SOC Analyst - 24/7 Secure Operations (Public Sector)
Role details
Job location
Tech stack
Job description
I'm currently working with a global consultancy delivering a major UK public sector programme, and I'm looking for an experienced SOC Analyst to join a 24/7 security operations team based on a secure site in Hursley, near Winchester. This is an operational, hands-on SOC role within a highly regulated environment, requiring onsite presence as part of a close-knit shift team.
What you'll be working on
You'll be responsible for providing Protective Monitoring services across a range of secure customers, operating as part of a collaborative SOC team alongside SOC Engineers and Service Managers. Your day-to-day work will focus on continuous security monitoring using SIEM platforms such as QRadar, Microsoft Sentinel and LogRhythm, identifying and responding to threats, investigating and triaging incidents, and escalating where appropriate. You'll contribute to incident response activities, trend analysis, reporting, rule tuning and continual service improvement, while working within a structured incident response lifecycle. This is a fast-paced operational role and may also include an out-of-hours on-call requirement.
What this role is and is not
This role is:
- A hands-on SOC analyst position focused on live monitoring, investigation and response
- An onsite role within a 24/7 secure operations environment
- A role suited to individuals who enjoy operational security, teamwork and threat monitoring
This role is not:
- A remote or hybrid role
- A GRC, policy or assurance-focused position
- A purely advisory or strategic security role
- Suitable for candidates without prior SOC or SIEM experience
Requirements
️ IMPORTANT ELIGIBILITY REQUIREMENT You must be a UK National with a minimum of 5 years' continuous UK residency to be considered for this role., * Microsoft Certified: Security Operations Analyst Associate (SC-200) - mandatory
- Hands-on experience with SIEM technologies and security tooling
- Security analytics and proactive threat monitoring
- Incident investigation, triage and escalation
- Threat detection, response and trend reporting
- Rule tuning and continual service improvement
- Understanding of IT infrastructure and networking
- Understanding of vulnerability and threat management
- Understanding of the incident response lifecycle
- Ability to work effectively both within a close team and independently
- Ability to adapt within a fast-paced, changeable workload
- A genuine interest in security operations and threat management, If you're an experienced SOC Analyst looking to work on a high-profile public sector programme within a secure operational environment, I'd be very happy to talk you through the role and next steps.