Contract SC ClearedSOC Analyst L3 The Role As a Lead SOC Analyst, you will take responsibility for advanced... Read more
Contract
SC Cleared
SOC Analyst L3
The Role
 As a Lead SOC Analyst, you will take responsibility for advanced incident analysis, investigation, and response, ensuring threats are identified, contained, and remediated effectively. You will act as a technical escalation point for complex security incidents and contribute to playbook development, tooling improvements, and incident reporting.
Key Responsibilities
Analyse and investigate complex security incidents using SIEM, EDR/XDR, cloud, and forensic data.
Lead incident response activities, providing technical expertise to remediate threats.
Advise on improvements to SOC playbooks, tooling, and processes.
Liaise with stakeholders across cloud platforms (AWS/Azure), endpoints, and critical business systems.
Translate technical findings into clear management briefings and risk insights.
Support compliance with frameworks such as NCSC CAF, ISO27001, and other CNI standards.
Provide input into crisis management exercises and major incident support.
Skills & Experience
3-5 years of SOC operations and cyber incident response experience.
Strong knowledge of adversary TTPs and frameworks (MITRE ATT&CK).
Hands-on experience with enterprise cloud security (Azure and/or AWS).
Skilled in log analysis, SIEM, forensic artefacts, and endpoint security tooling.
Ability to present complex information clearly to technical and non-technical stakeholders.
Professional certifications such as GCIH or equivalent are desirable.
GCS is acting as an Employment Business in relation to this vacancy.
Read lessfor the following search criteria