Leave us your email address and we'll send you all the new jobs according to your preferences.
Lead SOC Analyst-SC/DV-nr Glasglow-12mths - up to 653pday Umbrella
Posted 10 hours ago by SmartSourcing Ltd
£653 Daily
Contract
Not Specified
Other
Lanarkshire, East Kilbride, United Kingdom, G74 1
Job Description
Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared, required by our government services client at their East Kilbride, Glasgow base.
Paying 653 per day - Umbrella Company
Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake.
The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays.
To start in the New Year
Skills and Experience Required:
Experience of SPLUNK with in a Security Operations Centre (SOC).
A bachelor's degree in computer science, Cyber Security or relevant experience
You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques.
Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role
Key Responsibilities
Continuous Monitoring
You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes.
Incident Triage
You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents.
Initial Incident Response
For confirmed incidents, youll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation.
Reporting and Documentation
You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis.
Managing
You'll provide direction and support to the junior member of the shift and provide handover to the next shift leader.
Tool Management
You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively.
Please apply on line in the first instance
SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.
Paying 653 per day - Umbrella Company
Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake.
The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays.
To start in the New Year
Skills and Experience Required:
Experience of SPLUNK with in a Security Operations Centre (SOC).
A bachelor's degree in computer science, Cyber Security or relevant experience
You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques.
Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role
Key Responsibilities
Continuous Monitoring
You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes.
Incident Triage
You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents.
Initial Incident Response
For confirmed incidents, youll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation.
Reporting and Documentation
You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis.
Managing
You'll provide direction and support to the junior member of the shift and provide handover to the next shift leader.
Tool Management
You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively.
Please apply on line in the first instance
SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.
