This job is no longer available.
You can view related vacancies or set-up an email alert notification when similar jobs are added to the website using the buttons below.

SOC Analyst - £45k-£50k - London

jk0407_1530715118
£45000 - £55000 per annum

Managing this Role

image

Josh Keeley

Manager - Cyber Specialist 0207 759 7878

With six years’ experience as an IT engineer within the Royal Marines, Josh has a strong network of ex-services CTI analysts and CCTIM qualified managers. Bringing sound technical knowledge and in-depth market expertise, Josh works with consultancies, defence, MSSPs and TIPs; from rapidly-growing start-ups to established global enterprises.

 

Roles recruited: CTI analysts, CCTIM managers

Seniority: Junior-Senior

Job Type: Permanent

Geographical coverage: London

Market: Cyber threat intelligence, TIP’s and Professional Services

Blackthorn Trace are working with a managed service security provider looking to hire an experienced SOC Analyst to work within a small but rapidly growing team of Analysts.

With an entrepreneurial mind set, you will bring with you key attributes that help the whole business continue to grow and become a key leader in safeguarding the SME market.

This is a green field opportunity working with the Director and Team Leader to assist in developing and maturing the operational capabilities of a SOC, with ongoing mentoring, training and development opportunities.

The Job

  • Provide first, second and third line technical resolution for security alerts and SOC service requests.
  • Manage alerts and incidents through the incident lifecycle within the ticketing system.
  • Interface with clients in incident identification, remediation and resolution.
  • Resolve or escalate identified incidents.
  • Provide a timely and efficient service to customers.
  • Stay abreast of current vulnerabilities, exploits and threat actors.
  • Assist in on boarding and configuring new customers.
  • Be comfortable working within a 24x7 environment.
  • Write white papers and thought leadership blogs on current security events - become a thought leader

Skills/Qualifications

  • Understanding of TCP/IP, network protocols and information security is essential.
  • Understanding of and experience of using Linux is essential.
  • Understanding of attacker tools, tactics and procedures is essential.
  • 24x7 NOC/SOC experience, experience of working for a MSSP is highly desirable.
  • Programming / shell scripting experience is highly desirable.
  • Knowledge of configuring and implementing technical security controls (firewalls, IDS, AV) desirable.
  • SANS courses such as 511, 503, 501, 504, 506, 401 preferred.

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.


This job has now been filled but you may be interested in:

 

Cyber Threat Analyst

Blackthorn Trace have partnered with a global leading financial services industry who are building a Cyber Threat team across the UK, US and Canada. With the financial services industry constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, my client is adding a Cyber Threat Center associate, charged with ensuring all equities are secure against all tiers of adversaries. 

You will work within the central hub for Computer Operations and be on the front lines of security incident response, threat hunting, and intelligence. Hours - 6am – 2.30pm, 2 days per week from home.

Responsibilities

  • Act a senior member of the Cyber Threat Center who handles security events and incidents on a daily basis in a fast-paced environment.
  • Acts as an Incident Handler who can handle minor and major security incidents within the defined Computer Security Incident Response process.
  • Role embodies Cyber Network Defense and a successful Cyber Threat Analyst will be able to quickly analyze threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm.
  • Maintains situational awareness for cyber threats across the global firm and take action where necessary.
  • Countermeasure deployment across various technologies.
  • Malware and exploit analysis.
  • Assessing alerts and notifications of event activity from intrusion detection systems and responding accordingly to the threat.
  • Continuing content development of threat detection and prevention systems.

 

Experience and Skills

  • Systems administrator experience in Linux, Unix, Windows or OSX operating systems.
  • Knowledge of networking and the common network protocols.
  • Demonstrated ability to create scripts, develop tools, or automate processes
  • Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis.
  • Demonstrated ability to perform static and dynamic malware analysis.
  • Demonstrated ability to analyze large data sets and identify anomalies.
  • Demonstrated ability to quickly create and deploy countermeasures under pressure.
  • Familiarity with NIST framework for incident handling.
  • Understand OSINT techniques.
  • Experience leading and managing IR investigations.

 

One or more of the following certifications or the ability to obtain within 1 year:

  • CISSP: Certified Information Systems Security Professional
  • CCNA: Cisco Certified Network Associate
  • SANS: GCIH – Incident Handler
  • SANS: GCIA – Intrusion Analyst
  • CREST: Certified Incident Manager