Regions
Location
  • Reading
Job types
  • Contract
  • Hybrid Working
  • Inside IR35
Industry
  • IT Services 
Salary

£475 - 500 per day

Functions
  • Cyber Security Analyst
Seniority
  • Mid-level
Technologies
  • Microsoft Azure
Job reference

112743

L3 SOC Analyst 

A Global Organisation requires a Contract L3 SOC Analyst to join their Incident Response team acting as an escalaton point – Splunk & Defender

  • Day Rate: £475 – £500pd
  • IR35 Status: Inside
  • Duration: 6 months initially
  • Travel: 2 days a week in Berkshire 

This L3 SOC Analyst will have the previous following experience: 

  • Act as a lead investigator for high-severity security incidents, coordinating response activities and containment strategies.
  • Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats.
  • Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk).
  • Collaborate with engineering and threat intelligence teams to improve detection coverage and SOC workflows.
  • Mentor and guide L1/L2 analysts, providing training, quality reviews, and escalation support.
  • Design and execute proactive threat hunting campaigns using tools such as Defender, CrowdStrike, and custom scripts.
  • Contribute to playbook development, automation improvements (including Microsoft Co-pilot integration), and process optimization.
  • Produce executive-level incident reports, root cause analyses, and recommendations for remediation and hardening.
Apply for job

You can apply to this job and others using your online CV. Click the link below to start