Charterhouse Group

Level 1 SOC Engineer

Charterhouse Group

full-time

Posted on:

Origin:  • 🇬🇧 United Kingdom

Visit company website
AI Apply
Manual Apply

Job Level

Mid-LevelSenior

Tech Stack

Cyber Security

About the role

  • Charterhouse Group is a UK based, PE backed, value-added reseller providing a wide range of technology solutions across the Unified Communications, Cyber Security, LAN and Microsoft Teams spaces.
  • We are looking for talented and highly motivated people. We understand that the key to our success is our people. For this reason, we are committed to attracting and retaining the best possible candidates. Therefore, we offer a fun, innovative and a fast-paced environment where career development, reward and recognition are a priority.
  • If you want to join a multi award-winning business, passionate about technology and its customers, credible in the market with a stimulating working environment - then we want to speak to you.
  • As a member of the SOC team, you will provide security analysis of customer security events, monitor, manage, and support highly secure customer environments with a focus on security event management, endpoint security, and next-generation intrusion prevention/firewalling for a portfolio of small and medium businesses.
  • This role is ideal for someone early in their cybersecurity career, looking to gain hands-on experience with enterprise-grade security technologies in a fast-paced SOC environment.
  • Monitor SIEM, EDR, and SOAR platforms for security alerts, ensuring timely detection and escalation.
  • Conduct initial triage of security events and incidents, escalating to L2/L3 teams when required.
  • Assist with running vulnerability scans and interpreting results.
  • Support incident response activities and document investigation findings.
  • Perform packet-capture analysis and support network traffic investigations.
  • Use threat intelligence sources to aid in investigations.
  • Maintain accurate shift logs and participate in daily SOC briefings.
  • Be part of an on-call rotation for after-hours support, when required.
  • Contribute to SOC knowledge base and process improvements.

Requirements

  • Microsoft Security configuration knowledge – Defender for Endpoint/Email/Sentinel
  • SIEM tool operations – Detection and response to security events (Rapid7, QRadar, LogRhythm, or similar)
  • EDR operations – Detection and response using SentinelOne, Microsoft Defender for Endpoint, or similar
  • Knowledge of vulnerability scanning tools (Rapid7 iVM, Qualys, or similar)
  • Understanding of SOAR platforms
  • Experience with packet-capture tools and analysis of packet flows
  • Familiarity with Behaviour Analytics platforms
  • Exposure to using Threat Intelligence in investigations
  • Strong understanding of network technologies and how cybersecurity risks affect them
  • Relevant certifications such as CompTIA Security+, Network+, CySA+, or equivalent