CareerAddict

SOC Tier 3 Analyst

Stott and May

Posted on Jun 26, 2025 by Stott and May
Reading, Berkshire, United Kingdom
IT
Immediate Start
£500 - £525 Daily
Contract/Project

SOC Tier 3 Analyst (Contract)
Location: Hybrid - 3 Days Onsite, Reading, UK
Day Rate: £525
Duration: 6 months
Start Date: ASAP
Special Conditions: Occasional after-hours, weekend work, and on-call responsibilities may apply.

What You'll Be Doing:
1. Incident Detection & Response

Lead investigation and remediation of complex cyber incidents.

Take ownership of escalations from Tier 1 & 2 analysts and guide incident resolution.

Use SIEM and threat intelligence tools to triage and analyze security events.

2. Threat Hunting & Analysis

Proactively identify potential threats using behavioural analytics and threat Intel.

Correlate data across logs, network traffic, and endpoint activity to detect anomalies.

3. Forensics & Investigation

Conduct deep forensic analysis to determine incident impact and root cause.

Preserve and document digital evidence for legal and compliance requirements.

4. Remediation & Recovery

Guide containment, eradication, and recovery efforts in collaboration with IT teams.

Block future attacks by identifying and neutralizing IOCs.

5. Collaboration & Mentorship

Work cross-functionally to enhance overall security posture.

Share knowledge and support Junior Analysts through mentorship and guidance.

6. Intelligence & Research

Stay abreast of the latest attack vectors, vulnerabilities, and mitigation techniques.

Develop detection signatures and playbooks to enhance threat detection.

7. Documentation & Reporting

Produce clear incident reports and communicate findings to stakeholders.

Maintain detailed logs and response records for future reference and auditing.

8. Compliance & Risk Management

Ensure alignment with security standards (NIST, ISO 27001, GDPR, etc.).

Collaborate with legal and compliance on regulatory and data privacy matters.

Skills & Experience You'll Bring:
Education: Bachelor's in Computer Science, InfoSec, or related field.

Experience:

6-8+ years in cybersecurity, with hands-on incident response and threat hunting.

Proven success managing complex incidents (eg APTs, ransomware).

Tools & Tech Expertise:

SIEM platforms (Splunk, ArcSight, LogRhythm)

EDR solutions (CrowdStrike, Microsoft Defender, etc.)

Proficiency in forensic and malware analysis.

Platforms: Windows, Linux, Cloud (AWS/Azure).

Scripting: Python, PowerShell or similar for automation and custom detections.

Certifications (preferred):

CISSP, GCIH, GCFA, GCIA, CFCE, or similar.

Apply today to join our dynamic SOC team!


Reference: 2971280391

https://jobs.careeraddict.com/post/104718806

This Job Vacancy has Expired!

Stott and May

SOC Tier 3 Analyst

Stott and May

Posted on Jun 26, 2025 by Stott and May

Reading, Berkshire, United Kingdom
IT
Immediate Start
£500 - £525 Daily
Contract/Project

SOC Tier 3 Analyst (Contract)
Location: Hybrid - 3 Days Onsite, Reading, UK
Day Rate: £525
Duration: 6 months
Start Date: ASAP
Special Conditions: Occasional after-hours, weekend work, and on-call responsibilities may apply.

What You'll Be Doing:
1. Incident Detection & Response

Lead investigation and remediation of complex cyber incidents.

Take ownership of escalations from Tier 1 & 2 analysts and guide incident resolution.

Use SIEM and threat intelligence tools to triage and analyze security events.

2. Threat Hunting & Analysis

Proactively identify potential threats using behavioural analytics and threat Intel.

Correlate data across logs, network traffic, and endpoint activity to detect anomalies.

3. Forensics & Investigation

Conduct deep forensic analysis to determine incident impact and root cause.

Preserve and document digital evidence for legal and compliance requirements.

4. Remediation & Recovery

Guide containment, eradication, and recovery efforts in collaboration with IT teams.

Block future attacks by identifying and neutralizing IOCs.

5. Collaboration & Mentorship

Work cross-functionally to enhance overall security posture.

Share knowledge and support Junior Analysts through mentorship and guidance.

6. Intelligence & Research

Stay abreast of the latest attack vectors, vulnerabilities, and mitigation techniques.

Develop detection signatures and playbooks to enhance threat detection.

7. Documentation & Reporting

Produce clear incident reports and communicate findings to stakeholders.

Maintain detailed logs and response records for future reference and auditing.

8. Compliance & Risk Management

Ensure alignment with security standards (NIST, ISO 27001, GDPR, etc.).

Collaborate with legal and compliance on regulatory and data privacy matters.

Skills & Experience You'll Bring:
Education: Bachelor's in Computer Science, InfoSec, or related field.

Experience:

6-8+ years in cybersecurity, with hands-on incident response and threat hunting.

Proven success managing complex incidents (eg APTs, ransomware).

Tools & Tech Expertise:

SIEM platforms (Splunk, ArcSight, LogRhythm)

EDR solutions (CrowdStrike, Microsoft Defender, etc.)

Proficiency in forensic and malware analysis.

Platforms: Windows, Linux, Cloud (AWS/Azure).

Scripting: Python, PowerShell or similar for automation and custom detections.

Certifications (preferred):

CISSP, GCIH, GCFA, GCIA, CFCE, or similar.

Apply today to join our dynamic SOC team!

Reference: 2971280391

CareerAddict

Alert me to jobs like this:

Amplify your job search:

CV/résumé help

Increase interview chances with our downloads and specialist services.

CV Help

Expert career advice

Increase interview chances with our downloads and specialist services.

Visit Blog

Job compatibility

Increase interview chances with our downloads and specialist services.

Start Test

Similar Jobs

Procurement Manager (Construction)

Reading, Berkshire, United Kingdom

Information Asset Register Lead

Reading, Berkshire, United Kingdom

CMDB Expert

Reading, Berkshire, United Kingdom

multi skilled electrician

Reading, Berkshire, United Kingdom