Expire in: a month
Incident Response (CSIRT) / SOC Level 3 Analyst
Location: Crawley (Hybrid)
Department: Information Systems
Type: Contract | Full-time
Outside IR35
About the Role
My client is seeking an experienced Incident Response (CSIRT) / Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley.
In this critical role, you'll respond to high-severity cyber incidents and escalated security events, leveraging your technical expertise, analytical mindset, and industry-standard tools to contain, eradicate, and recover from cyber threats. Your work will directly contribute to safeguarding my client's network systems, operational technology, and customer data from emerging and sophisticated cyber risks.
Key Responsibilities
As a senior member of the Security Operations team, you will:
Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery.
Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats.
Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices.
Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation across cloud and on-prem environments.
Support and develop the organisation's SOAR platform, creating automated workflows and improving response efficiency.
Perform digital forensics investigations, analysing logs, network data, and system artefacts to determine root causes.
Participate in cyber crisis simulation exercises and continuous improvement initiatives to enhance resilience.
Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR).
Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge.
About You
You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving.
Essential Qualifications & Experience
Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting.
A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience.
Industry-recognised certifications such as CISSP, GIAC/GCIA/GCIH, AZ-500, CEH, CASP+, or SIEM-specific training.
Strong knowledge of SIEM, SOAR, EDR, IDS/IPS, NAC, DLP, and related security technologies.
Familiarity with frameworks such as MITRE ATT&CK, NIST, CIS, and ISO/IEC 27001/27002.
Hands-on experience with tools such as FortiSIEM, Q-Radar, Microsoft Defender, Darktrace, Microsoft Sentinel, or similar platforms.
Experience in forensic analysis, red-team exercises, and crisis simulation activities.
Desirable
Experience managing or supporting both IT and OT environments.
In-depth understanding of adversarial TTPs and complex threat landscapes
Do not include the following in your job application, CV, or cover letter:
You should not be asked for payment or irrelevant information. If you have concerns about a job advert or employer, seek guidance on how to proceed.
Looking for your next career move? Join a top company hiring Incident Response (CSIRT) / SOC Level 3 Analyst job near me in England! This is your chance to work on exciting projects, grow professionally, and enjoy a rewarding career with competitive pay and excellent benefits. Whether you're an experienced professional or looking to take the next step, this role offers the perfect opportunity to enhance your skills and make an impact. Don’t miss out—apply today via Vita CV and take your career to the next level!
© Vita CV: Registered in England and Wales (16187919).
Vita CV uses cookies to enhance your experience, analyze site traffic, and personalize content. By continuing to browse, you agree to our use of cookies.