SOC Roles L1/ L2 – Fully Remote – £28k – £50k

World’s Black Community Wall Forums Job Board (Latest Jobs) Latest UK Jobs SOC Roles L1/ L2 – Fully Remote – £28k – £50k

Viewing 1 post (of 1 total)
  • Author
    Posts
  • blackinsync
    Keymaster

    We are seeking the following SOC roles for our client on a remote basis. These roles will be working shifts.

    T1 SOC Analyst – £28k – £32k + 15% shift allowance

    Rapidly identify, categorize, prioritize, and triage alerts using customer logs and intelligence sources within a 24/7 shift pattern.
    Ensure service excellence for all Security Operations Department services.
    Maintain assigned alerts queue and assist senior SOC members with complex alerts.
    Adhere to the SOC Framework and monitor incoming alerts using Jira.
    Maintain healthy incident SLA first response and resolution metrics.
    Perform initial investigation and triage of potential incidents; escalate or close incidents as necessary.
    Utilize SOC tools like Azure Sentinel Log Analytics for historical analysis of detected alerts/incidents.
    Monitor SOC email queue for potential event reporting from customers.
    Maintain SOC shift logs with relevant activities and document investigation results for secondary analysis.
    T2 SOC Analyst – £32k – £50k + 15% Shift allowance

    Identify, categorize, prioritize, and triage alerts using customer logs and intelligence sources as part of the shift pattern.
    Investigate and respond to complex security alerts, and ensure service excellence for assigned shifts.
    Track and address tactical issues in SOC operations, ensuring prompt response to triage-tagged incidents using metrics and reports.
    Mentor Tier 1 Analysts to enhance service delivery and SOC detection/analytical capabilities.
    Investigate escalated incidents from junior SOC team members and maintain the SOC Framework.
    Monitor incoming alert queues for potential security incidents using Jira, maintaining incident SLA first response and resolution metrics.
    Perform initial investigations and triage potential incidents, escalating or closing them as necessary.
    Utilize SOC tools like Azure Sentinel Log Analytics for historical analysis of alerts/incidents.
    Monitor SOC email queues for event reports from customers, maintaining SOC shift logs with relevant activities.
    Document investigation results and pass details to Secondary Analysts for final analysis.
    Manage SOC event and information intake, gather intelligence reports, monitor ticket queues, investigate incidents, and interact with security and network groups.
    Coordinate with the SOC Engineering Team to tune alerts and events.
    Demonstrate strong communication, problem-solving, and critical thinking skills for efficient incident response.
    Pursue continuous learning by staying updated on industry trends, threat intelligence, and emerging security technologies to enhance skills and SOC effectiveness.

    If you are interested in the above roles – please email your CV along with your availability & salary expectations detailing which role is of interest to Stephanie.Clayton@circlerecruitment.com in the first instance.

Viewing 1 post (of 1 total)
  • You must be logged in to reply to this topic.