Jobs

Security Monitoring Shift Lead


Job details
  • LRQA
  • Birmingham
  • 3 months ago

We are looking for

the right people to join us as we embrace the challenges thrown up by the advancements within the IT industry and within the threats faced. Nettitude will be at the forefront of this arena and we want to seek the right people to join the team and make it happen.

You can find out more about us at . If you want to review our research and tooling, then head on over to 

The role

The purpose of this role is to take the lead of one of our technical, high-performing / security operations teams. It will involve being accountable for the effective functioning of the team by ensuring performance standards and continuously developing capability as an integral part of our high-trust, high-performing service.

You will use your winning combination of management and security operations experience to enable the effective functioning of our award-winning defensive monitoring service, proactively securing and monitoring our clients across the globe. Your first priority is to the team, although it doesn’t end there; you will also be expected to be hands-on, performing technical tasks ranging from deep dive investigations and incident response escalations all the way through to threat hunting, tuning detections, technical training and process improvements.

Location

This role is remote within the UK, with an expectation of at least one day a month in the office for team building, workshops and clinic days. We can support working from across the UK. All applicants will require residence in the UK.

What you'll be doing in your role: Responsibility for the line management, mentoring and development of a / technical security operations team Act as a point of escalation and subject matter expertise for incidents escalated from junior analysts or customers; including coordination of internal and external client resources to contain, eradicate, and recover from Incidents, within and out of hours as part of an on-call rota Maintain regular verbal and written communication with customers, suppliers and stakeholders, internally as required.  Responsible for providing Task and Resource Management of Analyst Teams to ensure the smooth operation of the SOC Monitor Service, including task delegation in alignment with priorities Support efforts to maintain a high-performing service through continuous improvement to operational processes, analyst capabilities, platform efficiency and quality assurance Lead and Facilitate the Development of the wider SOC team through technical training courses, workshops and exercises Lead efforts to develop and integrate our Threat Hunting playbooks, processes and projects Maintain an awareness of the latest Defensive Monitoring technologies and trends Deputised lead of the wider SOC Monitor team as the on-duty senior member of staff where a member of senior manager is not present Key Skills:

The following are the requirements for this role:

Strong experience in team leadership, coaching, task allocation and providing actionable, constructive feedback for improvement, including conducting regular s Strong experience in leading incident management, incident handling, problem management and performance management in a Controlled Environment Developed technical capability with SIEM, EDR/EPP, NDR and NetMon Tools – usage, configuration, and architecture including rule writing Demonstrable experience in analysing log data across multiple device types and sources as part of incident management Experience of attack vectors, with the ability to differentiate between normal and abnormal activity, making sensible recommendations on countermeasures and remediation activities Experience in a customer-facing role; communicating to different levels of stakeholders, both internal and external Experience within cloud-enabled environments and how this affects monitoring Good understanding of what makes a capable, high-performing SOC team Good understanding of common scripting languages across Windows and Linux devices, and how these can be abused in a malicious context Demonstrable high levels of emotional intelligence when supporting colleagues, peers and direct reports Ability to attain Security Clearance (SC)

There are no formal requirements for any qualifications or certifications. We’re not looking for badge collectors; we look far deeper than that. However, one or more of the following may serve as an distinct advantage.

SC-: Microsoft Security Operations Analyst CREST CPIA, CRIA, CPTIA or above EDR-vendor certifications Azure/AWS/GCP Administrator/Engineer, DevOps or Data Defensive Security or similar industry recognised certifications ( GIAC, SBT) are also well received

What we offer:

We are a people-focused, high-performing, high-trust managed security services team. We pride ourselves on our investment in our people, meaning as we are a fast-evolving team in an exciting working environment, you’ll always have opportunities to solve the latest cybersecurity challenges, with the responsibility and development opportunities to match.

Company benefits: 

Access to our interactive learning platforms via our partners, with encouragement to pursue subsidised external training & certification Intensive new starter training program, blending theory, hands-on labs, case studies, online and on the job training to help you hit the ground running Frequently updated training & progression plans with multiple tracks of development, supporting lateral movement or upwards progression Generous annual training, cross-training and project days The option to join in with company and department socials to relax, get to know your new colleagues and team build (currently virtual) Yearly wellness day to be spent in the way that works best for you Recognition & rewards for individual, team and department performance Performance-based bonus programme Generous pension scheme A supportive team enabling you to succeed and grow your career

An attractive remuneration package will be provided. LI-Nettitude

Sign up for our newsletter

The latest news, articles, and resources, sent to your inbox weekly.

Similar Jobs

Junior SOC Analyst

Junior SOC Analysts have responsibility for leading incident response efforts, monitoring security events, analysing logs and data for threats, providing proactive threat intelligence, managing security tools, mentoring shift leads, preparing comprehensive incident reports, conducting security assessments, coordinating incident handling, promoting security awareness, and driving continuous improvement within the SOC. The...

Leeds

L3 SOC Analyst

L3 SOC Analyst (Fully Remote)Salary - Up to £65,000 + Shift Allowance Bonus + Additional Corporate Benefits Package!The Client: A leading technology MSSP requires a security operations analyst (L3)Job Description:As an experienced Senior Cyber Security Operations Analyst, You will be responsible for handing security incidents received/escalated from the CSOC Analyst...

Lorien London

Microsoft Sentinel Engineer

Microsoft Sentinel EngineerAkkodis are currently working in partnership with a leading service provider to recruit an experienced Microsoft Sentinel Engineer with expertise of Microsoft Sentinel and QRadar to join their growing security team during an exciting period of change.Please note this is a fully remote role and you must be...

City of London

Senior SOC Analyst - Sentinel/QRadar

Senior SOC Analyst (Sentinel/QRadar)Akkodis are currently working in partnership with a leading service provider to recruit an experienced SOC Analyst with expertise of Microsoft Sentinel and QRadar to join their growing security team during an exciting period of change.Please note this is a fully remote role and you must be...

City of London

SOC Analyst/Sentinel Engineer

Microsoft Sentinel Engineer/L3 SOC AnalystAkkodis are currently working in partnership with a leading service provider to recruit an experienced Microsoft Sentinel Engineer with expertise of Microsoft Sentinel and QRadar to join their growing security team during an exciting period of change.Please note this is a fully remote role and you...

City of London

SOC Analyst/Sentinel Engineer

Microsoft Sentinel Engineer/L3 SOC AnalystAkkodis are currently working in partnership with a leading service provider to recruit an experienced Microsoft Sentinel Engineer with expertise of Microsoft Sentinel and QRadar to join their growing security team during an exciting period of change.Please note this is a fully remote role and you...

Akkodis London