Menu

Security Operations Center (SOC) Analyst

Job details
Posting date: 28 April 2025
Hours: Full time
Closing date: 28 May 2025
Location: Leicester, Leicestershire
Remote working: Fully remote
Company: Virgule International Limited
Job type: Contract
Job reference: Vrg_2425_059

Apply for this job

Summary

Reference: Vrg_2425_059

Job title: Security Operations Center (SOC) Analyst

We are looking for a skilled and future-focused SOC Analyst to join our cybersecurity team. In this role, you will monitor, detect, and respond to threats in real-time, while also contributing to proactive threat hunting and the development of advanced security strategies. Ideal for candidates passionate about emerging technologies and staying ahead of the evolving cyber threat landscape.

Key Responsibilities:

Monitor and analyze security events using SIEM tools such as Splunk, IBM QRadar, LogRhythm, ArcSight, and ELK Stack.

Perform log analysis and correlation to detect suspicious activity and security breaches.

Conduct incident detection, classification, investigation, and response in real-time.

Execute vulnerability management processes using tools like Nessus and OpenVAS.

Perform proactive threat hunting and generate actionable intelligence from multiple sources.

Utilize threat intelligence platforms to stay ahead of emerging threats and trends.

Develop and maintain SOC playbooks for consistent incident response procedures.

Generate and manage incident reports with detailed analysis and mitigation strategies.

Collaborate with security teams to ensure timely and effective incident handling.

Align SOC operations with frameworks such as the NIST Cybersecurity Framework, ISO/IEC 27001, CIS Controls, and OWASP guidelines.

Leverage tools like Wireshark, Zeek, Snort, and SolarWinds for in-depth traffic and network analysis.

Utilize EDR/XDR platforms such as CrowdStrike Falcon, Carbon Black, Palo Alto Cortex XDR, and Microsoft Sentinel for endpoint protection.

Implement and manage Security Orchestration, Automation, and Response (SOAR) tools to enhance incident response efficiency.

Integrate security platforms using Cisco SecureX for unified visibility and automation.



Required Skills & Qualifications:

Strong knowledge of Incident Detection, Threat Intelligence, and Threat Hunting.

Hands-on experience with SIEM tools: Splunk, IBM QRadar, LogRhythm, ArcSight, ELK Stack.

Proficiency in vulnerability scanning and management tools: Nessus, OpenVAS.

Familiarity with packet analysis tools: Wireshark, Zeek.

Experience with EDR/XDR platforms: CrowdStrike Falcon, Carbon Black, Palo Alto Cortex XDR, Microsoft Sentinel.

Expertise in using IDS/IPS technologies such as Snort.

Understanding of Security Orchestration, Automation, and Response (SOAR) platforms.

Working knowledge of cybersecurity frameworks: NIST, ISO/IEC 27001, CIS Controls, OWASP.

Strong documentation and incident reporting skills.

Certifications such as CompTIA Security+ and Certified SOC Analyst (CSA) are highly desirable.

Excellent analytical, problem-solving, and communication skills.

Employment Type: Full-time, Permanent [with Part-time and Fixed-term options available]

Apply for this job