L3 SOC Analyst
A Global Organisation requires a Contract L3 SOC Analyst to join their Incident Response team acting as an escalation point - Splunk & Defender
* Day Rate: £475 - £500pd
* IR35 Status: Inside
* Duration: 6 months initially
* Travel: 2 days a week in Berkshire
This L3 SOC Analyst will have the previous following experience:
* Act as a lead investigator for high-severity security incidents, coordinating response activities and containment strategies.
* Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats.
* Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk).
* Collaborate with engineering and threat intelligence teams to improve detection coverage and SOC workflows.
* Mentor and guide L1/L2 analysts, providing training, quality reviews, and escalation support.
* Design and execute proactive threat hunting campaigns using tools such as Defender, CrowdStrike, and custom scripts.
* Contribute to playbook development, automation improvements (including Microsoft Co-pilot integration), and process optimization.
* Produce executive-level incident reports, root cause analyses, and recommendations for remediation and hardening.