img
Permanent

Senior Security Operations Center Analyst (f/m/d)

Gloucester
money-bag Negotiable
78448BE3E4C765C38D690029F4C7DC14
Posted 1 week ago

Overview

Introducing Thinkproject PlatformPioneering a new era and offering a cohesive alternative to the fragmented landscape of construction software, Thinkproject seamlessly integrates the most extensive portfolio of mature solutions with an innovative platform, providing unparalleled features, integrations, user experiences, and synergies. By combining information management expertise and in-depth knowledge of the building, infrastructure, and energy industries, Thinkproject empowers customers to efficiently deliver, operate, regenerate, and dispose of their built assets across their entire lifecycle through a Connected Data Ecosystem.What your day will look like

We are looking for a highly experienced and technically skilled Senior Security Operations Centre (SOC) Analyst to join our team and play a key role in identifying, investigating, and responding to advanced security threats, issues and vulnerabilities across our organization. This role requires deep expertise in monitoring and securing endpoints, networks, cloud platforms, applications, and infrastructure, with the ability to manage complex incidents independently and drive continuous improvement within the SOC function.As a senior member of the team, you will lead investigations into sophisticated threats such as advanced persistent threats (APTs), malware outbreaks, and targeted attacks. You will perform hands-on analysis of security events, including forensic evidence collection and root cause analysis, and contribute to the development of detection capabilities across SIEM, EDR, and other monitoring tools.You will actively engage in threat hunting, leveraging your deep understanding of application code, infrastructure and hosting architectures (cloud and on-premise), the software development lifecycle (SDLC), and CI/CD pipeline solutions to identify risks that span traditional and cloud-native environments. You will also play a key role in implementing and refining automation and playbooks utilising SOAR platforms to accelerate response efforts and reduce operational overhead.The ideal candidate will have a strong technical foundation and a proactive mindset, with a passion for staying ahead of current and emerging threats. You will collaborate closely with IT, DevOps, and application teams to improve detection coverage, enhance SOC processes, and ensure security operations are aligned with industry best practices and compliance requirements.This role encompasses reactive incident response, proactive detection engineering, threat hunting, and vulnerability management. You will also contribute to strategic initiatives including penetration testing coordination, security assessments, and audit preparation, while mentoring analysts, sharing threat intelligence insights, and maintaining SOC documentation and workflows.This role sits within the Product Operations and Corporate IT branch, reporting to the Director of Cyber Security and Networking, and operates as part of the broader Cyber Security, Network, and Security Engineering teams.

Main responsibilities:Independently investigate and respond to security alerts and events from SIEM, EDR, and other security tools across endpoints, networks, cloud platforms, and applications.Lead proactive threat hunting activities, leveraging threat intelligence, application logs, and infrastructure telemetry to uncover indicators of compromise or stealthy threat activity.Perform in-depth analysis of logs, API configurations and traffic, container environments, network data, application and infrastructure architecture, as well as data center hosting environments to support threat detection, incident investigation, and root cause analysis.Manage complex cybersecurity incidents end-to-end, including containment, eradication, recovery, and post-incident analysis, while coordinating closely with cross-functional stakeholders.Deploy, operate, configure, and tune SIEM platforms and detection tools to enhance signal accuracy, reduce alert fatigue, and maintain effective detection coverage.Design, build, and maintain incident response playbooks and automation workflows to increase the efficiency, speed, and consistency of incident response processes.Simultaneously manage multiple active investigations and day-to-day SOC operations, effectively prioritising tasks and managing time under pressure.Conduct forensic analysis during investigations, including evidence preservation, malware analysis, memory examination, and root cause identification.Collaborate with DevOps, IT, and development teams to ensure timely containment, mitigation, and remediation of vulnerabilities and threats.Coordinate outputs from security assessment tools and penetration tests, ensuring clear ownership and timely closure of identified issues.Participate in and lead security testing exercises to evaluate and strengthen detection capabilities and response procedures.Drive continuous improvement of SOC operations by identifying logging gaps, proposing monitoring enhancements, and introducing new detection or response technologies.Maintain comprehensive documentation of investigations, incidents, tuning efforts, and threat intelligence to support reporting, knowledge sharing, and audit readiness.Stay current with evolving threat landscapes, adversary techniques, and emerging security tools and practices to strengthen SOC capabilities.Adapt SOC processes, solutions, and procedures to enhance the monitoring of the organization''s IT network health.Ensure security operations and incident response practices are aligned with industry-recognised frameworks such as ISO 27001.Implement solutions within CI/CD pipelines to identify and block security issues reaching production environmentsSupport the development and refinement of SOC procedures, training materials, and operational standards to enhance maturity and consistency across the team.What you need to fulfill the role

