×
Register Here to Apply for Jobs or Post Jobs. X

Level 3 SOC Analyst

Job in Lisburn, County Antrim, BT27, Northern Ireland, UK
Listing for: Trades Workforce Solutions
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below

Job Description:

Level 3 SOC Analyst Overview

We are seeking an experienced Level 3 SOC Analyst to play a critical role in defending the organisation against sophisticated cyber threats. As part of the Security Operations Centre (SOC), you will act as the senior escalation point for complex incidents, mentor junior analysts, and contribute to the continuous improvement of detection and response capabilities.

This role requires deep technical expertise across threat hunting, digital forensics, and incident response, along with the ability to lead investigations, support containment and remediation, and collaborate with stakeholders across the wider security function.

Key Responsibilities
  • Act as the senior escalation point for complex security incidents, providing advanced investigation and analysis.
  • Lead incident response activities including containment, eradication, recovery, and post-incident reporting.
  • Conduct proactive threat hunting across enterprise environments, identifying anomalous behaviour and emerging threats.
  • Perform digital forensics and malware analysis on compromised hosts, network traffic, and logs to establish root cause.
  • Mentor and guide Level 1 and Level 2 analysts, providing technical expertise and knowledge transfer.
  • Develop, tune, and optimise SIEM rules, detection logic, and use cases to improve threat visibility.
  • Conduct regular assessments of SOC processes and contribute to playbook and runbook development.
  • Support red team/blue team exercises, pen testing, and purple teaming activities where required.
  • Stay current with the latest threat intelligence, TTPs, and attack methodologies, feeding insights into the SOC.
  • Prepare detailed incident reports and deliver findings to technical and non-technical stakeholders.
Skills & Experience
  • Proven experience working in a SOC environment with escalation responsibilities (Level 2/3 Analyst or equivalent).
  • Strong knowledge of SIEM, EDR, IDS/IPS, and SOAR platforms.
  • Deep understanding of threat detection, digital forensics, and incident response methodologies.
  • Hands‑on experience with Windows, Linux, cloud, and network investigations.
  • Familiarity with frameworks such as MITRE ATT&CK, NIST, and ISO 27001.
  • Ability to analyse and interpret complex datasets, logs, and alerts.
  • Excellent communication skills, with the ability to translate technical findings into actionable outcomes.
  • Relevant certifications (e.g., GCIA, GCIH, GCFA, GNFA, OSCP, CREST CRT, CISSP, or equivalent) are highly desirable.
Package & Benefits
  • Competitive salary (DOE) with strong pension contributions.
  • Flexible working arrangements (remote and hybrid options).
  • Access to a wide range of employee benefits, including health and wellbeing initiatives, insurance, and professional development opportunities.
#J-18808-Ljbffr
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary