Posted: | 10/12/24 | |
Recruiter: | TWX | |
Reference: | 2864317085 | |
Type: | Permanent | |
Disciplines: | Analyst | |
Salary: | £40,000 - £60,000 Annual | |
Location: | City, Manchester | |
Description: | TWX have partnered with a Cyber Security technology and service provider headquartered in Gloucestershire. They are looking to add multiple SOC Analysts to their current team, with the primary aim being to undertake and support the response to a cybersecurity event or incident as well as support other cyber services within the business. The goal of the SOC is to minimise and control the damage resulting from cybersecurity incidents, provide practical guidance for the response, coordinate recovery activities, and work to prevent future incidents from reoccurring. Additionally, you will be helping with the monitoring of information security controls within the business by analysing alerts received in line with our information security policies and practices and dealing with any/all security incidents. WHY?
Please note, this is a 24/7 SOC with 8 hour rotational shift patterns, please see (or request) corresponding rota for more information. WHAT IS A TYPICAL DAY Reviewing & Triage initial alerts First point of escalation Initial investigation Clarify incident severity Knowledge of security methodologies for investigation Comfortable with RAW output Threat Intel Info - against alerts Threat Hunting Internal Security and Log Management On top of the SOC Management you can be working on other services:- Dark Web monitoring service Guiding and Shaping Ideas for Crisis Simulations (often around Threat hunting and what happens following one of the well known cyber threats all the way from insider threat and supply chain compromise to Ransomware. Client Risk Compromise and Supply Chain Risk CIS Based Gap analysis with our customers reviewing key parts of their cyber stack. ACCOUNTABLITIES AND ACTIVITIES Analytics Use raw log sources and other security and operational tools to monitor and analyse the security posture of the IT estate and identify anomalous activity and behaviours. Investigates defines and resolves complex issues. Produce incident reports to present activity and outcome of operational security services and activity. Select appropriately from applicable standards, methods, tools and applications. Incident management Aid with the investigation of security breaches following established procedures and make sure any recommended follow up actions are taken to ensure a reduction in the likelihood of reoccurrence. Co-ordinate and manage all Incident Responses. Make sure that all security incidents have been correctly prioritised and diagnose in according to agreed procedures. Investigate the causes of incidents, document findings and seek resolution. Ensure the escalation of any unresolved incidents has been completed according to agreed procedures. Oversee the facilitation of recovery, following the resolution of incidents. Make sure security incidents have been documented and closed according to agreed procedures. Serve as a backup for security operations emergency response. Facilitate collaboration between stakeholders who share common objectives. Information security
Security administration Oversee the operation or support the operation of tools that contribute to effective security. Take responsibility to make sure that the onboarding of any enhancements to the security tools, including deployment and on-going management and maintenance is completed. Undertake periodic reviews of relevant information security policies and baseline control standards, by influencing required additional and updated controls based on the content of internal and external audit reports, trends derived from security operations, information from project-based activities and incident resolutions. QUALIFICATIONS, TRAINING AND EXPERIENCE (E= Essential. D= Desirable, P= Preferred) 1.5+ years of experience within an enterprise-level SOC or CSIRT function. (E) Experience with Malware tools and ability to analyse Malware. (E) Security certificates such as: CISSP, CISM, GIAC, GCFE, GISP, GSEC, or CEH, would be preferable considered when discussing compensation, but these are by no means essential or expected for this position. You will have a track record of technical delivery working within a fast-paced environment.
End-User Computing, Hosting, Networks, Cloud, Development.
| |