L1 SOC Analyst
Salary/Rate:£36,500
Job type:Permanent
Town/City:United Kingdom
County/State/Region:United Kingdom
Job ref:1067985
Post Date:13.11.24
Scroll
Meet Our Recruiter
About the Role
Trident Search have exclusively partnered with Wavenet, a award winning MSSP who have acquired a number of consultancies in recent years, making it one of the largest consultancies that offer offensive and defensive security services.
Work fully remote as a L1 SOC Analyst – this isn’t your typical L1 where you'll go through the motions as a “ticket monkey”. You will be fully emerged in the investigation, and you’ll work with your seniors through to remediation.
The 2 shift patterns you'll work: 7am-7pm, 7pm-7am.
Responsibilities
• Continuous monitoring of MS tooling: Sentinel and Defender included. You will also get access to Darktrace, Crowdstrike and a bit of Elastic
• Proactive threat hunting, utilizing KQL
• Risk remediation and mitigation through technical controls within the stack mentioned above
• Proactive security assessments - Phishing campaigns, SSO, etc..
Experience:
• We’re looking for a minimum of 6-12 months experience as a SOC analyst
• Sentinel experience is mandatory, if you can bring experience across Defender, Crowdstrike and Darktrace – that’d be a huge bonus.
• Basic KQL query ability – greedy searches, filtering etc.
• Experience of deploying, managing, and supporting of endpoint security
platforms
• Ability to standardize processes for efficiency and productivity, leveraging
automation where applicable/possible
Bonus:
• Industry certs SC100, SC200 etc.
• Powershell experienc
Work fully remote as a L1 SOC Analyst – this isn’t your typical L1 where you'll go through the motions as a “ticket monkey”. You will be fully emerged in the investigation, and you’ll work with your seniors through to remediation.
The 2 shift patterns you'll work: 7am-7pm, 7pm-7am.
Responsibilities
• Continuous monitoring of MS tooling: Sentinel and Defender included. You will also get access to Darktrace, Crowdstrike and a bit of Elastic
• Proactive threat hunting, utilizing KQL
• Risk remediation and mitigation through technical controls within the stack mentioned above
• Proactive security assessments - Phishing campaigns, SSO, etc..
Experience:
• We’re looking for a minimum of 6-12 months experience as a SOC analyst
• Sentinel experience is mandatory, if you can bring experience across Defender, Crowdstrike and Darktrace – that’d be a huge bonus.
• Basic KQL query ability – greedy searches, filtering etc.
• Experience of deploying, managing, and supporting of endpoint security
platforms
• Ability to standardize processes for efficiency and productivity, leveraging
automation where applicable/possible
Bonus:
• Industry certs SC100, SC200 etc.
• Powershell experienc