Regions
Location
- Reading
Disciplines
Job types
- Contract
- Hybrid Working
- Inside IR35
Industry
- IT Services
Salary
£475 - 500 per day
Functions
- Cyber Security Analyst
Seniority
- Mid-level
Technologies
- Microsoft Azure
Job reference
112743
L3 SOC Analyst
A Global Organisation requires a Contract L3 SOC Analyst to join their Incident Response team acting as an escalaton point – Splunk & Defender
- Day Rate: £475 – £500pd
- IR35 Status: Inside
- Duration: 6 months initially
- Travel: 2 days a week in Berkshire
This L3 SOC Analyst will have the previous following experience:
- Act as a lead investigator for high-severity security incidents, coordinating response activities and containment strategies.
- Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats.
- Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk).
- Collaborate with engineering and threat intelligence teams to improve detection coverage and SOC workflows.
- Mentor and guide L1/L2 analysts, providing training, quality reviews, and escalation support.
- Design and execute proactive threat hunting campaigns using tools such as Defender, CrowdStrike, and custom scripts.
- Contribute to playbook development, automation improvements (including Microsoft Co-pilot integration), and process optimization.
- Produce executive-level incident reports, root cause analyses, and recommendations for remediation and hardening.
Other Cyber Security Analyst jobs in Reading
SOC Analyst
South East