
L3 SOC Analyst
Saviynt
full-time
Posted on:
Location Type: Remote
Location: United Kingdom
Visit company websiteExplore more
About the role
- Act as the final escalation point for complex incidents originating from L1/L2 analysis.
- Lead investigations into high-severity security events, including those impacting AWS, Azure, Kubernetes clusters and hybrid environments.
- Perform advanced forensic analysis across endpoints, cloud workloads, and network telemetry to determine root cause, impact, and remediation actions.
- Correlate telemetry from SIEM, EDR, CSPM, and cloud-native sources to identify sophisticated attack chains.
- Design, develop, and maintain automated response playbooks within the SOAR platform to improve response efficiency.
- Build and maintain automation scripts (Python, Go, etc.) for alert enrichment, evidence collection, and containment.
- Integrate security platforms via APIs to enable streamlined, automated detection and response workflows.
- Identify opportunities to reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) through automation and process optimisation.
- Conduct proactive threat hunting across enterprise and cloud environments using intelligence-driven and hypothesis-based methodologies.
- Serve as an SME for cloud security monitoring leveraging tools such as AWS GuardDuty, CloudTrail, CrowdStrike, and Proofpoint.
- Develop and tune SIEM detections, correlation rules, and EDR queries aligned to MITRE ATT&CK tactics and emerging threat intelligence.
- Provide technical mentoring and guidance to L1/L2 analysts to strengthen SOC capability.
- Maintain and enhance SOC documentation including SOPs, runbooks, and response playbooks.
- Analyse incident trends and operational metrics to recommend improvements in detection coverage, automation effectiveness, and security posture.
Requirements
- Bachelor’s degree in Computer Science, Cybersecurity, or related discipline (or equivalent industry experience).
- Extensive experience in Security Operations with demonstrable time in a senior analyst, threat hunter, or L3 role.
- Strong hands-on experience in cloud security monitoring and incident response across AWS, Azure, or GCP.
- Proven scripting and automation capability using Python, Go, PowerShell, Bash, etc.
- Practical experience with SOAR platforms (e.g., CrowdStrike Fusion SOAR) and SIEM technologies (e.g., CrowdStrike Falcon, Splunk, QRadar, Microsoft Sentinel).
- Deep understanding of EDR tooling, host/network forensics, and detection engineering practices.
- Strong working knowledge of the MITRE ATT&CK framework and its application in threat detection and hunting.
Benefits
- UK Citizenship is mandatory due to data residency, customer contractual obligations, and potential security clearance requirements.
- Candidates must have the unrestricted right to work in the United Kingdom.
- Availability during weekends and outside standard working hours is expected to support critical incidents and urgent escalations.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
forensic analysisautomation scriptingincident responsecloud security monitoringthreat huntingdetection engineeringcorrelation rulesMITRE ATT&CKalert enrichmentremediation actions
Soft Skills
technical mentoringleadershipproblem-solvingcommunicationcollaborationanalytical thinkingprocess optimizationinvestigative skillsattention to detailadaptability
Certifications
Bachelor’s degree in Computer ScienceBachelor’s degree in Cybersecurityequivalent industry experience