Security Operations Analyst / KQL / Cyber / Threat / SOAR / GCP / Azure / SOC
Security Operations Analyst
6 month contract (extensions likely)
London (Hybrid – Onsite/Remote)
Inside IR35
Superb London based client is seeking a Senior Security Operations Analyst for an initial 6 month contract, with high extension chances.
This is 2-3 days onsite, with rest remote.
Skills;
- Security Detection and Monitoring
- Carbon Black, Microsoft Defender XDR, FireEye, CrowdStrike
- Extensive KQL
- Microsoft Azure and Google Cloud Platform
- Kubernetes
- Docker
- Detection as Code / Configuration as Code / Infrastructure as Code
- Incident Response (including Incident Coordination, Communication and Report Writing)
- Detection Engineering
- MITRE ATT&CK
- Security Automation (SOAR) / Hyper automation
Advantageous;
- Zero Trust Network Architecture
- Penetration Testing
- Static and Dynamic
- Microsoft Sentinel, Splunk, ELK, Google Chronicle / SecOps SIEM
- Qualys, Nessus, Nexpose
- Suricata, Snort, Bro, Cisco, Palo Alto
- Bluecoat, Zscaler, Squid, Cisco/OpenDNS Umbrella
- CloudFlare, GCP VPC/Firewalls, Azure Conditional access, GCP Load Balancers, Palo Alto
- Python, Bash, PowerShell