Our approach to working together means that ASOSers are required to be in the office at least two days per week. This enables stronger collaboration, faster decision-making, and a strong team culture, while still offering the flexibility to work remotely when appropriate. ASOS is recruiting for a skilled SOC Analyst within the SOC team. This role will report into the SOC and IR Manager and be core to reactively protecting ASOS from threat actors, whilst proactively improving the security posture of the organisation. This is a skilled role, requiring an excellent grasp of cloud native technologies with essential skills and technical understanding of a wide range of security technologies such as SIEM, EDR and XDR tools. The role will involve the following: • Be the first point of contact for security events, anomalies, incidents, and investigations • Endpoint monitoring and detailed alert triaging/response • Malware analysis • Alert fatigue initiatives and tuning • Liaising with other teams to promote best practice and foster a shared culture of security responsibility • Maintain awareness of real-world cyber security threats and engage in the innovation of new analytic methods for detecting threats • This role requires rotational on call work out of hours We exist to give our customers the confidence to be whoever they want to be, and that goes for our people too. At ASOS, youre free to be your true self without judgement, and channel your creativity into a platform used by millions. But how are we showing up? Were proud members of Inclusive Companies, are Disability Confident Committed and have signed the Business in the Community Race at Work Charter and we placed 8th in the Inclusive Top 50 Companies Employer list. Everyone needs some help showing up as their best self. Let our Talent team know if you need any adjustments throughout the process in whatever way works best for you. Qualifications Previous experience in SOC Analyst role • Understanding of Information Security principles • Good written and verbal communication skills • Working knowledge detection signatures, Indicators of Compromise (IOCs), and other content to detect malicious activity • Experience in developing processes based on previous investigations to help operations run more efficiently • Committed to continuous learning and professional development