Search Remote Jobs

24/7 SOC Analyst, Level 2

Job not on LinkedIn

October 29

Apply Now
Logo of Nomios

Nomios

We design, secure and manage your digital infrastructure. Our enthusiastic and dedicated professionals develop innovative solutions for your security and network challenges. We deliver our best work by fusing extensive experience with analytical thinking and creative strength.

201 - 500 employees

đź“‹ Description

• You will play a pivotal role within the 24/7 Nomios SOC • Working closely with Senior and Lead Analysts, you will be responsible for responding to incidents • Ensuring either their swift resolution or escalation to senior resources if required • Helping to maintain and improve best practice and operational efficiency • Participate in developing tuning of security monitoring and detection toolsets • Aid in the maintenance and updating of internal SOC processes and procedures • Assist in the testing and monitoring of newly created detection logic and use cases • Investigate Monitor security alerts and incidents using a wide range of security tools and technologies • Produce regular reports and updates on customer(s) security posture • Conduct Identification, analysis, and qualification of security alerts, escalating internally and externally to customers where required • Aid in conducting Threat Hunting activities as directed • Review Vulnerability Management reports and provide analyst insight • Participate in SOC improvement projects (tooling, process, increase in SOC coverage) • Deliver investigation reports, including continual improvement steps to both internal and external stakeholders • Stay current with the latest cybersecurity trends, threats and upcoming technologies

🎯 Requirements

• 2+ years of experience working within a Security Operations Centre (SOC) or strong and diverse background within Infrastructure and Networking (3+ years) orientated towards Cyber Security • Good Knowledge of SIEMs - Focused on day-to-day usage, navigation, and creation of basic rulesets & dashboards aligned to MITRE ATT&CK • Foundational Knowledge of incident response, aligned to MITRE ATT&CK with a good knowledge of common tactics, tools and techniques attackers utilise in the wild • Good Knowledge of EDR/XDR - including incident investigation and day-to-day usage • Good Knowledge of VM - including analysis and prioritisation • Foundational Knowledge of CTI - Including its utilization within a SOC environment • Experience in ticket handling toolsets (Service Now, Salesforce, JIRA) aligned to ITIL best practices • Fluent in English with excellent written and oral communication skills • Eligible for SC clearance (five years living in the UK) required, or DV (ten years living in the UK) clearance preferred • Ability to use initiative and work independently • Strong team player

🏖️ Benefits

• Industry-leading benefits • Extensive training through exposure to new technologies and toolsets • Access to dedicated Cyber-Ranges and environments

Apply Now

Similar Jobs

June 24

TelefĂłnica Tech

1001 - 5000

đź”’ Cybersecurity

🤖 Artificial Intelligence

As a Level 3 SOC Analyst at TelefĂłnica Tech, provide expert-level analysis of security incidents and support junior team members.

April 17

TelefĂłnica Tech

1001 - 5000

đź”’ Cybersecurity

🤖 Artificial Intelligence

As a Level 3 SOC Analyst, provide expert security incident response at TelefĂłnica Tech in the UK.

Developed by Lior Neu-ner. I'd love to hear your feedback — Get in touch via DM or support@remoterocketship.com