L2 SOC Analyst
Well known brand require a Level 2 SOC Analyst to join their Security Operations Team, who will be responsible for the management, response and/or escalation of security incidents. This role will report into the IT Security Operations Manager.
This role is outside Ir35, is hybrid working and will require travel to the office in 1-2 days a week.
The L2 SOC Analyst will have the following experience:
- Worked as a Security Analyst in the SOC before at an L2 level performing analysis in reviewing security alerts, Investigating and triaging 1st & 2nd line activity
- Experience managing detection and response activity and looking after security services
- Microsoft Stack - E5, Sentinel, 0365 & Service Now Experience required
- Worked within an Azure Environment
- EDR Tools e.g. Carbon Black, Crowdstrike
- SIEM Tool - Ideally Sentinel
- Networking Monitoring Tool experience
- Worked in an internal SOC Managing Incidents
- Managed change requests through getting involved in troubleshooting old security products and putting new ones in
- Worked as a SOC Analyst within a complex large scale business
- IDS/IPS, Firewalls, Anti-virus, active directory, DLP, proxies, and honeypots using SIEMs tools
Should you be interested, please do not hesitate to contact Antonio.Alfieri@laofsse.com
