A large enterprise organisation is seeking an experiencedLevel 3 SOC Analyst for an initial 6-month rolling contract. This is a key role within a mature and well-established Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing cybersecurity function.
This is a challenging, rewarding role for a seasoned SOC professional looking to make a tangible impact. Apply now to join a team focused on protecting enterprise assets against evolving cyber threats.
Key Responsibilities:
 * Lead investigations and response efforts for high-severity security incidents.
 * Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite.
 * Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel.
 * Perform deep-dive analysis of malware, phishing, and lateral movement techniques.
 * Collaborate with engineering teams to optimise Microsoft security tool integrations.
 * Maintain and enhance incident response procedures and documentation.
Skills/Must have:
 * Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role.
 * Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation.
 * Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365.
 * Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs.
 * Solid understanding of Windows, Linux, and core network security principles.
 * Skilled in incident response, digital forensics, and proactive threat hunting.
 * Experience working with SOAR platforms and building automated workflows.
Benefits:
 * View to Extension
Salary:
 * Up to £575 Per Day
#J-18808-Ljbffr