Junior SOC Analyst

Leeds, GB

BAE Systems

View company page

 

Location(s): UK, Europe & Africa : UK : Leeds 

 

BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.

BAE Systems have been contracted to undertake the day to day operation of (and incremental improvement of) a dedicated Security Operations Centre (SOC) to support the defence of a major UK CNI organisation.  The networks protected are predominantly hosted in Azure and AWS cloud platforms, with many hundred systems within these environments that must be protected.  The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to.

The SOC will be staffed by a blend of customer and BAE Systems staff, based in multiple locations, but with the day to day operations based from our Leeds office (due to the need for customer network access available at this location).

The SOC Analyst roles are ‘hands-on’ shift based roles, working as part of a 24/7 operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC’s SIEM and SOAR toolsets to detect and investigate potential Security and Service Incidents occurring within the monitored networks.

These roles require a minimum of SC clearance and be prepared to undergo DV clearance.  Due to timelines for the start of operations, it will not be possible to sponsor new clearances so candidates must have existing clearances.

Initial requirements are for a blend of 6 month and 12 month roles, which may be extended in future subject to other programme variables that will be clarified during delivery. Position is expected to work from company offices on a full time basis.

Responsibilities

 

  • Monitor, triage, analyse and investigate alerts, log data and network traffic using the Protective Monitoring platform and Internet resources to identify cyber-attacks / security incidents.
  • Categorise all suspected incidents in line with the Security Incident policy
  • Recognise potential, successful and unsuccessful intrusion attempts and compromises through reviews and further analysis of relevant event detail and incident summary information.
  • Write up high quality security incident tickets using a combination of existing knowledge resources and independent research.
  • Assist with remediation activities (or support customer stakeholders) to inhibit cyber-attacks, clean up IT systems and secure networks against repeat attacks.
  • Produce security incident review reports to present information about the security incident and provide security improvement recommendations based on the security incident review.
  • Understand Threat Intelligence and its use in an operational environment
  • Support incident response to national scale incidents in a coaching capacity
  • Work with other teams within BAE to improve services on the basis of customer needs.

 

Requirements

 

Technical

  • Basic Python and/or scripting skills, Windows, OS X, and Linux
  • Experience using Splunk and Sentinal
  • Working with a range of security tooling/technology
  • Strong understanding of security architecture, in particular networking
  • Detailed understanding of threat intelligence and threat actors, TTPs and operationalising threat intelligence.
  • Experience in investigating complex network intrusions (by state-sponsored groups or targeted ransomware attacks).
  • Understand TCP/IP component layers to identify normal and abnormal traffic
  • Understanding of AWS &/or Azure cloud services
  • Experience of Splunk (with ES) &/or Sentinel, content development experience desirable

 

Non-technical

  • Client side consulting, including stakeholder engagement and the ability to communicate insights and concepts to others (including briefing skills and report writing)
  • Security process development
  • Able to understand and adapt to different cultures and hierarchical structures.
  • Self-starter and capable of independent working

 

Desirable

  • Software engineering experience
  • Penetration testing skills

Life at BAE Systems Digital Intelligence 

We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day.

By embracing technology, we can interact, collaborate and create together, even when we’re working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance well-being.

Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds – the best and brightest minds – can work together to achieve excellence and realise individual and organisational potential.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: AWS Azure Clearance Cloud Incident response Linux Monitoring Pentesting Python Scripting SIEM SOAR SOC Splunk TCP/IP Threat intelligence TTPs Windows

Perks/benefits: Startup environment

Region: Europe
Country: United Kingdom
Job stats:  76  16  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.