This job is no longer available.
You can view related vacancies or set-up an email alert notification when similar jobs are added to the website using the buttons below.

SOC Analyst

30/10/18_1540888254
Up to £45000 per annum

Managing this Role

image

Charlee Ryman

Associate Consultant - Cyber Specialist 0207 759 7878

Spending seven years in the Royal Navy as a warfare technician, Charlee uses his comprehensive military network and his deep technical expertise to quickly pinpoint the best cyber security professionals for leading employers of all shapes and sizes.

 

Roles recruited: SOC managers/analysts and cyber security analysts/consultants

Seniority: Junior-Senior

Job Type: Permanent

Geographical coverage: London

Market: Cyber security operations within MSSPs

My client provides an elite threat detection capability to a large array of clients using the latest tooling to help detect and respond to the latest threats. Using these tools provides my client with the capability to detect both internal and external threats.

This is your chance to provide an elite threat detection service to a broad spectrum of clients, whilst due to the rapid growth of my client you will be exposing yourself to a level of career progression that is hard to match.

The Role

As a Cyber Security Analyst you will have the ability to monitor the networks for threats and report your findings to all audiences.

You will be expected to monitor the client's assets and environments using our high end security tools. Identifying, analysing and alerting the client's to existing and emerging threat actors, the following will be the main focus of the role:

  • Perform detailed network analysis to identify potential threat actors.
  • Create clear, concise and analytical reports on threats.
  • Keep on top of current threats and informing Clients of the risk.

Key Skills

You will need to be a quick thinker who can quickly analyze threats and the impact they will have. You will have the ability to think of ways to prevent the future attacks and to be one step ahead of the threat at all times.

  • Knowledge of current Cyber Threats.
  • Understanding of typical malware functionality and capabilities.
  • Understanding of tools used with Blue Teams.
  • Packet Capture experience.
  • Familiarity with typical security technologies such as firewalls and SIEM tools.
  • An understanding of large scale networking technologies.
  • Windows and Linux exposure.
  • Scripting exposure - Python and Bash.

If you can demonstrate that you have the knowledge of current Cyber Threats, and the ability to discuss Cyber Security concepts revolving around Network IDS and malware then apply now to be apart of this professional team!

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.


This job has now been filled but you may be interested in:

 

Incident Response Team Lead

Incident Response Team Lead - London

We have partnered with a global Cyber Security Consultancy who are currently looking for an Incident Response Team Leader to compliment an already world class Incident Response team. This team respond to and contain security incidents for their clients with a particular focus on advanced targeted attacks.

Responsibilities

As a Team Lead you will focus on strategic initiatives and operational management to deliver sustainable capability improvement over time. Your key focus areas are innovation and optimisation of our services; development of junior team members; and coordination and integration with global teams.

While the role is predominantly managerial, for effectiveness it requires a strong technical background in Incident Response, and the Team Lead will be expected to be able to demonstrate experience dealing with many different types of compromises in different environments, including advanced nation state attacks.

Requirements

A deep understanding of the motivations and methods adopted by a range of threat actors with an understanding of how exploitation of systems occurs is essential. You will have experience in examining data from various sources including network traffic, volatile memory, host data, log files and other sources of information.

  • Significant industry experience as part of a CSIRT, Security Operations or Investigations team in a data regulated and mission-critical environment.
  • Experience responding to and containing live security incidents such as crimeware, data breaches and advanced targeted attacks following a standard incident handling lifecycle.
  • Solid understanding of technical and security domains fundamental to investigations and incident response, including:
    • Client-server infrastructures, security architectures and related logging and alerting
    • TCP/IP networking with the ability to perform deep-dive network forensic analysis
    • File-system analysis including FAT, NTFS, HFS and/or EXT2/3/4 and ability to find and extract common disk-based indicators of compromise
    • Windows, Linux and/or OS X internals with emphasis on memory structures and ability to find common memory-based indicators of compromise
    • Malware analysis activities using behavioural techniques. Ability to perform dynamic and static analysis is an advantage
  • Ability to report key findings in a clear and concise manner both at technical and senior management level.
  • Vendor independent qualifications in Incident Response and Forensics such as SANS and CREST.

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.

SOC Analyst

Do you want to work with a team of experienced Network and Information Security Engineers? Are you ready to put your skills to the test whilst working for an incredibly successful MSSP who advise clients on Cyber Security on a Global scale?

You will be comfortable with working within a SOC and carrying out your normal routine of providing security analysis of customer security events using SIEM tools to monitor and manage systems, whilst assisting in vulnerability management for a portfolio of blue-chip and mid-market customers. You will also have a great work ethic and be willing to go the extra mile.

Whilst working in a 24/7 shift rotation pattern you will be interfacing with a varied array of personnel from infrastructure teams to Heads of operations. Travel to Client sites may also be required depending on work undertaken.

This role requires the following operational skills:

  • Good understanding of Network Security.
  • Ability to provide relevant and timely analysis and recommendations to customers based on analysis of events from a SIEM platform.
  • Customer-facing, with good report-writing skills and strong communication skills at all levels.
  • Ability to provide technical and service leadership to L1 and other L2 analysts. Be a thought leader in the SOC.
  • Ability to consistently deliver to deadlines while prioritising competing demands for time, without sacrificing quality.
  • Professional, hard-working and have the ability to pay attention to detail.
  • Good understanding of ITIL processes, including Change Management, Incident Management and Problem Management.
  • Willingness to share information, improve documentation, and train other analysts.
  • Ability to work on shift rotation

Additional Skill set:

  • Analysis of alerts arising from Security Event and Information Management tools, ideally based on HP ArcSight.
  • Vulnerability Scanning and reporting ideally based on Qualys. Prioritising and tracking remediation of vulnerabilities.
  • Experience of network-based User Behaviour Analytics (DarkTrace, ArcSight User Behaviour Analytics etc) advantageous but not essential.
  • Experience of packet-capture tools and analysis of packet flows advantageous but not essential.
  • Experience of security assessment and penetration testing tools advantageous but not essential.
  • Knowledge of Threat Intelligence Services advantageous but not essential.
  • Experience working with service providers and network management platforms (SolarWinds).
  • Microsoft data manipulation.

If you feel you are the right person for this role and you are ready to engage with a varied array of clients and test your skill set whilst working for this MSSP then get in touch now.

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.