We are looking for multiple SOC Analysts to join a leading security operations team within a high-profile organisation. This role is ideal for junior security professionals with 1-2 years of security experience and at least 1 year of commercial SOC experience. The successful candidates will work within a dynamic Security Operations Centre (SOC), monitoring and responding to security threats, incidents, and vulnerabilities in real time.
This is an excellent opportunity for security analysts looking to develop their skills within a structured and high-performing security environment, with exposure to enterprise-level security tools and incident response processes.
Key Responsibilities
* Monitor SIEM tools and other security technologies to detect and investigate potential threats.
* Analyse security alerts, escalate incidents as necessary, and provide initial response and triage.
* Assist in incident containment, eradication, and recovery efforts as part of the SOC team.
* Work with Microsoft Security Stack, including Microsoft Sentinel and Defender.
* Support the development of SOC playbooks, threat hunting procedures, and incident response workflows.
* Conduct basic forensic investigations and contribute to post-incident reporting.
* Maintain accurate documentation of security incidents, resolutions, and investigative findings.
* Collaborate with senior analysts and security engineers to improve detection and response capabilities.
* Stay updated on emerging cyber threats, vulnerabilities, and attack techniques.
Key Skills & ExperienceEssential:
* 1-2 years of security experience, with at least 1 year in a commercial SOC environment.
* Hands-on experience with SIEM platforms (preferably Microsoft Sentinel or other enterprise solutions).
* Basic knowledge of cyber threat detection, security monitoring, and incident response methodologies.
* Understanding of common attack techniques and frameworks (e.g., MITRE ATT&CK).
* Familiarity with security tools such as EDR, IDS/IPS, firewalls, and log analysis platforms.
* Strong analytical and problem-solving skills with the ability to assess and escalate threats effectively.
* Ability to work in a fast-paced environment with shifts/on-call duties as required.
Desirable:
* Experience with Microsoft Defender for Endpoint, Azure Security Center, or other Microsoft security tools.
* Certifications such as CompTIA Security+, Microsoft SC-200, or GIAC (GCIH, GCIA, or GCFA).
* Knowledge of basic scripting (PowerShell, Python) for security automation.
* Previous experience in threat intelligence, vulnerability management, or digital forensics.
#J-18808-Ljbffr