SOC Analyst
A Global Organisation requires a Contract L2 SOC Analyst to join their Incident Response team - Splunk, Defender
Day Rate: £400 - £420pd
IR35 Status: Inside
Duration: 6 months initially
Travel: 2 days a week in Berkshire
This L2 SOC Analyst will have the previous following experience:
Monitor and investigate security alerts using tools such as Splunk, Microsoft Defender, and CrowdStrike, escalating incidents as needed and ensuring timely resolution.
Leverage Microsoft Co-pilot and automation workflows to streamline threat detection, incident triage, and response processes.
Conduct in-depth log analysis and correlation across multiple data sources to identify potential security threats and reduce false positives.
Support threat hunting and root cause analysis efforts, providing detailed documentation and recommendations based on findings.
Collaborate with L1 analysts, engineering teams, and threat intelligence functions to enhance detection capabilities and improve overall SOC effectiveness.