Monitor, triage, and investigate security incidents on critical client infrastructure. Conduct a thorough examination of system events, logs, and network traffic to spot any security flaws. Facilitate containment, eradication, and recovery efforts by offering support for incident response. Help the team stay up to date on security operations, triage, and SOC tool expertise. Prepare in-depth reports for both technical and non-technical audiences for managed customers. Using threat-informed defence and Mitre Att&ck, analyse and improve detection rules and use cases. Keep up to date and maintain documentation of security incidents, such as incident reports, analytical results, and mitigating techniques. Whenever necessary, participate in threat intelligence operations. Requirements:
Proven experience in a Security Operations Centre. SIEM experience with Sentinel or Splunk. Knowledge and experience with the Mitre Att&ck Framework. Deep technical expertise in log data analysis and intrusion detection systems. Detail-oriented, with strong organizational and analytical skills. Ability to obtain and maintain SC level Security Clearance. Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise Anti-Virus products. Good understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. Able to work shifts from our office in Hemel Hempstead. A great opportunity for a SOC professional to push their career forward in a challenging and exciting environment. Due to the high level of security clearance required, applicants must be British Nationals.
#J-18808-Ljbffr