Job Search and Career Advice Platform

Enable job alerts via email!

Lead SOC Analyst

Cyber Security training courses

Glasgow

On-site

GBP 100,000 - 125,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cyber defense training organization in Glasgow is seeking an experienced Lead SOC Analyst to join their team on a 12-month contract. You will oversee SIEM tools, manage incident response, and provide leadership to junior analysts in a 24/7 Security Operations Centre. The ideal candidate has strong problem-solving skills and hands-on experience with Splunk. Competitive daily rate of up to £633 offered, with a potential contract extension.

Benefits

Competitive daily rate
Potential for contract extension
Leadership opportunity in a high-performing team

Qualifications

  • Strong leadership skills with the ability to guide and mentor junior team members.
  • Hands-on experience with Splunk in a SOC environment.
  • Solid understanding of common cyber-attack techniques.

Responsibilities

  • Oversee SIEM tools to detect suspicious activity and ensure timely response.
  • Analyse alerts and logs to confirm genuine incidents and prioritise effectively.
  • Maintain detailed records of incidents for tracking and analysis.
  • Provide direction and support to junior analysts during shifts.

Skills

Leadership skills
Problem-solving abilities
SIEM tool experience
Attention to detail
Networking knowledge (TCP/IP, DNS)
Operating systems (Windows/Linux)

Education

Degree in Computer Science, Cybersecurity, IT or equivalent
Certifications like CompTIA Security+, CySA+

Tools

Splunk
Job description
Overview

We're partnering with a leading organisation seeking an experienced Lead SOC Analyst to join their team in Glasgow on a 12-month contract. This is a fantastic opportunity to take a leadership role within a 24/7 Security Operations Centre (SOC), protecting critical systems from cyber threats.

Responsibilities
  • Continuous Monitoring: Oversee SIEM tools (including Splunk) to detect suspicious activity and ensure timely response.
  • Incident Triage: Analyse alerts and logs to confirm genuine incidents and prioritise effectively.
  • Initial Incident Response: Execute containment actions and escalate complex cases to senior analysts.
  • Reporting & Documentation: Maintain detailed records of incidents and actions taken for tracking and analysis.
  • Team Leadership: Provide direction and support to junior analysts during shifts and ensure smooth handovers.
  • Tool Management: Assist in maintaining and optimising security tools for peak performance.
Qualifications
  • Strong leadership skills with the ability to guide and mentor junior team members.
  • Excellent problem-solving abilities, attention to detail, and ability to work under pressure.
  • Hands-on experience with Splunk in a SOC environment.
  • Solid understanding of networking (TCP/IP, DNS), operating systems (Windows/Linux), and common cyber-attack techniques.
  • A degree in Computer Science, Cybersecurity, IT, or equivalent experience.
  • Certifications such as CompTIA Security+, CySA+, or similar are highly desirable.
What You'll Get in Return
  • Competitive daily rate up to £633.
  • 12-month contract with potential for extension.
  • Opportunity to lead within a high-performing SOC team on mission-critical projects.
What you need to do now

If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career.

#4754672 - Kieran Kinnear

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.