Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared
Location: East Kilbride, Glasgow base.
Pay: 653 per day – Umbrella Company.
Working environment: Developed Vetting (DV) Security cleared. You must hold a current DV or SC Security Clearance, or be eligible to undertake.
Shift pattern: 24/7 shift pattern, including weekends and bank holidays.
Skills and Experience Required
* Experience of Splunk within a Security Operations Centre (SOC).
* A bachelor's degree in computer science, Cyber Security or relevant experience.
* Foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques.
* Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus.
Key Responsibilities
* Continuous Monitoring – Monitor SIEM systems to detect suspicious activity. Respond efficiently to defined processes.
* Incident Triage – Analyse alerts and logs to determine genuine security incidents or false positives. Classify and prioritise incidents following established procedures.
* Initial Incident Response – Perform containment actions such as isolating affected systems and escalating to Level 2 or 3 analyst for deeper investigation.
* Reporting and Documentation – Create detailed tickets and reports for all detected incidents, documenting findings and steps taken.
* Managing – Provide direction and support to the junior member of the shift and handover to the next shift leader.
* Tool Management – Assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively.
Application
Please apply online in the first instance.
Diversity Statement
SmartSourcing is a Disability Confident Employer and we promote, celebrate and value diversity. We are committed to promoting equality and inclusion for all.
#J-18808-Ljbffr