SOC Analyst
A Global Organisation requires a Contract L2 SOC Analyst to join their Incident Response team - Splunk, Defender
* Day Rate: £400 - £420pd
* IR35 Status: Inside
* Duration: 6 months initially
* Travel: 2 days a week in Berkshire
1. This L2 SOC Analyst will have the previous following experience:
* Monitor and investigate security alerts using tools such as Splunk, Microsoft Defender, and CrowdStrike, escalating incidents as needed and ensuring timely resolution.
* Leverage Microsoft Co-pilot and automation workflows to streamline threat detection, incident triage, and response processes.
* Conduct in-depth log analysis and correlation across multiple data sources to identify potential security threats and reduce false positives.
* Support threat hunting and root cause analysis efforts, providing detailed documentation and recommendations based on findings.
* Collaborate with L1 analysts, engineering teams, and threat intelligence functions to enhance detection capabilities and improve overall SOC effectiveness.