Enable job alerts via email!

Soc Analyst - Tier 1

Henderson Scott UK

Scotland

On-site

GBP 30,000 - 60,000

21 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player in cybersecurity is seeking a dedicated Cyber Security Analyst to join their Cyber Threat Analysis Centre. This pivotal role involves monitoring and analyzing security events around the clock, utilizing advanced SIEM solutions and Kusto Query Language for effective log analysis. As the first line of defense, you will validate and classify potential threats while managing incidents through various ticketing systems. This is an excellent opportunity for individuals passionate about cybersecurity to develop their skills in a dynamic and supportive SOC environment, contributing to the safety and security of critical information systems.

Qualifications

  • Candidates require current SC or DV security clearance.
  • Understanding of networking concepts and basic network protocols.

Responsibilities

  • Monitor security events 24/7, detect threats, and escalate incidents.
  • Act as the first line of defence, validating and classifying threats.

Skills

Networking Concepts

IP Addressing

Basic Network Protocols

Windows & Linux Environments

SIEM Monitoring

KQL Queries

XDR Platforms

OSINT Techniques

Communication Skills

Tools

SIEM Solutions

Ticketing Systems

Job description

Cyber Security Analyst (SOC)
Shift Pattern - 24/7 coverage 4 days on 4 days off
Competitive salary with a 30% shift allowance and excellent benefits.

Candidates require current SC or DV security clearance.

Our client is looking to add talented Cyber Security Analyst (Tier 1) to support our Cyber Threat Analysis Centre (CTAC). This role is crucial in triaging, monitoring, and reporting potential cyber threats. Working under senior analysts, the Tier 1 Analyst will utilise SIEM solutions and Kusto Query Language (KQL) for log analysis, while managing incidents via multiple ticketing systems to meet service level objectives.

Key Responsibilities:
  • Monitor & Analyse: Review security events 24/7/365, detect threats, and escalate incidents.
  • Incident Response: Act as the first line of defence, validating and classifying threats.
  • Ticket Management: Document and track incidents for seamless shift handovers.
  • Collaboration: Work closely with senior analysts for complex investigations and service updates.
  • Process Improvement: Follow and refine workflows for enhanced efficiency.
  • Technical Development: Gain expertise in security event analysis across network traffic, host logs, and other data sources.
  • Leadership (when required): Lead shifts in the absence of a Tier 2 Analyst.
Skills & Experience:
  • Understanding of networking concepts, IP addressing, and basic network protocols.
  • Basic knowledge of Windows & Linux environments.
  • Competence in SIEM monitoring, KQL queries, and XDR platforms.
  • Familiarity with OSINT techniques for threat intelligence.
  • Strong communication skills for clear reporting and stakeholder engagement.

If you're passionate about cybersecurity and eager to develop in a dynamic SOC environment, apply today!

Seniority Level

Executive

Employment Type

Full-time

Job Function

Information Technology

Industries

Information Services

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Level 3 SOC Analyst

Only for registered members

Remote

GBP 40,000 - 60,000

30+ days ago