A large enterprise organisation is seeking an experiencedLevel 3 SOC Analyst for an initial 6-month rolling contract. This is a key role within a mature and well-established Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing cybersecurity function.
This is a challenging, rewarding role for a seasoned SOC professional looking to make a tangible impact. Apply now to join a team focused on protecting enterprise assets against evolving cyber threats.
Key Responsibilities:
* Lead investigations and response efforts for high-severity security incidents.
* Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite.
* Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel.
* Perform deep-dive analysis of malware, phishing, and lateral movement techniques.
* Collaborate with engineering teams to optimise Microsoft security tool integrations.
* Maintain and enhance incident response procedures and documentation.
Skills/Must have:
* Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role.
* Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation.
* Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365.
* Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs.
* Solid understanding of Windows, Linux, and core network security principles.
* Skilled in incident response, digital forensics, and proactive threat hunting.
* Experience working with SOAR platforms and building automated workflows.
Benefits:
* View to Extension
Salary:
* Up to £575 Per Day
#J-18808-Ljbffr