SOC ANALYST (THREAT DETECTION) - INSIDE IR35 - £650 PER DAY - STEVENAGE - DV CLEARED (CAN START ON SC) - 12 MONTHS - FAST INTERVIEW PROCESS
To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems).
It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies.
KEY RESPONSIBILITIES:
Effective Tier 1 to 2 alert triage of security events
Monitoring of Cyber Security tools
Monitoring the SOC email notification mailboxes
Assists with the maintenance of our client's Security technologies
Assisting the SOC Solutions Lead with project activity
Conduct proactive threat hunting in collaboration with the CTI function
Conduct HR and InfoSec related investigations
Ensure the timely triage and remediation of any incident or request tickets raised to the SOC
Participate in the activity of adding/removing URLs from the AcceptList and BlockList
Attend routine security meetings
EXPERIENCE REQUIRED:
A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications.
Knowledge of IT Security standard methodologies.
Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools.
Hands on experience with IDS/IPS technologies and threat hunting activities.
Strong analytical experience and mind-set.
Experience within Defensive Cyber-attack methodologies and frameworks.
Understanding of Malware capabilities, attack vectors, propagation and impact.
Good communication skills liaising with the business and suppliers.
#J-18808-Ljbffr