SOCAnalyst Location: Home based/Remote – Must be Based in the United Kingdom Salary: Up to £35,000, shift based role with 24/7 coverage Qualifications: Must be eligible for SC Clearance The company An exciting opportunity has arisen at an award-winning Microsoft Partner for a SOC Analyst. The business is a fast … growing, industry-leading managed service and managed service security provider, delivering in to mid and large enterprise clients. This is a fantastic opportunity for a SOCAnalyst to continue their development at an established Microsoft Partner. The business has a keen focus on developing their staff by providing support for training and earning certifications. You will also … role; you must however be based in the UK to be considered. This role will also require eligibility to gain SC Clearance due to government-based customers. About The SOCAnalyst Role As a SOCAnalyst, you will support the SOC Manager, acting as an escalation point and technical SME for stakeholders within More ❯
SOCAnalyst - CISSP, ISC2 SCCP, Palo Alto, Threat Detection, Vulnerability Management, Firewall A global law firm client we work with are currently looking to take on a new SOCAnalyst (CISSP, ISC2 SCCP, Palo Alto, Threat Detection, Vulnerability Management, Firewall) on a permanent basis. The firm are currently undergoing a significant transformation and expansion … across the EMEA region and require a new SOCAnalyst to help support this growth. The role will be held with a great deal of trust, autonomy and ownership with a very anti-micromanage managerial structure in place. To be considered for this SOCAnalyst (CISSP, ISC2 SCCP, Palo Alto, Threat Detection, Vulnerability Management More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
Senior SOCAnalyst Hemel Hempstead, UK – Onsite | 24/7 Shift Pattern Competitive Salary | DV Clearance Eligible (British Citizens Only) Are you an experienced SOCAnalyst ready to play a crucial role in defending the UK's most critical systems? Join a top-tier consultancy that operates at the sharp end of cybersecurity within … defence, aerospace, and national security.We’re looking for an experienced SOCAnalyst to join our high-performing SecurityOperationsCentre in Farnborough. This is a unique chance to contribute to real-world cyber defence, on country critical technology, pitting your SCO skills against state of the art attacks.As the SOCAnalyst, you will: Monitoring … Contributing to threat intelligence initiatives Staying ahead of the curve on emerging threats, tactics, and techniques To secure this SOC role: Proven experience in a SecurityOperationsCentre (SOC) environment Hands-on knowledge of SIEM tools (Microsoft Sentinel, Splunk, etc.) Familiarity with MITRE ATT&CK and threat detection methodologies Strong analytical mindset with log, endpoint, and network analysis More ❯
The Role As an Associate SOCAnalyst, you bring a strong background in IT or cybersecurity to a transitory role that builds towards full SOCAnalyst responsibilities. You use your foundational knowledge to independently triage, investigate, and validate alerts using established playbooks. While you handle basic incident investigations and documentation, you escalate cases requiring … deeper analysis to Shift Leads or Senior SOC Analysts. This role focuses on developing your skills through mentoring, continuous learning, and hands-on experience, with the expectation of advancing to a full SOCAnalyst position within 18 months following your successful probationary period. Key Responsibilities Incident Triage & Investigation – You review and prioritise new alerts from security … basic checks to distinguish genuine threats from false positives. You rely on established playbooks and make initial validation decisions while escalating more complex incidents to Shift Leads or Senior SOC Analysts Continuous Improvement – You contribute to the enhancement of detection logic by identifying recurring or redundant alerts. You participate in threat hunting and skills development sessions to help reduce More ❯
SOCAnalyst (L2) – SecurityOperations Remote (Travel to Reading once per month) Salary: Up to £55,000 per annum + Training & Certifications Areti are delighted to be supporting a rapidly growing cyber services provider in their search for an L2 SOCAnalyst to join their expanding UK SecurityOperations Centre. This organisation partners with … are looking for an experienced analyst with strong technical foundations and a hunger to grow their capability in detection, investigation, and automation. The Role As an L2 SOCAnalyst , you’ll be at the forefront of defending enterprise environments, analysing alerts, investigating incidents, and improving detection capabilities across diverse customer estates. Working closely with senior … analysts and incident responders, you’ll play a key role in maintaining an effective, high-performing SOC, while continuously developing your skills through structured training and real-world exposure. You’ll be encouraged to contribute ideas, challenge processes, and help refine the team’s approach to detection and response, making a visible impact on how cyber threats are managed More ❯
