Search Vacancies

SOC Analyst

Business Role Type
Business Support Role
Business Support Departments
Security
Location
Cardiff
External Closing Date
10/04/2019

This vacancy has now expired, and is not accepting any new applications.

Please search for live opportunities or use the Register Interest facility to sign up for job alerts and/or leave your CV speculatively.

Job Purpose

Cyber attacks are daily news; the Security Analyst role is responsible for performing accurate and precise real-time analysis and correlation of logs/alerts from a multitude of devices, with a focus on the determination of whether said events constitute security incidents. The successful candidate will act to safeguard EUI Ltd, our customers, our assets and the interests of the business stakeholders, by mitigating IT related risks and promoting best practice.

Main Responsibilities

The successful candidate will be responsible for monitoring the EUI Ltd network infrastructure. You will be responsible for protecting the confidentiality, integrity and availability of EUI Ltd.’s services against potential threats, attacks, host intrusion, suspicious and malicious activity from internal and external sources.

Responsibilities include:

  • Triage and escalate security incidents and requests
  • Ensure high level of quality when managing tickets and customer requests
  • Work closely with security teams across the org to develop support plans
  • Engage with customers to build and maintain good relationships
  • Follow detailed operational processes and procedures to analyse threat alerts, determine impact, escalate to the Incident Response team when needed, and support the remediation of critical information security incidents
  • Handle incident escalations when necessary from other analysts
  • Oversee completion of day-to-day checklists, including log review, alert analysis, and escalation follow up activity status
  • Remain current on cyber security trends and intelligence (open source and commercial)
  • Ensure all identified events are promptly validated and thoroughly investigated
  • Report progress and escalate in a timely manner to the SOC Manager
  • Provide oversight and guidance to Tier 1 Analysts to monitor, detect, analyse, remediate, and report on cyber security events and incidents
  • Coordinate with the Security Tool specialists to implement new or enhanced content

This is not a full definition of the role but covers the main aspects and drivers for success.

Behavioural Skills

  • Decision Making
    • Ensure conclusions are accurately justified
    • Understand the impact for the business
  • Dedication
    • Show passion for your work and a commitment to succeed
    • Keep up to date with the latest legislation and regulations that apply to the department
  • Communication
    • Ensure that all communication is clear and appropriate for its intended audience
    • Ability to communicate with employees at all levels, including senior management
    • High standard of verbal and written communication skills
  • Team Work
    • Readily available to help support the team and the business
    • Develop and manage relationships with customers, partners and suppliers to deliver maximum value to the business
  • Solutions Driven
    • Approach problems with an open but analytical approach
    • Focus on providing solutions to problems
  • Challenging
    • Be prepared to challenge the status quo and make suggestions for improvement
    • Be willing to voice your view on all matters whilst being receptive to feedback
  • Motivation
    • Demonstrate self-motivation and self-discipline with time keeping and attendance
    • Take a proactive approach

Experience and Qualifications Required

Essential:

  • Good knowledge of working with a Security Information Event Management System
  • Ability to conduct internal investigations and analysis using a best practise approach
  • Good knowledge of threat vectors against the Windows & Linux platform
  • Analytical and problem-solving skills
  • Excellent communication skills, both written and verbal
  • Security qualifications such as Security + are highly desired

Desirable:

  • Good knowledge of using a SIEM Solution
  • Hands on experience working with Windows/Linux infrastructure
  • Experience of Windows & Linux logging / auditing capabilities
  • Good understanding of the Top 20 Critical Security Controls for Effective Cyber Defence
  • Good understanding of the OWASP Top 10
  • Good understanding of Common Network Protocols and Ports
  • Experience in using the following technologies:
    • Active Directory
    • Microsoft Exchange Server
    • Bluecoat or similar

The Recruitment Officer looking after this role is Jessica Sutton. If you have any questions about the position, please feel free to drop her an email Jessica.SUTTON2@admiralgroup.co.uk or give her a call on the Recruitment line - 0800 118 1619.

About Admiral:

Our success goes hand-in-hand with having a strong culture where we put our people and customers first. Our philosophy is simple yet effective: people who like what they do, do it better, and this in turn, means that our customers receive the level of service and products that they deserve. Our culture is honest, open and wholeheartedly focused on four key areas: Communication, Equality, Reward & Recognition, and Fun.

At Admiral, we are proud to be a diverse business where we put our people and customers first. We understand that a good work life balance is important, and we want you to have an element of freedom to define a working lifestyle that supports this. We are happy to talk about flexible working. Please ask your Recruitment Officer, Jessica Sutton, for more information.

 

#LI-LP1