Security Operations Center Analyst

Opportunitywe
High Wycombe, United Kingdom
yesterday

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior

Job location

Remote
High Wycombe, United Kingdom

Tech stack

Microsoft Windows
Microsoft Active Directory
Amazon Web Services (AWS)
Azure
Data Security
Linux
Security Information and Event Management
TCP/IP
Splunk
SentinelOne Expertise

Job description

Key ResponsibilitiesIncident Response: Lead the detection, triage, and remediation of security events across cloud, on-prem, and hybrid environments.Threat Hunting: Proactively search for undetected threats using SIEM, EDR, and specialized Data Security Platforms.Alert Optimization: Work closely with the engineering team to tune detection logic, reducing "noise" and improving True Positive rates.Forensics & Analysis: Conduct deep-dive analysis into malicious files, suspicious emails, and anomalous user behaviour.Stakeholder Communication: Provide clear, concise briefings to technical and non-technical leadership during high-priority incidents.

Requirements

Your Technical ProfileWe are looking for a candidate who is "curious by nature" and possesses:Experience: 3+ years in a dedicated SOC or Incident Response role.The "Data" Mindset: Strong understanding of Data Security Platforms (DSPM) or File Integrity Monitoring (FIM) is highly desirable.Technical Stack: Proficiency with modern SIEMs (e.g., Sentinel, Splunk) and EDR tools (e.g., CrowdStrike, SentinelOne).Networking & OS: Deep knowledge of TCP/IP, Active Directory, and Windows/Linux internals.Cloud Proficiency: Comfortable investigating incidents within AWS, Azure, or M365 environments.Certifications (Bonus): GCIH, GCIA, SC-200, or equivalent industry-recognized credentials.

Benefits & conditions

Why Join This Team?Competitive Package: Up to £65k base plus a rewarding bonus structure.Advanced Tooling: You will have access to enterprise-grade, cutting-edge security proprietary tools that most analysts only dream of using.Growth Path: Clear progression into Senior SOC, Incident Response Lead, or Security Engineering.

About the company

The OpportunityWe are representing a global leader in Data Security and Insider Risk to find a high-calibre SOC Analyst to join their internal security operations. This isn't your typical \"ticket-churning\" MSP role. You will be part of a sophisticated, data-centric security team focused on protecting critical infrastructure and high-value data assets.If you are a security professional who loves hunting through logs, identifying complex lateral movement, and automating responses rather than just staring at a dashboard-this is for you.

Apply for this position