L1 SOCAnalyst – Kickstart Your Cybersecurity Career 🚀 📍 Location: Fareham – On-site 💰 £28,750 Are you passionate about cybersecurity and ready to take your first step into the world of SecurityOperations? Our client — a leading Managed Security Service Provider (MSSP) and trusted Fortinet & Microsoft partner — is on the hunt for an L1 SOCAnalyst … it’s a launchpad for your cybersecurity career . You’ll gain hands-on experience, professional training, and the opportunity to progress from entry-level to a fully-fledged SOCAnalyst through a structured development program. 🔍 What You’ll Be Doing Monitoring and triaging 80–100 security alerts per shift using Fortinet and Microsoft SIEM/EDR … tools . Analysing, prioritising, and escalating potential threats to keep clients secure. Responding rapidly to incidents and maintaining vigilance across multiple environments. Collaborating closely with your SOC teammates to ensure seamless threat detection and incident response. 🧠 What You’ll Bring A genuine passion for cybersecurity and the drive to grow in the field. Relevant certifications such as CompTIA Security+ More ❯
SOCAnalyst | Microsoft Gold Partner … Fully Remote Nigel Frank is proud to be working on behalf of a Microsoft Gold Partner , a specialist cybersecurity consultancy that’s rapidly expanding their SecurityOperationsCentre (SOC) team. This is an exceptional opportunity for someone with a strong foundation in Microsoft security technologies to take the next step into cybersecurity and grow into a seasoned SOC … the world of cybersecurity - with full training and exposure to security events, incident response, and threat management. Microsoft Certifications Included : You'll start with SC-200 (Microsoft SecurityOperationsAnalyst) and progress through further certifications over the first 1–2 years, fully supported by the company. Microsoft Security Tech Stack : Work hands-on with Microsoft Defender, Entra ID More ❯
SOCAnalyst (L2) (SC Clearance Required … Multiple UK Locations (Shift Work) - £55,000 - £58,000 – Permanent Are you passionate about cybersecurity and ready to make a real impact? We’re expanding our SecurityOperationsCentre (SOC) team and looking for Level 2 SOC Analysts to join us across multiple UK locations.This is a fantastic opportunity to work with enterprise-scale clients in a fast … like Microsoft Sentinel, Splunk, and MISP Threat Sharing to protect critical infrastructure. Key Responsibilities: Monitor and analyse security alerts and events, conduct initial investigations, and escalate complex incidents. Manage SOC incident queues and support asset baseline maintenance. Prepare reports for technical and non-technical audiences. Collaborate on improving detection rules and use cases aligned with MITRE ATT&CK. Contribute More ❯
SOCAnalyst (L2) (SC Clearance Required … Multiple UK Locations (Shift Work) - £55,000 - £58,000 – Permanent Are you passionate about cybersecurity and ready to make a real impact? We’re expanding our SecurityOperationsCentre (SOC) team and looking for Level 2 SOC Analysts to join us across multiple UK locations. This is a fantastic opportunity to work with enterprise-scale clients in a … like Microsoft Sentinel, Splunk, and MISP Threat Sharing to protect critical infrastructure. Key Responsibilities: Monitor and analyse security alerts and events, conduct initial investigations, and escalate complex incidents. Manage SOC incident queues and support asset baseline maintenance. Prepare reports for technical and non-technical audiences. Collaborate on improving detection rules and use cases aligned with MITRE ATT&CK. Contribute More ❯
Portsmouth, England, United Kingdom Hybrid/Remote Options
Cloud People
Senior SOCAnalyst £40,000 – £55,000 + Benefits + Training Hybrid (Portsmouth, UK) Company & Role This is more than a SOC role, it is a chance to join a fast growing, people first global service provider that is redefining what great cyber defence looks like. With over $1B in global revenue, this organisation delivers end … a powerful mix of Managed Detection and Response (MDR), Threat Hunting, Vulnerability Management, Penetration Testing and Incident Response, supported by a world class Security Advisory function. As a Senior SOCAnalyst, you will take a leading role in identifying, investigating and responding to cyber threats across varied client environments. You will mentor junior analysts, lead complex incidents … and help evolve the SOC’s detection and response capabilities. This is an opportunity to make a genuine impact, with the freedom to innovate and the support to grow into roles such as SOC Lead, Threat Hunter, Security Engineer or Incident Responder. Why This Role Stands Out Join a $1B global IT and Cyber Defence provider that invests More ❯
