Senior SOC Analyst
Location: Hybrid - Birmingham (1 day every 2 weeks).
Standard Hours: the first 4 months before moving to a 4 on/4 off 12‑hour shift schedule. Must be willing to work shifts after 6 months which are likely to be 4 x 12‑hour shifts (4 on, 4 off).
Security clearance: Must hold or be able to acquire Security Clearance (SC) – 5 years UK address history.
Key Responsibilities
1. Triage security events and incidents.
2. Monitor the SIEM to identify anomalies and potential security threats.
3. Monitor the health of the SIEM and other critical components within the infrastructure.
4. Participate in evaluating the security of monitored infrastructure systems and recommend additional security solutions where appropriate.
5. Communicate with external teams for incident resolution.
6. Participate in security incident management and vulnerability management processes.
7. Communicate effectively with customers, teammates, and management.
8. Follow & improve internal guidelines, playbooks and practices for management of incidents and changes.
9. Document and maintain security procedures and processes.
10. Build & deliver customer service reviews.
Required Skills and Qualifications
* Security monitoring experience with one or more SIEM technologies, ideally Microsoft Sentinel and/or Google SecOps.
* Strong understanding of Windows, Linux and cloud technologies.
* Good understanding of security solutions including SIEMs, Web Proxies, Anti‑Virus, Firewalls, VPN, authentication providers and mechanisms, encryption, IPS/IDS.
* Good understanding of security incident management, malware management and vulnerability management processes.
* Experience of working in an MSSP SOC environment.
* Attention to detail and quality.
Desirable Skills and Qualifications
* CREST Practitioner Intrusion Analyst (CPIA)
* Microsoft Security Operations Analyst (SC‑200)
* Security Blue Team Level 1 (BTL1)
#J-18808-Ljbffr