Location: Stevenage (shift pattern - detailed below)
Duration: 6 month initial contract
Rate for Senior-Level: 85ph UMB (Inside IR35)
Hours: 28 hours per week.
Role details:
Our client, a leading defence company, are looking to bring in multiple SOC Analysts due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the most dynamic fields in defence.
Key Responsibilities:
The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC.
It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies.
- Effective Tier 1 to 2 alert triage of security events
- Monitoring of Cyber Security tools
- Monitoring the SOC email notification mailboxes
- Assists with the maintenance of MBDA Security technologies
- Assisting the SOC Solutions Lead with project activity
- Assist proactive threat hunting in collaboration with the CTI function
- Assist IR in HR and InfoSec related investigations
- Ensure the timely triage and remediation of any incident or request tickets raised to the SOC
- Participate in the activity of adding/removing URLs from the AcceptList and BlockList
- Attend routine security meetings
- Conduct activities in line with SOC Maturity and continuous improvement
What we are looking for in you:
- Experience in Cyber Security with a focus on Network Security, Infrastructure and Operating Systems & Applications
- Knowledge of IT Security standard methodologies
- Understanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S
- Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools
- Hands-on experience with IDS/IPS technologies and threat hunting activities
- Strong analytical skills and a keen mindset
- Experience within Defensive Cyber-attack methodologies and frameworks
- Understanding of Malware capabilities, attack vectors, propagation and impact
- Good communication skills for liaising with business units and suppliers
Desirable Skills for Senior grade:
- Root cause analysis and leadership in T2 incident investigations
- Process / Playbook / Runbook development
- Working knowledge of detection engineering, false positive improvements
- Capability to tune SIEM rules or create custom detections
- Scripted automation experience e.g. Python, SOAR, PowerShell
- Threat modelling and hunting methodologies
Additional information:
- These roles are fully site based in Stevenage
- Shift Pattern: Blocks on 4-5 days on, and 4-5 das off with either early, lates or nights across the shift blocks (rotating pattern). 2 weekend per 28 days will also be required
- These roles are 28 hours per week
- SC will be required prior to starting the role, with a view of applying candidates for DV clearance (bonus if you already hold this!)
If you have the required experience and skills and are looking for a challenging role in the Defence & Security sector, we encourage you to apply now!