ROLE TITLE: SOCAnalyst LOCATION: flexible (can be mostly remote, must be based in UK) CLEARANCE: SC cleared, or eligible for SC clearance Salary: £35k - £41k The ideal candidate will have active SC Clearance or be eligible to undergo SC Clearance. We are actively looking to secure an SOCAnalyst to join Experis. Experis … approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development. Key accountabilities of the role A SOCAnalyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various … Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. Skills required: Microsoft Certified: SecurityOperationsAnalyst Associate Certification (SC200) is a mandatory requirement for role fulfilment Experience working with SIEM technologies and security tooling An understanding of IT Infrastructure and Networking An understanding of More ❯
Senior Incident Responder – SOCAnalyst (L3) Birmingham or Glasgow | Up to £71,000 + Bonus + Benefits | Hybrid | SC Clearance Required or Eligible Our client – a global technology and services firm – is expanding its Managed SecurityOperationsCentre and seeking a Senior Incident Responder (L3 SOCAnalyst) to take the lead on complex security … The Role You’ll take ownership of escalated incidents, conduct detailed investigations, and ensure effective containment and eradication of threats. You’ll act as the escalation point within the SOC, providing technical expertise, mentoring junior analysts, and driving continuous improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and … provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise with clients, Service Delivery Managers, and technical teams to manage escalations and coordinate response. Maintain high standards of documentation, including More ❯
Portsmouth, England, United Kingdom Hybrid/Remote Options
Computappoint
SecurityOperationsCentreAnalyst (SOCAnalyst) Salary: £50,000 to £55,000 (based on candidate experience) Office Location: Portsmouth Hybrid Model: 3-4 days on-site (remaining days remote) Working Hours: Monday-Friday, Standard office hours (potentially some remote 24x7 on-call) Employment Type : Permanent About the Role: Join one of the best work-life … organisations in the IT Sector as part of their newly developing & rapidly expanding Cyber Security division. As a SOCAnalyst, you'll be a vital part of a highly skilled SecurityOperationsCentre team, responding to security alerts, investigating incidents, and helping to protect internal security and enterprise environments. 🔐 What You'll Do: Monitor SIEM, IDS/… incidents, escalating when necessary. Conduct threat hunting and forensic analysis. Support rule development and tuning of detection systems. Assist with real-time detection, response, and containment. Maintain and improve SOC documentation and playbooks. Collaborate with team members and other departments to improve overall security posture. Required Skills & Qualifications: 2+ years’ experience in a SOC or similar role (preferably More ❯
Crawley, England, United Kingdom Hybrid/Remote Options
InfoSec People Ltd
Level 3 SOCAnalyst Location: Crawley (Hybrid) Salary: Up to £75,000 (DOE) + Bonus Type: Permanent/Full-Time The Opportunity My client, a leading organisation operating within the Critical National Infrastructure (CNI) energy sector, is looking to appoint an experienced Senior/Level 3 SOC Analyst. This is a senior escalation role within a … threat hunting, forensic investigations, and root cause analysis. Develop, test, and optimise detection use cases, rules, and playbooks within Microsoft Sentinel and Defender. Provide mentorship and guidance to junior SOC analysts, enhancing team capability. Collaborate with IT and OT teams to address unique security requirements across CNI environments. Drive improvements in SOCoperations, automation, and incident response processes. … energy/utility environments. Proficiency in scripting/automation (KQL, PowerShell, Python). Excellent communication and stakeholder engagement skills. Desirable Certifications Microsoft Certified: Cybersecurity Architect Expert/SecurityOperationsAnalyst Associate GIAC (GCIA, GCIH, GCFA, GNFA) CISSP/CISM (advantageous) Experience of OT/ICS security in energy environments. Why Join? Opportunity to work on mission-critical systems More ❯
Role Description: SecurityAnalyst - Network & Endpoint/SOCSecurity Specialist We are looking for a highly capable and technically … skilled SecurityAnalyst to join our cybersecurity team. This role focuses on network and endpoint securityoperations, threat intelligence, and incident response within a SecurityOperationsCentre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate at a team lead level. Key Responsibilities: Network Detection & Response … incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update detection rules, ensuring alignment with threat intelligence. SecurityOperationsCentre (SOC): Act as a Level 2 SOCAnalyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members More ❯
