L3 SOC Analyst
Meet Our Recruiter
About the Role
We are exclusively partnering with a company that is integral to the UK CNI. Our client has received significant funding from the government and are looking to grow their existing team by 200% by the end of 2026. Your role will report directly in to the SOC Manager, and you will have a significant influence on how the SOC is built and run. The vision for this position is to be the lead escalation point for all incidents and that you lead the IR team too.
Location: West Sussex
On Site Requirement: 5 days during probation, 2-3 days there after
Salary: £75,000 + 7.5% bonus + 10% pension contribution
Responsibilities
- You will lead on all high-severity cyber incident. This will be from initial triage, expediate a containment, eradication and recovery strategy to minimise business impact
- Contribute to the continuous improvement or IR playbooks
- Produce new workflows for automation using SOAR tools
- Advanced Threat Hunting: Hypothesis and IoC based hunting.
- Aid the SOC Manager in developing and creating SOC policies
- Guide L1 and L2, providing guidance and training
- Engage with c-suite level stakeholders across a number of different sections of the business and be able to articulate security lingo to non-technical folks.
- Be comfortable delivering presentations to articulate technical cyber concepts
- Collaborate with internal and 3rd party providers, suppliers and partners
- The most important thing is that you have evidence of advanced threat hunting and IR. This will include leading on P1 IR engagements either as a L2 or L3.
- SOC related certifications are a bonus: SANS GIAC/GCIH/GCIA etc.
- Knowledge of adversarial TTPs and frameworks
- Experience with: Darktrace, Microsoft Defender and Microsoft Sentinel experience an advantage.
- Advantageous: Ran tabletop exercises & have experience with security architecture
If you're excited about the opportunity to contribute towards the safety of UK CNI, please reach out to Gareth Davies @ Trident Search