Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared
Required by our government services client in their East Kilbride, Glasgow base.
Paying GBP610 per day inside IR35 – Umbrella Company
Working in a DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake.
The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays.
To start in the New Year
Skills and Experience Required
* Experience of SPLUNK in a Security Operations Centre (SOC)
* A bachelor's degree in computer science, Cyber Security or relevant experience
* Foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber–attack techniques
* Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification (significant bonus)
Key Responsibilities
* Continuous Monitoring: monitor security tools, including SIEM systems, to detect suspicious activity; respond efficiently according to defined processes.
* Incident Triage: analyze alerts and logs to determine genuine incidents or false positives; classify and prioritize following established procedures.
* Initial Incident Response: for confirmed incidents, perform initial containment actions (e.g., isolate affected systems) and echo to Level 2 or 3 analyst.
* Reporting and Documentation: create detailed tickets and reports for all detected incidents, documenting findings and steps taken.
* Tool Management: assist in maintenance and optimization of security tools, ensuring they are working correctly and effectively.
Please apply online in the first instance.
SmartSourcing is a Disability Confident Employer and we promote, celebrate and value diversity. We are committed to promoting equality and inclusion for all.
#J-18808-Ljbffr