Job Title - SOC Tier 3 Analyst
Work Location
Hybrid 3 days in office
Office Address: Reading, UK
Role Description
We are seeking a highly experienced SOC Tier 3 Analyst to strengthen our Security Operations Center. As a Tier 3 CERT Analyst, the candidate will lead the investigation and remediation of advanced cyber threats using cutting-edge tools such as Splunk, Microsoft Sentinel, CrowdStrike, Defender , and other security stacks.
The role requires handling complex incidents including Advanced Persistent Threats (APTs), malware, and data breaches , ensuring rapid and effective responses to reduce risks to the organization and its clients. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, mentoring junior analysts, and managing various security tools.
This role also involves proactive threat hunting, incident response, and cross-functional collaboration to continuously improve the organization's security posture.
Key Responsibilities
1. Incident Detection and Response:
Lead investigations and remediation of complex incidents (e.g., malware, data breaches, APTs)
Use SIEM tools and threat intelligence platforms to analyze security alerts
Take ownership of Tier 3 escalations and guide Tier 1/2 analysts
2. Threat Hunting & Analysis:
Proactively hunt threats using behavioral analysis and intelligence data
Analyze logs, network traffic, and endpoint activity
Collaborate with security teams to identify hidden threats
3. Incident Forensics:
Perform forensic analysis to determine impact and root cause
Collect, preserve, and analyze breach evidence per legal/regulatory guidelines
Prepare incident findings and remediation reports
4. Remediation and Recovery:
Guide containment, eradication, and recovery activities
Collaborate with IT to restore compromised systems
Coordinate with threat intelligence teams on IOCs and countermeasures
5. Collaboration & Knowledge Sharing:
Work with internal teams (IT, DevOps, Security) to enhance security
Mentor Tier 1/2 teams and contribute to upskilling
Participate in post-incident reviews and process improvements
6. Security Intelligence & Research:
Stay updated on emerging threats and vulnerabilities
Contribute to threat intelligence by sharing research findings
Create and maintain custom detection playbooks/signatures
7. Reporting & Documentation:
Create detailed technical incident reports
Present findings to leadership, clients, or regulators
Document workflows, timelines, and actions for improvement
8. Compliance and Risk Management:
Align response activities with standards (e.g., NIST, ISO 27001, GDPR)
Coordinate with legal and compliance teams regarding data privacy laws
Key Skills / Knowledge / Experience
Education:
Bachelor's degree in Computer Science, IT, Systems Engineering, or related field
Experience:
6 8 years in cybersecurity, with focus on incident response, forensics, and threat hunting
Experience with APTs, ransomware, and data breach investigations
Hands-on with SIEM tools (e.g., Splunk, ArcSight) and EDR solutions
Technical Skills:
Proficient in incident response, network/system forensics, malware/memory analysis
Threat analysis on Windows, Linux, and cloud platforms
Scripting experience (e.g., Python, PowerShell)
Certifications (Preferred):
CISSP
GCIH or EC-Council Certified Incident Handler
CFCE
GCFA
GCIA
Analytical Skills:
Strong analytical mindset; ability to connect complex threat data
Skilled in troubleshooting and decision-making under pressure
Soft Skills:
Excellent communication and collaboration skills
Capable of explaining technical issues to non-technical stakeholders
Resilient in high-pressure and escalated scenarios
Work Environment:
Fast-paced SOC environment
Availability for after-hours or weekend work during incidents
On-call rotation may be required
Person Specification
Strong communication and client-facing skills
Assertive yet collaborative approach
Team leadership and mentoring experience
Supportive team member with a problem-solving mindset
...prioritizes the importance of personalized service and on-time deliveries. We have an excellent team of industry professionals from our drivers to our office staff. We take pride in setting drivers up for success and nurturing customer relationships to provide great paying...
...a team that wins.**Job Description**Essential Duties & Responsibilities include the following. Other duties may be assigned.+ Assemble electronic detonator+ Pack finished assemblies for shipment and transport to storage areas+ NRAY - Assist or drive to NRAY for quality...
...Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Job Family: Systems Administration Skills: Linux, Microsoft Server Operating Systems, Microsoft Windows Environment Certifications: None Experience: 8+ years...
We are looking for a Registered Nurse (RN) to join our team on a part-time basis. This is a great opportunity for someone seeking a low-stress, outpatient clinic environment where they can combine clinical care with light administrative duties.Your Schedule, Pay, and...
...offer wont last long! Apply today! Are you an exceptional pilot looking to make a real impact from the cockpit? PHI Health is seeking... ..., and unwavering commitment. Our pilots are not just aviators; they are heroes in the sky, providing rapid medical response in...