NTT DATA
Senior Soc Analyst L3
Job Location
Birmingham, United Kingdom
Job Description
This role will be based onsite in Birmingham, you will need to be willing to work in shift patters, probably 4 days on, 4 days off, as this is a 24/7 security operations centre. About Us NTT DATA is one of the world’s largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of the worlds most recognised Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. In a constantly changing world, we work together with our people, clients and communities to enable them to fulfil their potential to do great things. We believe that by bringing everyone together, we can solve problems using innovative technology that can create a world that is sustainable and secure. This is a great opportunity for you to play a pivotal role in helping to shape our client’s transformation journeys. What you will be doing; • The primary function of the Senior SOC Analyst L3 is to manage any incidents escalated by the SOC Analyst (L1 & L2) and undertake the detailed investigation of the Security Event. The Senior SOC Analyst shall be able to look at all the evidence available and support the client on the appropraite action to contain and remediate any security incident. They will need to be able to provide root cause analysis and liaise with the custiomer and the Service Delivery Manager as well and ensuring the actions of the SOC Analysts follow best practice. Job Duties • Security Monitoring: & Investigation: o Monitoring SIEM tools to assure high a level of security operations delivery function o Oversee and enhance security monitoring systems to detect and analyse potential security incidents. o Conduct real-time analysis of security events and incident and escalate as necessary o Support other teams on investigations into incidents, determining the root cause and impact. o Document findings and lessons learned to improve incident response procedures. o Ensure runbooks are followed and are fit for purpose • Incident Response: o Lead and coordinate incident response activities to effectively contain, eradicate, and recover from security incidents. o Develop and maintain incident response plans, ensuring they align with industry best practices. o Escalation management in the event of a security incident o Follow major incident process • Threat Intelligence: o Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. o Contribute to the development of threat intelligence feeds to enhance proactive threat detection. o Proactively hunt for threats within enterprise environments using SIEM and EDR solutions. o Fine-tune SIEM detection rules, correlation alerts, and log sources to reduce false positives. o Analyse threat intelligence feeds, map findings to MITRE ATT&CK framework, and provide actionable security recommendations. o Collaborate with SOC teams to investigate alerts, escalate incidents, and improve detection mechanisms. o Conduct adversary simulation exercises to test and improve detection capabilities. o Generate detailed reports on emerging threats, attack trends, and security posture improvements. o Monitored and analysed security logs from SIEM platforms to identify suspicious activity. • Security Tool Management: o Manage and optimise SIEM tools, ensuring they are properly configured and updated to maximize effectiveness. o Own the development and implementation of SOC Use Cases o Evaluate new security technologies and recommend enhancements to the security infrastructure. • Collaboration: o Collaborate with cross-functional teams, including IT, legal, and management, to address security incidents and implement preventive measures. o Provide expertise and guidance to other analysts. o Working with the Technical Teams to ensure all new and changed services are monitored accordingly • Documentation: o Maintain accurate and up-to-date documentation of security procedures, incident response plans, and analysis reports. o Create post-incident reports for management and stakeholders. o Support the creation of monthly reporting packs as per contractual requirements. o Create and document robust event and incident management processes, Runbooks & Playbooks • Other responsibilities: o Involvement in scoping and standing up new solutions for new opportunities o Assisting Pre-Sales team with requirements on new opportunities o Demonstrations of SOC tools to clients o Continual Service Improvement - Recommendations for change to address incidents or persistent event What experience youll bring; • Must be able to obtain SC Clearance or already hold SC clearance. • Must have a good understanding on Incident Response approaches • Must have knowledge and hands-on knowledge of Microsoft Sentinel (or any SIEM tool). • Strong verbal and written English communication. • Strong interpersonal and presentation skills. • Strong analytical skills • Must have good understanding on network traffic flows and able to understand normal and suspicious activities. • Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) • Ability to learn forensic techniques • Ability to reverse engineer attacks to understand what actions took place. • Knowledge of ITIL disciplines such as Incident, Problem and Change Management. • Ability to work with minimal levels of supervision. • Willingness to work in a job that involves 24/7 operations or on call. • Threat Hunting & Detection (IOC & IOA Analysis, TTP Profiling, Cyber Kill Chain) • SIEM Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) • Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) • Threat Intelligence Analysis • Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) • Malware Analysis & Reverse Engineering • Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience • Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment. • Preferably holds Cyber Security Certification e.g. ISC2 CISSP, GIAC, SC-200, Certified SOC Analyst • Experience with Cloud platforms (AWS and/or Microsoft Azure) • Excellent knowledge of Microsoft Office products, especially Excel and Word Reports to • Security Director – NTT DATA UK Security Practice • Client Delivery Director – NTT DATA UK Managed Service
Location: Birmingham, GB
Posted Date: 8/2/2025
Location: Birmingham, GB
Posted Date: 8/2/2025
Contact Information
Contact | Human Resources NTT DATA |
---|