I am working with a client based in the South of England who specialise in cyber security. This is a fantastic opportunity for the right candidates to join an organisation who are pioneers of cyber risk management, working with a range of customers in both private and public sectors.
The Role
PLEASE NOTE THIS OPPORTUNITY INVOLVES SHIFT WORK SO PLEASE ONLY APPLY IF YOU ARE HAPPY TO WORK BOTH DAY AND NIGHT SHIFTS.
Due to rapid expansion, my client is looking for 4 new 24/7 SOC Analysts to add to their local team. A 24/7 Security Operations Centre (SOC) Analyst is responsible for monitoring and defending customers against potential security threats. This critical role will identify, analyse and respond to security incidents to ensure the confidentiality, integrity and availability of sensitive data and systems. You will need to work closely with other cyber security team members to ensure a strong security posture and prevent or mitigate potential cyber attacks. This role will also offer hands on support to the infrastructure engineering field team in responding to incidents so previous infrastructure experience or experience within a 2nd line support environment is essential.
Security Monitoring And Incident Detection
Based at their modern and recently refurbished offices near Poole Quay, you will work a four day operational rota including both day shifts (7am - 7pm) and nights shifts (7pm - 7am). The 24/7 SOC analysts work closely with other Digital Forensic and Incident response teams and will perform a multitude of tasks managing and maintaining customers.
Duties include:
Monitor security information and event management (SIEM) tools and other security monitoring systems to identify potential security incidents and anomalies.
Analyse alerts and log data to assess the severity and impact of potential threats.
Incident Response And Analysis
Investigate and respond to security incidents promptly and effectively. Perform in-depth analysis of security events to understand the scope, impact, and root cause of incidents.
Threat Hunting
Proactively search for hidden threats and potential security weaknesses in the organization's network and systems. Utilize various security tools and methodologies to identify and address potential vulnerabilities before they are exploited.
Vulnerability Management
Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritize identified vulnerabilities for remediation by collaborating with IT and system administrators.
Security Reporting And Documentation
Create detailed reports on security incidents, response actions taken, and recommendations for improvement. Maintain accurate records of incidents, investigations, and security-related activities.
Security Tools Management
Configure, update, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions.
Who?
I would be interested in speaking with both candidates with experience in cyber secruity in a similar role or who have other technical IT infrastructure or support experience and are looking to move to a career in cyber security. You will be given a substantial development plan. A passion for technology and learning new skills is a key sucess factor for this role and, although full training and real world expeprience will be provided, you will need to have the ambition to develop. My client prides itself on providing an excellent service to their customers so the sucessful candidates will need to have strong communication skills and a service-based mindset.
Successful Candidates Will Be Enrolled On a Full Training & Certification Program Across The Service Portfolio; however, the following certifications and experience will be beneficial to applicants:
- Certification in Computer Science, Information Security, or related field (or equivalent work experience).
- Cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH) or Microsoft M365/Azure
- Understanding of cybersecurity principles, networking concepts, and various operating systems.
- Knowledge of common security threats, attack vectors, and mitigation strategies.
- Excellent communication skills to convey technical information to both technical and non-technical audiences.
- Experience in an IT Support/MSP support role
- Experience within a IT infrastructure role
- Strong attention to detail and ability to work under pressure in a fast-paced environment.