
SOC Tier 3 Analyst
6 Month contract initially
Based: Remote/Reading - Hybrid. Max 3 days p/w onsite.
Rate: Market rates p/d (via Umbrella company)
We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We a great opportunity for a SOC Tier 3 Analyst to strengthen the Security Operations Center. As a Tier 3 CERT Analyst you will lead the investigation and remediation of advanced cyber threats, leveraging cutting-edge tools such as Splunk, Microsoft Sentinel, CrowdStrike, and Defender and other security stacks. You will handle complex incidents like APTs, malware, and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients.
Key Responsibilities:
1. Incident Detection and Response:
o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts.
2. Threat Hunting & Analysis:
o Proactively search for threats across the environment using behavioural analysis and threat intelligence data.
o Analyse data from logs, network traffic, endpoint activities, and threat intelligence feeds to detect unusual or malicious activity.
3. Incident Forensics:
o Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents.
o Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements
4. Remediation and Recovery:
o Collaborate with threat intelligence teams to identify indicators of compromise (IOCs) and ensure proper actions are taken to block further attacks.
5. Compliance and Risk Management:
o Ensure all incident response activities align with industry standards, regulations, and best practices (e.g., NIST, ISO 27001, GDPR, HIPAA).
o Work with legal and compliance teams to manage incidents within the scope of data privacy laws and regulations.
Key Skills & Experience:
o Proficient in incident response tools and techniques, including network and system forensics, malware analysis, and memory analysis.
o Expertise in analyzing and responding to threats on different platforms (Windows, Linux, cloud environments, etc.).
o Familiarity with scripting languages (Python, PowerShell, etc.) to automate tasks or create custom detection methods.
o Strong experience in handling complex cyber incidents (e.g., APTs, ransomware, data breaches).
o Hands-on experience with SIEM platforms (e.g., Splunk, ArcSight, LogRhythm) and endpoint detection/response (EDR) tools.
*Certifications (Preferred ):
o Certified Information Systems Security Professional (CISSP)
o Certified Incident Handler (GCIH, EC-Council)
o Certified Forensic Computer Examiner (CFCE)
o GIAC Certified Forensic Analyst (GCFA)
o GIAC Certified Intrusion Analyst (GCIA)
This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible.
LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds.
Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.