More jobs:
L2 SOC Analyst - Systems Integrator
Job in
Neath, Neath Port Talbot, SA11, Wales, UK
Listed on 2026-02-16
Listing for:
Hamilton Barnes Associates Limited
Full Time
position Listed on 2026-02-16
Job specializations:
-
IT/Tech
Cybersecurity, Security Manager
Job Description & How to Apply Below
Overview
Ready to detect, respond, and contain threats before they escalate?
Join a cybersecurity solutions provider recognised for delivering advanced identity, threat detection, and SOC services. With a reputation for innovation and trusted partnerships, the organisation continues to help enterprises defend against evolving cyber risks.
The team is hiring an L2 SOC Analyst to monitor, investigate, and respond to security incidents. The role will focus on analysing alerts, performing in-depth investigations, escalating complex threats, and supporting continuous improvements in SOC processes and tools.
Be the frontline defender where speed meets precision. Apply now!
Responsibilities- Investigate escalated security incidents and determine root causes.
- Conduct in-depth analysis of incidents using threat intelligence (IOCs, TTPs) alongside host, network, and identity data sets.
- Leverage SIEM platforms (Crowdstrike SIEM, Splunk, Microsoft Defender) to develop and implement new use cases.
- Tune and reduce false alerts.
- Lead investigations through resolution.
- Monitor and analyze events across multiple operating systems (Windows, macOS, Linux).
- Conduct proactive threat hunts across diverse data sources (host, vulnerability, threat, network, Active Directory).
- Collaborate with stakeholders to coordinate timely incident response efforts.
- Design and implement incident response plans, including alert definitions, escalation workflows, and runbooks.
- Produce clear and comprehensive incident documentation tailored to both technical and management audiences.
- Perform forensic investigations as needed.
- Partner with vendors to implement new SOC use cases.
- 5+ years of recent experience as a Tier 2 or 3 SOC Analyst in a large organization (government or critical infrastructure experience preferred).
- Strong expertise with SIEM tools, including Crowdstrike, Splunk, and Microsoft Defender.
- Proven track record designing and implementing SOC use cases and response runbooks.
- Demonstrated ability to conduct advanced correlation analysis across diverse security data sources.
- Experience leading complex investigations and collaborating with cross-functional teams.
- Strong experience setting up alert rules and managing alert workflows.
- Excellent documentation skills for technical and executive-level reporting.
- Proactive, curious, and analytical problem solver.
- Strong qualitative and quantitative analysis abilities.
- Adaptive and resilient in fast-paced, dynamic environments.
- Excellent communication and stakeholder engagement skills.
Salary: €350 per day
#J-18808-LjbffrNote that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×