SOC Analyst

Sopra Steria Limited
Hemel Hempstead, United Kingdom
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Shift work
Languages
English
Compensation
£ 58K

Job location

Hemel Hempstead, United Kingdom

Tech stack

Bash
C++
Client Server Models
Computer Security
Computer Programming
Databases
Perl
Hypertext Transfer Protocols (HTTP)
Virtual Private Networks (VPN)
Python
Lightweight Directory Access Protocols (LDAP)
Simple Mail Transfer Protocols
Networking Basics
Powershell
Security Information and Event Management
TCP/IP
Wide Area Networks
Scripting (Bash/Python/Go/Ruby)
File Transfer Protocol (FTP)
Mitre Att&ck
QRadar
Firewalls (Computer Science)
SC Clearance
Microsoft Sentinel
Splunk
Service Stack

Job description

Join our fast-growing Security Operations Centre, where you'll help defend multiple organisations across a wide range of industries - from critical infrastructure to complex enterprise environments. As part of our SOC team, you'll play a key role in strengthening and maturing our services, helping deliver smart, efficient and high-impact security outcomes for our clients.

You won't just monitor alerts. You'll investigate, enhance detection capability, influence processes and help shape how we defend modern environments. You'll gain exposure to real-world threats, diverse technology stacks and large-scale operations - giving you the kind of hands-on experience that accelerates careers. If you're curious, analytical and enjoy solving problems that genuinely matter, this could be your next challenge. Our team operates a 24/7 SOC. This role involves working day and night shifts.

Office based in Hemel Hempstead.

You must be eligible for SC Clearance.

What you'll be doing:

  • Monitoring and analysing security alerts and events, conducting initial investigations responding.
  • Escalating complex incidents to Senior Analysts for deeper analysis and resolution.
  • Managing SOC incident queues.
  • Maintaining and improving asset baselines across customer environments.
  • Producing clear, insightful reports for both technical and non-technical audiences.
  • Enhancing detection rules and use cases aligned to MITRE ATT&CK and threat-informed defence.

Requirements

  • Hands-on experience with Microsoft Sentinel and Splunk.
  • Knowledge of the MITRE ATT&CK framework.
  • Understanding of client-server and multi-tier applications, databases, firewalls, VPNs and endpoint security.
  • Solid networking fundamentals (TCP/IP, LAN/WAN, HTTP, SMTP, FTP, LDAP, etc.).
  • Strong analytical thinking and structured problem-solving.
  • An entry-level cyber security certification (e.g. Security+, CEH, CPSA) or similar.

It would be great if you had:

  • ?Scripting or programming skills (Python, PowerShell, Bash, Perl, C++).
  • Broader SIEM experience (e.g. QRadar).
  • Additional SOC or CREST certifications.

Apply for this position