24/7 SOC Analyst
Role details
Job location
Tech stack
Job description
This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You'll be hands-on with live incidents, real attackers, and industry-leading tools - not just alert watching.
What you'll be doing
- Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
- Analysing attacker behaviour & building incident timelines
- Escalating incidents with clear technical context
- Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
- Contributing to threat hunting, detection improvements & SOC evolution
Requirements
️ 1+ year SOC experience or 3+ years infra/networking with security exposure
️ Experience investigating alerts & understanding attack chains
️ Strong log analysis & endpoint/network fundamentals
️ Familiarity with Windows, Linux & macOS
️ Curious, analytical mindset with a genuine interest in cyber defence
(Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Benefits & conditions
Shift pattern
- 12-hour shifts: 2 days / 2 nights / 4 off
- Flexibility required during major incidents
Clearance
- SC clearance eligibility required (DV advantageous)
Why join?
- Fully remote role (UK-based)
- Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
- Structured training, cyber ranges & real investigation exposure
- Collaborative, technical SOC culture
- Competitive salary + strong benefits