Cyber Security Analyst (Tier 2 SOC)

Atrium Workforce Solutions Ltd
Charing Cross, United Kingdom
2 days ago

Role details

Contract type
Contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Compensation
£ 107K

Job location

Charing Cross, United Kingdom

Tech stack

Data analysis
Computer Security
Computer Networks
Intrusion Detection and Prevention
Log Analysis
Security Information and Event Management
Cyber Threat Analysis

Job description

Cyber Security Analyst (Tier 2 SOC)

£412/day Umbrella (Inside IR35) | £300/day PAYE Initial 4-month initial contract (Potential extensions) Client: Global Healthcare Organisation

Atrium EMEA are supporting a global healthcare organisation in their search for a Cyber Security Analyst to join their Security Operations Centre (SOC). This role sits within a 24/7 SOC environment and will focus on the investigation and analysis of security alerts escalated from Tier 1 analysts, alongside supporting incident response and improving detection capabilities.

Key Responsibilities:

  • Perform in-depth analysis and investigation of security alerts and cases escalated from Tier 1
  • Enrich and validate alerts using log analysis, endpoint data, network traffic, and threat intelligence
  • Identify malicious behaviour and determine appropriate remediation actions
  • Escalate confirmed incidents to relevant teams with clear and actionable context
  • Support incident response activities, including evidence collection and containment
  • Assist in tuning detection rules, alerting logic, and SOC playbooks
  • Provide guidance and mentorship to Tier 1 analysts where required
  • Document investigations, findings, and recommended actions clearly and efficiently

Key Requirements:

  • Proven experience within a Security Operations Centre (SOC) environment
  • Strong experience analysing cybersecurity threats and security events
  • Hands-on experience with SIEM tools, endpoint security, and log analysis
  • Ability to investigate alerts end-to-end and determine true positives vs false positives
  • Strong communication and documentation skills
  • Experience working with cross-functional technical teams

Nice to Have:

  • Prior experience working within a healthcare environment

Requirements

  • Proven experience within a Security Operations Centre (SOC) environment
  • Strong experience analysing cybersecurity threats and security events
  • Hands-on experience with SIEM tools, endpoint security, and log analysis
  • Ability to investigate alerts end-to-end and determine true positives vs false positives
  • Strong communication and documentation skills
  • Experience working with cross-functional technical teams

Nice to Have:

  • Prior experience working within a healthcare environment

Benefits & conditions

£412/day Umbrella (Inside IR35) | £300/day PAYE Initial 4-month initial contract (Potential extensions) Client: Global Healthcare Organisation

Apply for this position