×
Register Here to Apply for Jobs or Post Jobs. X

SOC Analyst L2

Job in Birmingham, West Midlands, B1, England, UK
Listing for: NTT
Full Time position
Listed on 2025-12-30
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below

JOB DESCRIPTION

The team you'll be working with :

SOC Analyst (L2)

We are currently recruiting for a Senior Associate level Managed Detection and Response SOC Analyst Level 2 to join our growing Security Operations Centre business.

This role will be based on-site in Birmingham, we need candidates that are able to work in a job that involves 24/7 operations, this will probably be in shift patterns of 4 days on, 4 days off.

About Us

NTT DATA is one of the world’s largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of the worlds most recognised Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. In a constantly changing world, we work together with our people, clients and communities to enable them to fulfil their potential to do great things.

We believe that by bringing everyone together, we can solve problems using innovative technology that can create a world that is sustainable and secure.

This is a great opportunity for you to play a pivotal role in helping to shape our client’s transformation journeys.

What you'll be doing

What you will be doing;

  • The primary function of the SOC Analyst (L2) is to analyse any incidents escalated by the SOC Analyst (L1) and undertake the detailed investigation of the Security Event. The SOC Analyst (L2) shall determine whether the security event will be classified as an incident. They will be coordinating with the customer IT and Security team for resolution of the Security Incident.
Main

Duties
  • Security Monitoring & Investigation:
    Monitoring SIEM tools to assure high level of security operations delivery function. Oversee and enhance security monitoring systems to detect and analyse potential security incidents. Conduct real‑time analysis of security events and incidents and escalate as necessary. Support other teams on investigations into incidents, determining the root cause and impact. Document findings and lessons learned to improve incident response procedures.

    Ensure runbooks are followed and are fit for purpose.
  • Incident Response:
    Lead and coordinate incident response activities to effectively contain, eradicate, and recover from security incidents. Develop and maintain incident response plans, ensuring they align with industry best practices. Escalation management in the event of a security incident. Follow major incident process.
  • Threat Intelligence:
    Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection.
  • Security Tool Management:
    Manage and optimise SIEM tools, ensuring they are properly configured and updated to maximise effectiveness. Own the development and implementation of SOC Use Cases. Evaluate new security technologies and recommend enhancements to the security infrastructure.
  • Collaboration:

    Collaborate with cross‑functional teams, including IT, legal, and management, to address security incidents and implement preventive measures. Provide expertise and guidance to other analysts. Working with the Technical Teams to ensure all new and changed services are monitored accordingly.
  • Documentation:
    Maintain accurate and up‑to‑date documentation of security procedures, incident response plans, and analysis reports. Create post‑incident reports for management and stakeholders. Support the creation of monthly reporting packs as per contractual requirements. Create and document robust event and incident management processes, runbooks & playbooks.
  • Other responsibilities:

    Involvement in scoping and standing up new solutions for new opportunities. Assisting Pre‑Sales team with requirements on new opportunities. Demonstrations of SOC tools to clients. Continual Service Improvement - Recommendations for changes to address incidents or persistent events.
What experience you'll bring
  • Must be able to obtain SC Clearance or already hold SC clearance.
  • Must have a good understanding of Incident Response approaches.
  • Must have knowledge and hands‑on knowledge of Microsoft Sentinel…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary