Social network you want to login/join with:
L3 SOC / Cyber Security Engineer, Bolton, Greater Manchester
Client:
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Location:
Bolton, Greater Manchester, United Kingdom
Job Category:
Other
EU work permit required: Yes
Job Views:
4
Posted:
06.06.2025
Expiry Date:
21.07.2025
Job Description:
L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel – £55-65K – Home / Office 2x per month
My client is one of the most recognisable names in IT, with some of the best people in the industry working for them.
They’re top partners with all the leading vendors, which means you get to work with the best technology, the best people, the best training, certification programmes, and environment to grow!
Why?
* Work with some of the best cyber consultants in the country.
* The pathway to progress in cyber is continuous.
* The latest, cutting-edge technology.
You will join a 24/7 SOC team, involved in incident response, proactive threat hunting, and development of detection and use-case capabilities. You’ll work alongside the engineering team to optimize tuning opportunities.
Candidates MUST have or be eligible to gain SC clearance upon hire.
Key Skills required:
* 4+ years’ experience in a SOC environment, ideally MSSP, or in a technical security role.
* Experience with SIEM tools such as MS Sentinel, AlienVault, or Splunk.
* Cyber security qualifications, certifications, or degrees, e.g., CySA+, CompTIA SEC+, or similar. Microsoft SC-200 certifications are desirable.
* Strong knowledge of threat actor methodologies, incident response, and forensic investigations.
This company has a clear vision, the right leadership, and exceptional tech talent. They offer impressive customers, flexible working, and a caring culture.
Responsibilities:
* Leading escalated cyber incident management, including major incidents and analysis for ongoing investigations.
* Proactive threat hunting, RCAs, creation of detection capabilities.
* Monitoring security alerts from platforms like MS Sentinel, AlienVault, or Splunk.
* Work schedule: 4 days on, 4 days off, days and nights.
* Responding to security alerts, incidents, requests, and events to manage threats and vulnerabilities.
* Documenting cases for customer reports and recommendations.
* Supporting recovery post-incident.
* Providing expertise on exploits, threat actors, TTPs, etc.
* Maintaining high standards across SLAs and KPIs.
To apply, click the button or email [emailprotected], or call 020 3004 8235 for more info.
#J-18808-Ljbffr