Security Operations Center Analyst
Role details
Job location
Tech stack
Job description
Key ResponsibilitiesIncident Response: Lead the detection, triage, and remediation of security events across cloud, on-prem, and hybrid environments.Threat Hunting: Proactively search for undetected threats using SIEM, EDR, and specialized Data Security Platforms.Alert Optimization: Work closely with the engineering team to tune detection logic, reducing "noise" and improving True Positive rates.Forensics & Analysis: Conduct deep-dive analysis into malicious files, suspicious emails, and anomalous user behaviour.Stakeholder Communication: Provide clear, concise briefings to technical and non-technical leadership during high-priority incidents.
Requirements
Your Technical ProfileWe are looking for a candidate who is "curious by nature" and possesses:Experience: 3+ years in a dedicated SOC or Incident Response role.The "Data" Mindset: Strong understanding of Data Security Platforms (DSPM) or File Integrity Monitoring (FIM) is highly desirable.Technical Stack: Proficiency with modern SIEMs (e.g., Sentinel, Splunk) and EDR tools (e.g., CrowdStrike, SentinelOne).Networking & OS: Deep knowledge of TCP/IP, Active Directory, and Windows/Linux internals.Cloud Proficiency: Comfortable investigating incidents within AWS, Azure, or M365 environments.Certifications (Bonus): GCIH, GCIA, SC-200, or equivalent industry-recognized credentials.
Benefits & conditions
Why Join This Team?Competitive Package: Up to £65k base plus a rewarding bonus structure.Advanced Tooling: You will have access to enterprise-grade, cutting-edge security proprietary tools that most analysts only dream of using.Growth Path: Clear progression into Senior SOC, Incident Response Lead, or Security Engineering.