SOC Analyst
Role details
Job location
Tech stack
Job description
We're expanding our Security Operations Centre in Farnborough and looking for sharp, collaborative L2 SOC Analysts to protect enterprise-scale environments across the Defence sector. You'll investigate real threats, tune detections, and make measurable impact-using Microsoft Sentinel, Splunk, and MISP.
Your work fuels national security. Your growth fuels our mission.
Role based on site in our Farnborough office and is shift work. 2 x 6am to 6pm, 2 x 6pm to 6am, 4 days off.
You do need to be eligible for DV Clearance for this role, and cannot start until your clearance is through.
What you'll be doing:
- Monitor, analyse security alerts and events, conduct initial investigations, and determine the appropriate response.
- Raise complex incidents to Senior Analysts.
- Manage SOC Incident queues.
- Support the maintenance of monitored asset baselines of the customer environments.
- Prepare reports for managed clients to both technical and non-technical audiences,
- Collaborate on improving detection rules and use cases aligned with Mitre Att&ck and threat-informed defense.
- Participate in a team effort to guarantee that corporate data and technology platform components are shielded from known threats.
- Collaborate with team members to maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies.
- Aid the development and use of threat intelligence throughout the service.
- Ability to work shifts from our office in Farnborough.
Requirements
- Experience demonstrated in Security Operations Centre.
- Experience using Microsoft Sentinel and Splunk.
- Knowledge and experience with Mitre Att&ck Framework.
- Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products.
- Understanding of networking principles including TCP/IP, WANs, LANs and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP.
- Entry level cyber security certification (e.g. CompTIA Security+, CEH, CPSA).
- CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications.
- Completed an academic module in cyber security or a related subject
It would be great if you had:
- Programming and scripting such as Python, Perl, Bash, PowerShell, C++.
- CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications.
- Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar.