×
Register Here to Apply for Jobs or Post Jobs. X

L2 SOC Analyst - Systems Integrator

Job in Neath, Neath Port Talbot, SA11, Wales, UK
Listing for: Hamilton Barnes Associates Limited
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 350 EUR Daily EUR 350.00 DAY
Job Description & How to Apply Below

Overview

Ready to detect, respond, and contain threats before they escalate?

Join a cybersecurity solutions provider recognised for delivering advanced identity, threat detection, and SOC services. With a reputation for innovation and trusted partnerships, the organisation continues to help enterprises defend against evolving cyber risks.

The team is hiring an L2 SOC Analyst to monitor, investigate, and respond to security incidents. The role will focus on analysing alerts, performing in-depth investigations, escalating complex threats, and supporting continuous improvements in SOC processes and tools.

Be the frontline defender where speed meets precision. Apply now!

Responsibilities
  • Investigate escalated security incidents and determine root causes.
  • Conduct in-depth analysis of incidents using threat intelligence (IOCs, TTPs) alongside host, network, and identity data sets.
  • Leverage SIEM platforms (Crowdstrike SIEM, Splunk, Microsoft Defender) to develop and implement new use cases.
  • Tune and reduce false alerts.
  • Lead investigations through resolution.
  • Monitor and analyze events across multiple operating systems (Windows, macOS, Linux).
  • Conduct proactive threat hunts across diverse data sources (host, vulnerability, threat, network, Active Directory).
  • Collaborate with stakeholders to coordinate timely incident response efforts.
  • Design and implement incident response plans, including alert definitions, escalation workflows, and runbooks.
  • Produce clear and comprehensive incident documentation tailored to both technical and management audiences.
  • Perform forensic investigations as needed.
  • Partner with vendors to implement new SOC use cases.
Requirements
  • 5+ years of recent experience as a Tier 2 or 3 SOC Analyst in a large organization (government or critical infrastructure experience preferred).
  • Strong expertise with SIEM tools, including Crowdstrike, Splunk, and Microsoft Defender.
  • Proven track record designing and implementing SOC use cases and response runbooks.
  • Demonstrated ability to conduct advanced correlation analysis across diverse security data sources.
  • Experience leading complex investigations and collaborating with cross-functional teams.
  • Strong experience setting up alert rules and managing alert workflows.
  • Excellent documentation skills for technical and executive-level reporting.
  • Proactive, curious, and analytical problem solver.
  • Strong qualitative and quantitative analysis abilities.
  • Adaptive and resilient in fast-paced, dynamic environments.
  • Excellent communication and stakeholder engagement skills.

Salary: €350 per day

#J-18808-Ljbffr
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary