Job Title - SOC Tier 3 Analyst
Work Location
Hybrid 3 days in office
Office Address: Reading, UK
Role Description
We are seeking a highly experienced SOC Tier 3 Analyst to strengthen our Security Operations Center. As a Tier 3 CERT Analyst, the candidate will lead the investigation and remediation of advanced cyber threats using cutting-edge tools such as Splunk, Microsoft Sentinel, CrowdStrike, Defender , and other security stacks.
The role requires handling complex incidents including Advanced Persistent Threats (APTs), malware, and data breaches , ensuring rapid and effective responses to reduce risks to the organization and its clients. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, mentoring junior analysts, and managing various security tools.
This role also involves proactive threat hunting, incident response, and cross-functional collaboration to continuously improve the organization's security posture.
Key Responsibilities
1. Incident Detection and Response:
Lead investigations and remediation of complex incidents (e.g., malware, data breaches, APTs)
Use SIEM tools and threat intelligence platforms to analyze security alerts
Take ownership of Tier 3 escalations and guide Tier 1/2 analysts
2. Threat Hunting & Analysis:
Proactively hunt threats using behavioral analysis and intelligence data
Analyze logs, network traffic, and endpoint activity
Collaborate with security teams to identify hidden threats
3. Incident Forensics:
Perform forensic analysis to determine impact and root cause
Collect, preserve, and analyze breach evidence per legal/regulatory guidelines
Prepare incident findings and remediation reports
4. Remediation and Recovery:
Guide containment, eradication, and recovery activities
Collaborate with IT to restore compromised systems
Coordinate with threat intelligence teams on IOCs and countermeasures
5. Collaboration & Knowledge Sharing:
Work with internal teams (IT, DevOps, Security) to enhance security
Mentor Tier 1/2 teams and contribute to upskilling
Participate in post-incident reviews and process improvements
6. Security Intelligence & Research:
Stay updated on emerging threats and vulnerabilities
Contribute to threat intelligence by sharing research findings
Create and maintain custom detection playbooks/signatures
7. Reporting & Documentation:
Create detailed technical incident reports
Present findings to leadership, clients, or regulators
Document workflows, timelines, and actions for improvement
8. Compliance and Risk Management:
Align response activities with standards (e.g., NIST, ISO 27001, GDPR)
Coordinate with legal and compliance teams regarding data privacy laws
Key Skills / Knowledge / Experience
Education:
Bachelor's degree in Computer Science, IT, Systems Engineering, or related field
Experience:
6 8 years in cybersecurity, with focus on incident response, forensics, and threat hunting
Experience with APTs, ransomware, and data breach investigations
Hands-on with SIEM tools (e.g., Splunk, ArcSight) and EDR solutions
Technical Skills:
Proficient in incident response, network/system forensics, malware/memory analysis
Threat analysis on Windows, Linux, and cloud platforms
Scripting experience (e.g., Python, PowerShell)
Certifications (Preferred):
CISSP
GCIH or EC-Council Certified Incident Handler
CFCE
GCFA
GCIA
Analytical Skills:
Strong analytical mindset; ability to connect complex threat data
Skilled in troubleshooting and decision-making under pressure
Soft Skills:
Excellent communication and collaboration skills
Capable of explaining technical issues to non-technical stakeholders
Resilient in high-pressure and escalated scenarios
Work Environment:
Fast-paced SOC environment
Availability for after-hours or weekend work during incidents
On-call rotation may be required
Person Specification
Strong communication and client-facing skills
Assertive yet collaborative approach
Team leadership and mentoring experience
Supportive team member with a problem-solving mindset
Psychiatric Nurse Practitioner - New Mexico (#R10077)Location: Multiple Locations (Albuquerque, Las Vegas, Roswell, Truth or Consequences, Santa Clara, and Los Lunas, NM)Employment Type: Full-Time Hourly Rate: Up to $69.46 About Greenlife Healthcare Staffing...
...and medical conditions, and providing advice and emotional support to patients and/or family members, running therapeutic groups, psychiatric crisis intervention, seclusion and restraint of patients. RNs record patients medical histories and symptoms, help to perform...
...training through our program, you will be in either Gallipolis, OH, Wyatt, MO, or Paducah, KY until May. You will stay on a quarters barge or boat when possible, but if there isnt availability, accommodations and travel will be reimbursed. Is it time to set your...
**Primary City/State:**Sun City, Arizona**Department Name:**Patient Transport**Work Shift:**Night**Job Category:**Clinical SupportGreat careers start with great training. The people of Banner Health are focused on delivering excellent care to our patients. In return...
...What makes DHL great? Our People! We know each employees individual contributions make us the #1 Express Delivery and Logistics Company in the world. Distinguished as No. 1 Worlds Best Workplace by Great Place to Work and Fortune Magazine DHL Express is committed...