Overview
SOC Analyst (Outside IR35) • 12 Month Contract • Full time on site in Birmingham • £375 - £475 Outside IR35 (Depending on experience) • Requires an active DV Clearance
Role Summary
Support the client's Security Operations Centre (SOC) with hands-on Splunk SIEM expertise, threat detection, incident response, and continuous improvement of security operations.
Responsibilities
* Operate and tune Splunk SIEM: detection logic, correlation rules, dashboards, playbooks
* Triage alerts and manage incidents through resolution
* Aggregate and correlate logs from multiple sources
* Conduct threat hunting and integrate threat intelligence
* Maintain documentation and contribute to SOC knowledge base
* Support continuous improvement and R&D initiatives
Required Skills & Experience
* Strong Splunk SIEM experience (content creation, tuning, reporting)
* Live SOC environment experience
* Knowledge of OS (Windows, Linux, OSX), firewalls, IDS/IPS, networking
* Familiarity with NIST, ISO 27001, MITRE ATT&CK, CIS frameworks
* Threat analysis, detection engineering, vulnerability tools
* Stakeholder engagement and incident/crisis management
Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 18 weeks.
#J-18808-Ljbffr