You Must Have :Language and CommunicationProficiency in spoken and written English, with the ability to communicate effectively across both technical and non-technical audiencesThe ability to communicate difficult or sensitive information tactfullyEducation and Experience:A bachelor’s degree in Cyber Security or a related field, or equivalent professional experienceStrong knowledge of cybersecurity principles, threat landscapes, and incident response proceduresAwareness of current and emerging cyber threats affecting SaaS organisationsTechnical Skills:Hands-on experience with implementation, ongoing management and maturing of Security Information and Event Management (SIEM) tools, Endpoint Detection and Response (EDR) platforms, threat intelligence platforms, and vulnerability identification toolsExperience integrating custom-built applications into SIEM platformsExperience with implementation of automation solutions, enhancing SOC efficiency and speeding incident responseFamiliarity with Security Orchestration, Automation, and Response (SOAR) platforms, including developing and maintaining automated response playbooksExperience with threat hunting focused on application code, application, infrastructure and hosting architecture, leveraging coding skills and a solid understanding of the software development lifecycle (SDLC) and infrastructure componentsExperience managing security issues identified through internal tools and external assessments, ensuring remediation is completed in line with company policies and standardsKnowledge of common security frameworks and best practicesExperience implementing solutions to detect and block security risks in CI/CD pipelines to prevent vulnerable code from being deployed into productionSOC Operations:Experience in complex incident response and investigation, including forensic evidence handling and root cause analysisExperience managing business-as-usual (BAU) security operations workload alongside project-based work, both independently and in coordination with other team membersExperience managing outputs from cybersecurity assessment tools, coordinating timely mitigation and remediation with key stakeholders.Experience coordinating outsourced penetration tests, ensuring smooth execution without service disruptionExperience conducting security assessment exercises to evaluate SOC operational effectiveness and the organisation’s ability to respond to cybersecurity incidentsExperience in tuning detection rules and alerts to improve accuracy and reduce false positives in security monitoringTechnical Expertise:Experience with Azure, Azure AD, and AWS technologies and servicesExperience conducting forensic analysis of cybersecurity incidentsTeamwork and Leadership:A positive, self-motivated attitudeThe ability to work effectively in a team environment, collaborating with cross-functional teams to achieve shared objectivesStrong time management and prioritisation skills, with the ability to manage your own workloadThe ability to perform effectively under pressure, prioritise tasks, and make sound decisions in high-stress or emergency situationsA proactive mindset with the ability to critically evaluate your own work, identify improvement opportunities, and automate, simplify, or standardise processes where appropriateIt Would Be Good to Have:Language Skills:Proficiency in German (spoken and written)SOC OperationsExperience conducting red or purple team exercises to validate detection capabilities and improve response playbooksFamiliarity with security operations in containerised environments and microservices architectures (e.g., Kubernetes, Docker)Technical Skills:Understanding of advanced detection engineering techniques, such as creating custom correlation rules and behavioural analytics in SIEM platformsExposure to secure software development practices and security testing of APIs, containers, and cloud-native applicationsExperience conducting both external and internal penetration testing of applications and infrastructure.Technical Expertise:Experience with Microsoft Sentinel SIEM SolutionsExperience working within a SaaS or software-driven organisation, particularly in multi-tenant or cloud-native environmentsExperience with AI technologies, including understanding the cybersecurity threats they pose to organizations and how they can be leveraged to enhance operational effectiveness.What we offer

Lunch ''n'' Learn Sessions I Women''s Network I LGBTQIA+ Network I Coffee Chat Roulette I Free English Lessons I Thinkproject Academy I Social Events I Volunteering Activities I Open Forum with Leadership Team (Tp Café) I Hybrid working I Unlimited learningWe are a passionate bunch here. To join Thinkproject is to shape what our company becomes. We take feedback from our staff very seriously and give them the tools they need to help us create our fantastic culture of mutual respect. We believe that investing in our staff is crucial to the success of our business.Your contact:

Vikas GaikwadPlease submit your application, including salary expectations and potential date of entry, by submitting the form on the next page.Working at thinkproject.com -

think career. think ahead.#LI-VG1

#J-18808-Ljbffr

Other jobs of interest...

LJ Recruitment
WithamYesterday
money-bagNegotiable
ANSON MCCADE
StevenageYesterday
money-bag£70,000 per annum
Tesco
Welwyn Garden CityYesterday
money-bagNegotiable
LJ Recruitment
Witham4 days ago
money-bag40000.00-40000.00 Annual
CV-Library
Newport Pagnell5 days ago
money-bag£65000 - £70000/annum Bonus
LJ Recruitment Limited
Witham5 days ago
money-bag£60,000
CV-Library
Witham6 days ago
money-bag£40000 - £60000/annum
SHD Recruitment
Welwyn Garden City1 week ago
money-bagNegotiable
PayPoint plc.
Welwyn Garden City1 week ago
money-bagNegotiable

Perform a fresh search...

  • Create your ideal job search criteria by
    completing our quick and simple form and
    receive daily job alerts tailored to you!

Jobs. Straight to your inbox!