[Hiring] L3 SOC Analyst @Saviynt
L3 SOC Analyst @Saviynt
Artificial Intelligence
Salary unspecified
Remote Location
remote UK
Employment Type full-time
Posted 2mths ago

[Hiring] L3 SOC Analyst @Saviynt

2mths ago - Saviynt is hiring a remote L3 SOC Analyst. πŸ’Έ Salary: unspecified πŸ“Location: UK

Role Description

Saviynt's AI-powered identity platform manages and governs human and non-human access to all of an organization's applications, data, and business processes. Customers trust Saviynt to safeguard their digital assets, drive operational efficiency, and reduce compliance costs. Built for the AI age, Saviynt is today helping organizations safely accelerate their deployment and usage of AI.

Location: United Kingdom

Type: Full-time, permanent

Due to the nature of the UK Government projects this role supports, this position is classified as a Reserved Post. In accordance with the Civil Service Nationality Rules, we can only accept applications from persons with UK residency (at least five years). Successful candidates must undergo National Security Vetting (NSV). This role requires Security Check SC level clearance as a minimum.

To meet the vetting criteria, you will be required to have been resident in the UK for a minimum of 5 years immediately prior to your application. Failure to obtain clearance or a lapse in residency history may result in the withdrawal of the employment offer.

In line with the Immigration, Asylum and Nationality Act 2006, all shortlisted candidates will be required to provide original documentation verifying their Right to Work in the UK and their British Citizenship during the initial interview stage.

Role Overview:

We are establishing a modern Security Operations Centre designed to deliver proactive, intelligence-driven security outcomes. The L3 SOC Analyst will act as the senior technical escalation point within the SOC, leading complex investigations, driving automation initiatives, and mentoring junior analysts.

WHAT YOU WILL DO:

  • Incident Response & Technical Escalation
    • Act as the final escalation point for complex incidents originating from L1/L2 analysis.
    • Lead investigations into high-severity security events, including those impacting AWS, Kubernetes clusters, and hybrid environments.
    • Perform advanced forensic analysis across endpoints, cloud workloads, and network telemetry to determine root cause, impact, and remediation actions.
    • Correlate telemetry from SIEM, EDR, CSPM, and cloud-native sources to identify sophisticated attack chains.
  • Security Automation & SOAR Engineering
    • Design, develop, and maintain automated response playbooks within the SOAR platform to improve response efficiency.
    • Build and maintain automation scripts (Python, Go, etc.) for alert enrichment, evidence collection, and containment.
    • Integrate security platforms via APIs to enable streamlined, automated detection and response workflows.
    • Identify opportunities to reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) through automation and process optimisation.
  • Threat Hunting & Detection Engineering
    • Conduct proactive threat hunting across enterprise and cloud environments using intelligence-driven and hypothesis-based methodologies.
    • Serve as an SME for cloud security monitoring leveraging tools such as AWS GuardDuty, CloudTrail, CrowdStrike, and Proofpoint.
    • Develop and tune SIEM detections, correlation rules, and EDR queries aligned to MITRE ATT&CK tactics and emerging threat intelligence.
  • Mentorship & Continuous Improvement
    • Provide technical mentoring and guidance to L1/L2 analysts to strengthen SOC capability.
    • Maintain and enhance SOC documentation including SOPs, runbooks, and response playbooks.
    • Analyse incident trends and operational metrics to recommend improvements in detection coverage, automation effectiveness, and security posture.

Qualifications

  • Bachelor’s degree in Computer Science, Cybersecurity, or related discipline (or equivalent industry experience).
  • Extensive experience in Security Operations with demonstrable time in a senior analyst, threat hunter, or L3 role.
  • Strong hands-on experience in cloud security monitoring and incident response across AWS - AWS experience is essential for this role.
  • Proven scripting and automation capability using Python, Go, PowerShell, Bash, etc.
  • Practical experience with SOAR platforms (e.g., CrowdStrike Fusion SOAR) and SIEM technologies (e.g., CrowdStrike Falcon, Splunk, QRadar, Microsoft Sentinel).
  • Deep understanding of EDR tooling, host/network forensics, and detection engineering practices.
  • Strong working knowledge of the MITRE ATT&CK framework and its application in threat detection and hunting.

Requirements

  • Complete security & privacy literacy and awareness training during onboarding and annually thereafter.
  • Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to):
    • Data Classification, Retention & Handling Policy
    • Incident Response Policy/Procedures
    • Business Continuity/Disaster Recovery Policy/Procedures
    • Mobile Device Policy
    • Account Management Policy
    • Access Control Policy
    • Personnel Security Policy
    • Privacy Policy

Benefits

  • High-growth, Platform as a Service company focused on Identity Authority.
  • Tremendous growth and learning opportunities through challenging yet rewarding work.
  • Welcoming and positive work environment.

Company Description

Saviynt is an amazing place to work. If you're resilient and enjoy working in a dynamic environment you belong with us!

Saviynt is an equal opportunity employer and we welcome everyone to our team. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.

Before You Apply
️
remote Be aware of the location restriction for this remote position: UK
β€Ό Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
L3 SOC Analyst @Saviynt
Artificial Intelligence
Salary unspecified
Remote Location
remote UK
Employment Type full-time
Posted 2mths ago
Apply for this position
Did not apply βœ“
Applied βœ“
Sent Follow-Up βœ“
Interview Scheduled βœ“
Interview Completed βœ“
Offer Accepted βœ“
Offer Declined βœ“
Application Denied βœ“
Unlock 160,000+ Remote Jobs
️
remote Be aware of the location restriction for this remote position: UK
β€Ό Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
Apply for this position
Did not apply βœ“
Applied βœ“
Sent Follow-Up βœ“
Interview Scheduled βœ“
Interview Completed βœ“
Offer Accepted βœ“
Offer Declined βœ“
Application Denied βœ“
Unlock 160,000+ Remote Jobs
Γ—

Apply to the best remote jobs
before everyone else

Access 160,000+ vetted remote jobs and get daily alerts.

4.9 β˜…β˜…β˜…β˜…β˜… from 500+ reviews
Unlock All Jobs Now

Maybe later