SOC Analyst (Level 1) - Systems Integrator

Hamilton Barnes
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Compensation
£ 32K

Job location

Tech stack

Azure
Cloud Computing Security
CompTIA Security+
Computer Security
DNS
Hypertext Transfer Protocols (HTTP)
Intrusion Detection Systems
Virtual Private Networks (VPN)
Log Analysis
Kusto Query Language
Security Information and Event Management
TCP/IP
In-Plane Switching (IPS)
Firewalls (Computer Science)
Azure Security Center
Microsoft Sentinel

Job description

Looking to defend organisations against cyber threats and work at the forefront of security operations?Join a leading UK technology and managed services provider that helps businesses stay secure, connected, and resilient. As a SOC Analyst, you will monitor, detect, and respond to security incidents across client environments, leveraging cutting-edge tools and best-in-class processes. The role offers hands-on experience with real-world cyber challenges while working within a supportive, expert-led team dedicated to protecting critical business operations.Ready to take your cybersecurity expertise to the next level and make a tangible impact? Apply now.Responsibilities:

  • Monitor and triage security alerts across SIEM, EDR, XDR, and other detection technologies.
  • Investigate potential security incidents and escalate in line with established processes.
  • Collaborate with senior analysts and threat response teams to resolve incidents efficiently.
  • Maintain detailed documentation of investigations, incidents, and actions taken.
  • Provide guidance and support to clients on incident handling and mitigation.
  • Support the creation and tuning of detection rules, threat-hunting queries, and analytics.
  • Stay current on emerging threats, attacker behaviours, and new security technologies.

Requirements

Skills / Must Have:

  • Experience with SIEM platforms (e.g., Microsoft Sentinel, Rapid7) and log analysis.
  • Ability to query and interpret log data; familiarity with KQL is beneficial.
  • Exposure to EDR tools such as CrowdStrike, Microsoft Defender for Endpoint, or Carbon Black.
  • Understanding of malware behaviour, IoCs, and basic analysis techniques.
  • Knowledge of networking fundamentals (TCP/IP, DNS, HTTP/S, SMB, RDP) and core security concepts (IDS/IPS, firewalls, VPNs).
  • Familiarity with cloud security monitoring, especially in Microsoft Azure.
  • Degree in Cybersecurity/IT or equivalent practical experience.
  • Strong attention to detail, process-driven approach, and excellent written and verbal communication.
  • Willingness to work in a collaborative, shift-based SOC environment.
  • Security-minded, ethical attitude with a desire to continuously learn.

Benefits & conditions

  • CompTIA Security+
  • Microsoft SC-200
  • Security Blue Team - BTL1
  • Benefits:
  • Career progression pathways into threat hunting, incident response, engineering, or senior SOC roles.
  • Hands-on experience with industry-leading security tools and real-world incidents.
  • Mentorship from experienced analysts to accelerate your development.
  • Support for certifications and ongoing professional training.
  • A collaborative, high-growth environment with access to diverse client environments., * £32,000 + 15% shift allowance

Apply for this position