SOC Analyst - SC Clearance (Current)
- Employer
- Hays.
- Location
- United Kingdom, City of London
- Salary
- Competitive
- Closing date
- 9 Dec 2020
View more
- Sector
- Consultancy
- Job Role
- Business Development
- Job Type
- Permanent
You need to sign in or create an account to save a job.
VALID AND CURRENT SC CLEARANCE IS NEEDED IN THIS ROLE
Your new company
One of the largest Central Government Organisations in the UK
Your new role
SOC Analyst - SC Cleared
What you'll need to succeed
The position is remote until March 2021 and location will be reviewed after March 2021.
*YOU NEED TO BE SC CLEARED*
My client is looking for a SOC Analyst with existing SC Clearance to join the organisation and support across SOC requirements.
Role Profile:
The client is looking for an experienced SOC Analyst who has recently worked in an established SOC and can bring that knowledge and experience to the client during an exceptionally busy period as the UK enters the next phase of its relationship with the EU.
We are looking for experience in incident investigation, ticket triage and internal SOC processes.
Role Responsibilities:
• Responsible for detection, identification and triage of security incidents. Also responsible for network forensic analysis, root-cause analysis, containment, etc.
• Act upon threat intelligence provided by other teams or our 3rd Party Cyber Incident Response Partner.
• Perform cyber threat hunting for the detection of advanced threats.
• Investigate IOCs provided by suppliers or 3rd party Cyber Incident Response partner.
• Expand, tune, and enhance rulesets (SIEM tooling) - to identify security incidents and reduce false positives.
• Respond to Information Security related queries.
• Lead incident handler for High severity incidents.
• Technical escalation point for our apprentice staff.
• Participate in knowledge exchange with our junior analysts/apprentices to enhance the overall technical skill set of the SOC.
Knowledge and Experience:
• At least one of the following certifications: CISSP/SSCP/CISM, CEH, GSEC, GCIH; Microsoft 365 Certified: Security Administrator Associate.
• Knowledge of hacker methodologies and tactics (TTPs), system vulnerabilities and key indicators of attacks and exploits. Ability to perform host-based and network-based analysis across all major operating systems and network device platforms.
• Working knowledge of security related technologies such as firewalls, WAFs, IDS/IPS systems, SIEM systems, network protocols etc.
• A good understanding of Office 365 email security.
This role can be based in either Reading or Bristol with some travel to the other office required (this will apply once Covid 19 working from home restrictions are relaxed, remote working will continue in the interim).
Candidates must be SC cleared as a minimum
What you'll get in return
This is an excellent role to provide SOC Support across a current and interesting project.
What you need to do now
If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now.
If this job isn't quite right for you but you are looking for a new position, please contact us for a confidential discussion on your career.
Your new company
One of the largest Central Government Organisations in the UK
Your new role
SOC Analyst - SC Cleared
What you'll need to succeed
The position is remote until March 2021 and location will be reviewed after March 2021.
*YOU NEED TO BE SC CLEARED*
My client is looking for a SOC Analyst with existing SC Clearance to join the organisation and support across SOC requirements.
Role Profile:
The client is looking for an experienced SOC Analyst who has recently worked in an established SOC and can bring that knowledge and experience to the client during an exceptionally busy period as the UK enters the next phase of its relationship with the EU.
We are looking for experience in incident investigation, ticket triage and internal SOC processes.
Role Responsibilities:
• Responsible for detection, identification and triage of security incidents. Also responsible for network forensic analysis, root-cause analysis, containment, etc.
• Act upon threat intelligence provided by other teams or our 3rd Party Cyber Incident Response Partner.
• Perform cyber threat hunting for the detection of advanced threats.
• Investigate IOCs provided by suppliers or 3rd party Cyber Incident Response partner.
• Expand, tune, and enhance rulesets (SIEM tooling) - to identify security incidents and reduce false positives.
• Respond to Information Security related queries.
• Lead incident handler for High severity incidents.
• Technical escalation point for our apprentice staff.
• Participate in knowledge exchange with our junior analysts/apprentices to enhance the overall technical skill set of the SOC.
Knowledge and Experience:
• At least one of the following certifications: CISSP/SSCP/CISM, CEH, GSEC, GCIH; Microsoft 365 Certified: Security Administrator Associate.
• Knowledge of hacker methodologies and tactics (TTPs), system vulnerabilities and key indicators of attacks and exploits. Ability to perform host-based and network-based analysis across all major operating systems and network device platforms.
• Working knowledge of security related technologies such as firewalls, WAFs, IDS/IPS systems, SIEM systems, network protocols etc.
• A good understanding of Office 365 email security.
This role can be based in either Reading or Bristol with some travel to the other office required (this will apply once Covid 19 working from home restrictions are relaxed, remote working will continue in the interim).
Candidates must be SC cleared as a minimum
What you'll get in return
This is an excellent role to provide SOC Support across a current and interesting project.
What you need to do now
If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now.
If this job isn't quite right for you but you are looking for a new position, please contact us for a confidential discussion on your career.
You need to sign in or create an account to save a job.
Get job alerts
Create a job alert and receive personalised job recommendations straight to your inbox.
Create alert