and concise incident tickets, drawing on internal knowledge bases and independent analysis.
- Apply relevant threat intelligence to SOC operations, maintaining awareness of current threat trends and defensive monitoring approaches.
- Carry out proactive threat hunting to uncover advanced or hidden threats.
- Assist with the development and optimisation of detection rules and monitoring capabilities.
- Provide guidance and support to Junior Analysts when required.
Requirements
- Active or eligible for SC Clearance
- Experience in a SOC environment
- Certifications such as CompTIA A+, S+, N+, SC-200, CySa+
- In-depth knowledge of common security threats, attack vectors, and migration stategies
- In-depth knowledge and experience with SIEM, EDR/ERP, AV, and NetMon tools