SOC Tier 3 Analyst
Position: SOC Tier 3 Analyst
Employment Type: Contract, Full time
Start: ASAP
Location: Reading – Hybrid
Languages: English We are seeking an experienced and highly capable SOC Tier 3 Analyst to serve as a senior member of our Security Operations Center (SOC). You will lead advanced incident response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. This is a pivotal role for those passionate about cybersecurity, threat detection, and investigative analysis.
Key Responsibilities
Advanced Incident Detection & Response
Essential Skills & Experience:
Employment Type: Contract, Full time
Start: ASAP
Location: Reading – Hybrid
Languages: English We are seeking an experienced and highly capable SOC Tier 3 Analyst to serve as a senior member of our Security Operations Center (SOC). You will lead advanced incident response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. This is a pivotal role for those passionate about cybersecurity, threat detection, and investigative analysis.
Key Responsibilities
Advanced Incident Detection & Response
- Lead the investigation and resolution of complex cyber incidents, including APTs, malware outbreaks, and data breaches.
- Take charge of escalated alerts from Tier 1 and 2 analysts and guide them through advanced response protocols.
- Utilize SIEM, EDR, and threat intelligence platforms to perform deep-dive analysis and response.
- Proactively identify emerging threats through behavioral analytics and threat intelligence.
- Analyze log data, network activity, and endpoints to uncover hidden anomalies or malicious behavior.
- Partner with security engineering teams to build detection capabilities based on evolving threats.
- Conduct detailed forensic investigations to determine incident scope, root cause, and impact.
- Collect and preserve digital evidence in accordance with legal and regulatory standards.
- Deliver comprehensive findings, timelines, and impact reports.
- Advise on containment, eradication, and recovery procedures in collaboration with IT and infrastructure teams.
- Ensure proper cleanup and restoration of affected systems.
- Share Indicators of Compromise (IOCs) and support threat blocking strategies.
- Mentor junior SOC analysts and share knowledge across incident response workflows.
- Engage with stakeholders across IT, DevOps, and legal to enhance security posture.
- Contribute to post-incident reviews and continuous process improvement.
- Stay ahead of industry developments, vulnerabilities, and attacker methodologies.
- Create detection rules and playbooks to improve SOC capabilities.
- Contribute threat intelligence findings and detection logic to the team knowledge base.
- Produce clear, detailed incident reports and present findings to stakeholders or clients.
- Maintain thorough documentation of investigation steps, timelines, and decisions taken.
- Ensure all incident handling aligns with frameworks such as NIST, ISO 27001, and GDPR.
- Work with compliance teams to manage regulatory reporting during security incidents.
Essential Skills & Experience:
- Bachelor’s degree in Computer Science, Information Security, or a related field.
- 6–8+ years in cybersecurity with a focus on incident response and threat hunting.
- Proven experience investigating APTs, ransomware, and data exfiltration attempts.
- Deep knowledge of SIEM platforms (e.g., Splunk, LogRhythm, ArcSight) and EDR solutions.
- Hands-on experience in network/system forensics and malware analysis.
- Familiarity with operating systems (Windows, Linux) and cloud environments (e.g., AWS, Azure).
- Proficiency in scripting languages like Python or PowerShell for automation and analysis.
- CISSP, GCIH, GCFA, GCIA, CFCE, or equivalent recognized certifications.
- Strong critical thinking and analytical abilities.
- Excellent communication skills—able to translate technical details for varied audiences.
- Ability to remain calm and effective in high-pressure or time-sensitive situations.
- Fast-paced SOC environment.
- Availability for occasional after-hours work or on-call rotation.
- Company
- Focus on SAP
- Location
- Reading, Berkshire, UK
Hybrid / WFH Options - Posted
- Company
- Focus on SAP
- Location
- Reading, Berkshire, UK
Hybrid / WFH Options - Posted