We are seeking a SOC Analyst to join our 24/7 Security Operations Centre. The role involves monitoring, investigating, and escalating security events across multiple customer environments.
Requirements
- Minimum 1 year in a Security Operations Centre (SOC), or
- Minimum 3 years in infrastructure or networking roles with demonstrable security exposure.
- Experience triaging and investigating security alerts.
- Understanding of attacker behaviours, TTPs, and common malware execution chains (e.g., phishing leading to script or binary execution).
- Ability to recognise indicators of compromise such as unusual processes, network connections, irregular logon activity or file changes.
- Hands-on experience with at least one major security platform (SIEM, EDR or XDR).
- Familiarity with ticketing tools such as ServiceNow, Salesforce, or JIRA.
- Familiarity with Windows event logs, authentication logs, basic process trees, and command-line tools (Windows & Unix-like systems).
- Understanding of core network protocols: DNS, HTTP, SMB, LDAP.
- Operational knowledge of Windows, macOS and Linux.
- Ability to read and interpret logs from multiple sources.
- Awareness of MITRE ATT&CK and differentiating legitimate admin activity vs suspicious behaviour.
Benefits
- Highly competitive salary
- Commission scheme
- Industry-leading benefits