SOC Cyber Analyst

Matchtech
Lugwardine, United Kingdom
11 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Junior
Compensation
£ 15K

Job location

Lugwardine, United Kingdom

Tech stack

Microsoft Windows
JIRA
User Authentication
Bash
CompTIA Security+
Computer Security
Linux
Hive
Information Technology Operations
Python
Powershell
Phishing
Security Support Provider Interface
Security Information and Event Management
Scripting (Bash/Python/Go/Ruby)
Mitre Att&ck
QRadar
Malware
Cybercrime
Microsoft Sentinel
Splunk
ServiceNow

Job description

We are seeking a Level 1 SOC Cyber Analyst to join a growing internal security function within a major defence and engineering organisation. This role is ideal for someone with a strong foundation in security operations who is ready to take ownership of first-line triage, investigation, and incident escalation activities. As the first internal responder to alerts generated by an outsourced SOC provider, you will play a crucial role in validating potential threats, engaging with users, and ensuring incidents are escalated through the correct channels. This is a hands-on, fast-paced role where your analytical mindset and communication skills will make a real impact., Alert Triage: Review and validate alerts escalated by the outsourced SOC, assessing accuracy and potential impact. Initial Investigation: Conduct first-line investigations using SIEM tools, device logs, firewall logs, and authentication data. User Engagement: Work directly with end users and asset owners to gather information, verify events, and support immediate containment actions (e.g., password resets, asset isolation). Incident Escalation: Escalate confirmed or high-severity incidents to Level 2 SOC teams or internal incident response teams with complete and accurate documentation. Case Documentation: Maintain detailed case notes, timelines, and evidence within the case management system. Collaboration: Act as a key link between the internal security team and the external SOC provider, ensuring strong communication and situational awareness. Playbook Execution: Follow established triage and escalation playbooks and contribute suggestions for improvement. Threat Awareness: Stay informed on current cyber threats, attacker techniques (e.g., MITRE ATT&CK), and industry trends.

Requirements

2-4 years' experience in a SOC, IT operations, or security support role. Understanding of core security concepts: malware, phishing, lateral movement, privilege escalation. Working knowledge of network fundamentals, Windows/Linux logs, and authentication systems. Experience with SIEM platforms such as Microsoft Sentinel, Splunk, Elastic, or QRadar. Desirable: Awareness of frameworks such as NIST CSF, MITRE ATT&CK, ISO27001. Experience working with MSSPs or outsourced SOC environments. Basic scripting or automation skills (PowerShell, Python, Bash). Skills Essential: Familiarity with ticketing/case management tools (e.g., Jira, The Hive, ServiceNow). Strong analytical skills with the ability to interpret logs and alerts. Excellent written and verbal communication skills, able to explain technical findings to varied audiences. Desirable: Exposure to managed security service environments. Interest in automation or scripting., Desirable: CompTIA Security+, CySA+, or similar entry-level certifications. Additional Information The role requires a strong commitment to safety, security, and compliance. You will be expected to follow organisational policies, report hazards, and maintain high standards of operational discipline. Due to the nature of the work, this role may be subject to security and export control restrictions.

Apply for this position