Team Leader SOC Analyst Based on site in Birmingham Monday - Friday (9-5) Outside IR35 The ideal candidate must hold an active security clearance (SC) due to the time scale of the project The candidate will need to have worked in a SOC, perform Tier 3 functions and be an overall Manager for all the shifts. What's in Store for You: Cutting-Edge Technological Playground: Delve into LogRhythm, Splunk, Darktrace (Threat Visualizer), and FireEye (EX, NX, HX, CMS) - platforms where your expertise shines brightest. Mastering Networks: Navigate the OSI Reference Model and engage with various network communication protocols with finesse. Unleash Action: Dive deep into incident response, log analysis, and PCAP analysis - your canvas for showcasing cybersecurity excellence. Digital Sleuth: Investigate Windows/Linux systems, uncovering signs of compromise with your digital magnifying glass. Communication Virtuoso: Translate cybersecurity risks into language that resonates with business objectives. Incident Commander: Lead security incidents with strategic finesse, providing user-centric updates along the way. Guardian of Cyber Realms: Implement Defensive Cyber-attack methodologies and frameworks, safeguarding digital territories with your toolkit. Scripting Expertise: Elevate your game with foundational scripting knowledge, adding an extra layer of brilliance to your arsenal. SOC Mastery: Your journey through Security Operations Centres or as a security analyst equips you to handle incidents across a spectrum of tools. Why Choose Us? Continuous Learning Environment: Elevate your skills in an ecosystem that thrives on constant growth and development. Talented Team Collaboration: Work alongside a diverse and highly skilled cohort, fostering innovation and creativity. Cutting-Edge Challenges: Tackle the latest security challenges head-on, equipped with the most advanced technology available