SOC Tier 3 Analyst - 6 months - Hybrid (Reading)
SOC Tier 3 Analyst - 6 months - Hybrid (Reading)
Hamilton Barnes are seeking a skilled SOC Tier 3 Analyst to join a leading organisation on an initial 6-month contract, with the potential for extension. This role is 3 days a week, working hybrid in Reading.
Key Responsibilities:
- Lead investigations and remediation of complex security incidents, including APTs, malware, and data breaches.
- Utilise SIEM tools (eg, Splunk, Microsoft Sentinel, Defender & Crowdstrike for EDR) and other security technologies to analyse and correlate security alerts.
- Take ownership of Tier 3-level escalations and guide analysts through complex incident response procedures.
- Proactively hunt for threats using threat intelligence data and logs.
- Perform forensic analysis to determine the scope and root cause of incidents.
- Provide guidance on incident containment, eradication, and recovery.
What You Will Ideally Bring:
- Deep knowledge of tools like Splunk, Sentinel, CrowdStrike, Defender, and log analysis platforms.
- Proficiency in threat analysis, malware investigation, memory dumps, and forensic evidence collection.
- Experience with Python, PowerShell, or similar for automating detection or response actions.
- Examples include CISSP, GCIH, GCFA, GCIA, or equivalent hands-on experience.
Contract Details:
- Duration: 6 months (with view for extension)
- Location: 3 days a week onsite in (Reading)
- Rate: Up to £500 per day Inside IR35
SOC Tier 3 Analyst - 6 months - Hybrid (Reading)
Reference: 2971367023
SOC Tier 3 Analyst - 6 months - Hybrid (Reading)

Posted on Jun 26, 2025 by Hamilton Barnes
SOC Tier 3 Analyst - 6 months - Hybrid (Reading)
Hamilton Barnes are seeking a skilled SOC Tier 3 Analyst to join a leading organisation on an initial 6-month contract, with the potential for extension. This role is 3 days a week, working hybrid in Reading.
Key Responsibilities:
- Lead investigations and remediation of complex security incidents, including APTs, malware, and data breaches.
- Utilise SIEM tools (eg, Splunk, Microsoft Sentinel, Defender & Crowdstrike for EDR) and other security technologies to analyse and correlate security alerts.
- Take ownership of Tier 3-level escalations and guide analysts through complex incident response procedures.
- Proactively hunt for threats using threat intelligence data and logs.
- Perform forensic analysis to determine the scope and root cause of incidents.
- Provide guidance on incident containment, eradication, and recovery.
What You Will Ideally Bring:
- Deep knowledge of tools like Splunk, Sentinel, CrowdStrike, Defender, and log analysis platforms.
- Proficiency in threat analysis, malware investigation, memory dumps, and forensic evidence collection.
- Experience with Python, PowerShell, or similar for automating detection or response actions.
- Examples include CISSP, GCIH, GCFA, GCIA, or equivalent hands-on experience.
Contract Details:
- Duration: 6 months (with view for extension)
- Location: 3 days a week onsite in (Reading)
- Rate: Up to £500 per day Inside IR35
SOC Tier 3 Analyst - 6 months - Hybrid (Reading)
Reference: 2971367023

Alert me to jobs like this:
Amplify your job search:
Expert career advice
Increase interview chances with our downloads and specialist services.
Visit Blog