SOC Tier 3 Analyst
SOC Tier 3 Analyst (Contract)
Location: Hybrid - 3 Days Onsite, Reading, UK
Day Rate: £525
Duration: 6 months
Start Date: ASAP
Special Conditions: Occasional after-hours, weekend work, and on-call responsibilities may apply.
What You'll Be Doing:
1. Incident Detection & Response
Lead investigation and remediation of complex cyber incidents.
Take ownership of escalations from Tier 1 & 2 analysts and guide incident resolution.
Use SIEM and threat intelligence tools to triage and analyze security events.
2. Threat Hunting & Analysis
Proactively identify potential threats using behavioural analytics and threat Intel.
Correlate data across logs, network traffic, and endpoint activity to detect anomalies.
3. Forensics & Investigation
Conduct deep forensic analysis to determine incident impact and root cause.
Preserve and document digital evidence for legal and compliance requirements.
4. Remediation & Recovery
Guide containment, eradication, and recovery efforts in collaboration with IT teams.
Block future attacks by identifying and neutralizing IOCs.
5. Collaboration & Mentorship
Work cross-functionally to enhance overall security posture.
Share knowledge and support Junior Analysts through mentorship and guidance.
6. Intelligence & Research
Stay abreast of the latest attack vectors, vulnerabilities, and mitigation techniques.
Develop detection signatures and playbooks to enhance threat detection.
7. Documentation & Reporting
Produce clear incident reports and communicate findings to stakeholders.
Maintain detailed logs and response records for future reference and auditing.
8. Compliance & Risk Management
Ensure alignment with security standards (NIST, ISO 27001, GDPR, etc.).
Collaborate with legal and compliance on regulatory and data privacy matters.
Skills & Experience You'll Bring:
Education: Bachelor's in Computer Science, InfoSec, or related field.
Experience:
6-8+ years in cybersecurity, with hands-on incident response and threat hunting.
Proven success managing complex incidents (eg APTs, ransomware).
Tools & Tech Expertise:
SIEM platforms (Splunk, ArcSight, LogRhythm)
EDR solutions (CrowdStrike, Microsoft Defender, etc.)
Proficiency in forensic and malware analysis.
Platforms: Windows, Linux, Cloud (AWS/Azure).
Scripting: Python, PowerShell or similar for automation and custom detections.
Certifications (preferred):
CISSP, GCIH, GCFA, GCIA, CFCE, or similar.
Apply today to join our dynamic SOC team!
Reference: 2971280391
SOC Tier 3 Analyst

Posted on Jun 26, 2025 by Stott and May
SOC Tier 3 Analyst (Contract)
Location: Hybrid - 3 Days Onsite, Reading, UK
Day Rate: £525
Duration: 6 months
Start Date: ASAP
Special Conditions: Occasional after-hours, weekend work, and on-call responsibilities may apply.
What You'll Be Doing:
1. Incident Detection & Response
Lead investigation and remediation of complex cyber incidents.
Take ownership of escalations from Tier 1 & 2 analysts and guide incident resolution.
Use SIEM and threat intelligence tools to triage and analyze security events.
2. Threat Hunting & Analysis
Proactively identify potential threats using behavioural analytics and threat Intel.
Correlate data across logs, network traffic, and endpoint activity to detect anomalies.
3. Forensics & Investigation
Conduct deep forensic analysis to determine incident impact and root cause.
Preserve and document digital evidence for legal and compliance requirements.
4. Remediation & Recovery
Guide containment, eradication, and recovery efforts in collaboration with IT teams.
Block future attacks by identifying and neutralizing IOCs.
5. Collaboration & Mentorship
Work cross-functionally to enhance overall security posture.
Share knowledge and support Junior Analysts through mentorship and guidance.
6. Intelligence & Research
Stay abreast of the latest attack vectors, vulnerabilities, and mitigation techniques.
Develop detection signatures and playbooks to enhance threat detection.
7. Documentation & Reporting
Produce clear incident reports and communicate findings to stakeholders.
Maintain detailed logs and response records for future reference and auditing.
8. Compliance & Risk Management
Ensure alignment with security standards (NIST, ISO 27001, GDPR, etc.).
Collaborate with legal and compliance on regulatory and data privacy matters.
Skills & Experience You'll Bring:
Education: Bachelor's in Computer Science, InfoSec, or related field.
Experience:
6-8+ years in cybersecurity, with hands-on incident response and threat hunting.
Proven success managing complex incidents (eg APTs, ransomware).
Tools & Tech Expertise:
SIEM platforms (Splunk, ArcSight, LogRhythm)
EDR solutions (CrowdStrike, Microsoft Defender, etc.)
Proficiency in forensic and malware analysis.
Platforms: Windows, Linux, Cloud (AWS/Azure).
Scripting: Python, PowerShell or similar for automation and custom detections.
Certifications (preferred):
CISSP, GCIH, GCFA, GCIA, CFCE, or similar.
Apply today to join our dynamic SOC team!
Reference: 2971280391

Alert me to jobs like this:
Amplify your job search:
Expert career advice
Increase interview chances with our downloads and specialist services.
Visit Blog