Senior Security Operations Centre Analyst Location: Gosport Salary: £48,000 per annum Role & Responsibilities As a Senior SOC Analyst, you will be at the forefront of digital defence—leading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: · Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) · Leading incident response and driving improvements in detection and containment strategies · Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck · Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre · Staying abreast of cyber threat developments and contributing to best practices and process enhancements · Supporting the continuous development of the SOC team through knowledge sharing and mentoring Security Clearance Level: Must be eligible for DV Clearance. Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the highest level. You must be a British National who has been resident in the UK for at least the last 10 years and you cannot have been outside the UK for more than 28 days on any one occasion within the last 5 years. Benefits: 25 days annual leave (with the option to purchase additional days), health cash plan, life assurance, pension scheme, and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOC Analyst who brings a strong background in security operations, threat detection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and Experience: · Proven experience in a Security Operations Centre (SOC) environment · Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk · Solid understanding of network protocols and infrastructure (e.g. TCP/IP, VPNs, firewalls) · Skilled in incident response and threat intelligence analysis · Familiarity with Mitre Att&ck framework and advanced threat detection techniques · Excellent analytical and problem-solving capabilities · Able to provide mentorship and leadership within a SOC team Desirable (Nice-to-Have): · Industry-recognised cybersecurity certifications such as CRT or OSCP · Previous experience handling SC or DV cleared environments · Demonstrated ability to fine-tune detection logic and improve SOC processes · Active engagement with the cybersecurity community and awareness of emerging trends About the Organisation Our client delivers high-impact digital solutions to central government clients and plays a pivotal role in ensuring national security through the protection and optimisation of mission-critical systems. They offer a supportive and collaborative work environment where professional development is encouraged, knowledge is shared, and employee contributions are highly valued. There team takes pride in its work and consistently delivers high levels of customer satisfaction in safety- and security-critical domains