Job Reference: BBBH54642
Job Duration:
Start date: ASAP
Description:
Job Title: L2 Cyber Security SOC Analyst
Location: [3 days a week in the office (York or Staines), 2 days a week workingfrom home]. Adhoc meetings in other UK locations
Department: Cyber Security Operations Center (SOC)
Type: Full-time
Salary: £50,000
Reports To: Compute & Security Operations Manager
About the Role:
We are seeking a dedicated andexperienced L2 Cyber Security SOC Analyst to join our dynamic team. The ideal candidate will have a strong background in Microsoft Sentinel and the entire Microsoft XDR Suite (Microsoft Defender for: Endpoint, Office 365, Cloud Apps and Identity). As an L2SOC Analyst, you will play a crucial role in ensuring the security and integrity of our clients' systems and data working withinternal teams and external partners.
You will carry out Microsoft Sentinel and XDR integration & log onboarding, SOAR integration, automation, Threat hunting & analysis, Containment & Eradication tasks as needed.
Key Responsibilities:* Carry out "Prepare tasks: from the NIST SP800-61r2 Incident Response Lifecycle including: SIEM integration, log onboarding/parsing, SOAR Integrations and Automations, configure and Monitor System & Service Health and configure SecOps case management tooling.
* Incident Detection and Response: Monitor, detect, and respond to security incidents using Microsoft Sentinel andMicrosoft XDR Suite tools. Carry out proactive Threat Hunting, Analysis, Contain attacks, and Eradicate where possible using theMXDR tooling.
* Threat Analysis: Perform detailed analysis of potential security incidents, assessing the threat level and potential impact on the organisation.
* Incident Investigation: Conduct in-depth investigations of security incidents, by analysing logs, network traffic, and endpoint data to determine root cause and scope. Provide recommendations and corrective actions to contain, mitigate and eradicate a threat.
* Security Monitoring: Monitor SIEM and MXDR tooling and alerts for suspicious activity, identifying potential security incidents.
* Incident Documentation: track and document incidents and responses throughout the incident response process in the incident management system, ensuring thorough and accurate records to include timelines,actions taken, and resolutions.
* Collaboration: Work closely with other SOC analysts, IT staff, and stakeholders and 3rd parties/partners to coordinate responses to security incidents (e.g. to implement security controls, patch vulnerabilities, and remediate threats.)
* Threat Intelligence: Research and stay updated on latest cyber threat intelligence, vulnerabilities and attack methods, and apply this knowledge to improve detection and response capabilities. Integrate Threat Intelligence Feeds and Implement agreed Detection content strategy.
* Compliance: Ensure adherence to relevant security standards, regulations, and best practices, especially those pertinent to UK government and NHS organisations.
* Mentoring: Provide guidance and mentorship to L1 SOC Analysts, helping to develop their skills and knowledge.
* Process Improvement: Identify opportunities for improvement in SOC processes, tools, and techniques.
Qualifications:
* Education: Associate degree in Computer Science, Information Security, or a related field (or equivalent experience).
* Experience: Minimum of 3-5 years of experience in SecOps rolewith proven experience in using Microsoft Sentinel and the Microsoft Defender XDR Suite, Incident Monitoring, Detection and Response role including proactive investigations and threat hunting.
* Certifications:
Minimum: SC-200: Microsoft Security Operations Analyst
Other Certifications for Microsoft Sentinel, Microsoft MXDR and Azure are desirable
Other related IndustryCertifications from either ISACA, GIAC, EC Council, SANS, CREST or equivalents are desirable relating to security operations, monitoring, incident handling and response.
* Knowledge: Strong understanding of cyber security principles, threat landscape, new threats, vulnerabilities, attack methods and incident response methodologies.
* Skills: Proficient in using SIEM tools, especially Microsoft Sentinel, and familiar with the entire Microsoft XDR Suite. Strong analytical and problem-solving skills.
Mandatory Requirements:
* Excellent spoken and written English with the ability to effectively convey complex technical information to both technical and non-technical stakeholders.
* Communication: Excellent verbal and written communication skills, with the ability to effectively convey complex technical information to both technical and non-technical stakeholders.
* Clearance: ability to obtain and maintain security clearance.
* Shift work: 24 Hour x 7 days a week Shift Pattern
Industry: IT
Salary: £40000 - £50000 per annum
Salary Benefits:
Vacancy Type: Permanent
Job Skills: -
Contact Name: Robbie Adams
Website: -
Direct Application URL: -