Security Operations Center Analyst (Enhanced Security Clearance)
Apply NowJob details
As a SOC Analyst with enhanced security clearance, you will be a critical part of our clients Security Operations Centre (SOC), responsible for monitoring, detecting, analysing, and responding to security incidents within the organization’s IT infrastructure. You will work with a range of security tools and technologies to protect highly sensitive systems and data, ensuring that the organization complies with security policies, procedures, and government regulations. Key Responsibilities: Monitoring & Detection: Continuously monitor network traffic, system logs, and security alerts using SIEM (Security Information and Event Management) tools and other monitoring platforms. Incident Response: Analyse and respond to security incidents in real-time, following established playbooks and procedures. Coordinate incident containment, eradication, and recovery efforts. Threat Hunting: Proactively search for security threats and vulnerabilities across the organization's infrastructure, employing threat intelligence and advanced analytics. Forensic Analysis: Conduct in-depth analysis of compromised systems and networks to determine the root cause, attack vector, and extent of compromise. Vulnerability Management: Assist in the identification and remediation of vulnerabilities across the organization’s IT environment. Collaboration: Work closely with cross-functional teams such as IT, network engineers, and system administrators to address security issues and improve the overall security posture. Reporting: Generate detailed reports on incidents, threats, vulnerabilities, and resolutions. Provide recommendations for improvements to security policies and infrastructure. Compliance: Ensure all security activities adhere to government standards and regulations, particularly related to classified or sensitive data handling. Toolset Management: Assist with the configuration, tuning, and maintenance of security tools including firewalls, IDS/IPS, endpoint security, and SIEM platforms. Continuous Improvement: Stay updated on the latest cybersecurity trends, techniques, and tools. Contribute to the continuous improvement of the SOC’s processes, technologies, and capabilities. Key Qualifications: Security Clearance: Active Enhanced Security Clearance is required. Education: Bachelor’s degree in cybersecurity, computer science, or a related field (or equivalent work experience). Experience : 3-5 years of experience in cybersecurity, with at least 2 years in a SOC environment. Hands-on experience with SIEM platforms (e.g., Splunk, ArcSight, QRadar). Experience with network monitoring tools, endpoint protection solutions, and forensic analysis tools. Certifications (Preferred): CompTIA Security Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) GIAC Certified Incident Handler (GCIH) GIAC Security Essentials (GSEC)
Apply Now