SOC Analyst

Ref No. BHN531082
Benefits shift allowance
Location Farnborough, England
Job type Permanent
Job Status Open

Introduction

We are currently working with a Defence and Aviation Engineering company who have a global presence. They are looking for SOC Analysts to join their established global Cyber Defence team.

Important

SOC Analyst, Cyber Defence Analyst, Splunk

The Job


We are currently working with a Defence and Aviation Engineering company who have a global presence. They are looking for SOC Analysts to join their established global Cyber Defence team.


Due to continued expansion and new business wins they require a Cyber Defence Analyst to join their large, established SOC team. The successful candidate will be able to demonstrate a minimum of 1-3 years' experience from a Cyber Security Operations Centre (CSOC) background or be able to demonstrate sufficient transferable IT Security skills and experience to quickly learn the Cyber Defence Analyst role.

To succeed in the role the candidate must be capable of working under pressure, delivering on multiple client accounts and have an appetite to progress and develop their own career. The role will primarily be working within a CSOC based out of Farnborough. Due to the nature of the work being secret, this role is office based.


Essential

  • Candidates must be eligible for SC clearance
  • Candidate must be British and non-dual national.
  • Shift patterns including nights which is compensated by a healthy shift allowance on top of the base salary.
  • Location is working on-site at Farnborough although Glasgow is also an option.
  • Ideally have some experience using Splunk whether that is theoretical or in practise.


Responsibilities in this role

  • Maintain the integrity and security of Cyber systems and networks.
  • Supports Cyber Security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
  • Uses data collected from cyber defence tools firewalls, IDS, network traffic, Security Orchestration and Automated Response (SOAR) etc. to analyse events that occur within the environments or based on the artefacts.
  • Employs network forensics techniques for attack reconstruction.
  • Respond to and correlate alerts from various detective and preventative Cyber Security tools such as Security Information Event Monitoring (SIEM), End Point Protection (EPP), End Point Detection and Response (EDR), Web Application Firewall (WAF) and Firewalls.
  • Proactively detect suspicious activity, vulnerabilities and security misconfigurations before they can be exploited by bad actors to impact Confidentiality, Integrity and Availability which could lead to a Cyber Security Incident.
  • Inspection and correlation of logs from multiple sources to identify repeating patterns and Indicators of Compromise (IOC).
  • Continuously scan the Threat Horizon to report and classify Threats according to impact which could potentially damage a client's network or solution.
  • Engage with various security communities to review and share knowledge on IoC's and Threats
  • Part of a Team who may be required to work shifts in order to deliver a 24 x 7 CSOC capability to detect and respond to suspicious activity or alerts.
  • Concisely and with detail record the events of a Cyber Security Incident and their own actions to deliver an effective handover during shift changes.
  • Continuously improve CSOC processes and procedures.
  • Work closely with stakeholders from other Technology stacks to contribute to the Cyber Security Incident Response
  • As part of a team perform table top scenarios and produce lessons learnt documents.

For the reasons mentioned above, no VISA sponsorship is offered.

If you would like to learn more, please get in touch:

james.campbell- | 07528763202

 

Related jobs

 

Related articles

Back to top