Senior SecurityAnalyst – SOC/Incident Response I’m partnering with a fast-growing Cyber Defence function that’s strengthening its SecurityOperationsCentre and looking for a talented Senior SecurityAnalyst to join the team. You’ll take a leading role in detecting, analysing, and responding to cyber threats across diverse client environments, mentoring … junior analysts, improving detection content, and helping drive SOC maturity. What you’ll do: Lead complex investigations and incident response. Develop SIEM/EDR use cases and correlation rules. Perform proactive threat hunting and support automation initiatives. Produce incident reports and guide remediation activities. Help coach and upskill junior analysts. You should bring: 2–4 years’ experience in a … SOC, CSIRT, or cyber defence environment. Solid knowledge of SIEM and EDR platforms (Sentinel, Splunk, Defender, CrowdStrike, etc.). Understanding of MITRE ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded certifications More ❯
potential of their IT infrastructure Description We are seeking enthusiastic, dedicated and detail-oriented Level 1 SOCAnalyst to join our UK based SecurityOperationsCentre (SOC). The successful candidate will be responsible for the initial analysis and triage of security alerts, monitoring security systems, and supporting the development of security event investigation and analysis … SIEM specific qualifications and exposure are evident. Desirable Certifications (any of): Microsoft AZ-200 ISC2 Certified in Cybersecurity CompTIA Security+ Internal CompTIA CySA+ GIAC Security Essentials EC Council Certified SOCAnalyst Cisco Certified Cybersecurity Cisco Certified Network Associate Demonstrable experience using Microsoft Sentinel or Similar SIEM tooling. Familiarity with security tools and technologies such as SIEM, IDS More ❯
Primary Details Time Type: Full time Worker Type: Employee SOC Principal Analyst Permanent London/Hybrid At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity QBE Europe is currently recruiting a SOC Principal Analyst to join … our cyber security team in our London Office. Reporting to regional team leads, the SOC Principal Analyst will be a key member of our rapidly growing Global SecurityOperations team. Your new role This is an exciting hands-on technical role in which the specialist will use their security skills and knowledge to perform advanced analysis on … response to cyber security-related incidents to prevent QBE from becoming compromised by modern attack methods and techniques. Main responsibilities: Act as point of escalation and mentor to junior SOC analysts. Translates business objectives into security objectives by providing support in design/architecture for new security applications to improve the current security posture globally for QBE. Recommends and More ❯
We are looking for a highly motivated and experienced Level 3 SecurityOperationsCentre (SOC) Analyst to join our dynamic and growing team. The role holder will bring a mature approach to their work with extensive technical knowledge and hands-on experience in Security Operations. This is a unique opportunity to be a founding key member of More ❯
Role Title: SOCAnalyst (L2) Reports To: SOC Lead Location: Remote – UK Based Salary Range: £35-40k depending on experience + 15% Shift Uplift Hours: Full time Shift Pattern: The team operates a rotating 4 on 4 off shift pattern: 4 on/4 off rotating pattern (Day shifts: 06:00–18:00 | Night shifts … successful candidates to obtain and maintain UK Government Security Clearance to SC or above. The Right Applicant We are looking for a team player to join as a securityanalyst in our emerging MDR service. Due to the dynamic nature of our business, we require an individual who is flexible, deployable on a broad scope of tasks, can … Associate (L1) analysts. Training of Associates analysts. Deliver client reports based on incident findings to both technical and non-technical audiences. Maintain and where appropriate, improve CYSIAM knowledge of SOC tools. Contribute to internal R&D projects. Prepare monthly SOC reports for managed clients and continuously improve their content and presentation. Work as part of a team to More ❯
We are constantly growing our SOC team and new opportunities in our Farnborough site. Come and join us in the Defence sector and support enterprise scale clients. We have opportunities for L1 SOC Analysts to be a part of our success and work with multiple, high profile clients. You should showcase your proficiency in a busy SecurityOperations … clearance is through. What you'll be doing: Monitor, analyse security alerts and events, conduct initial investigations, and determine the appropriate response. Raise complex incidents to Senior Analysts. Manage SOC Incident queues. Support the maintenance of monitored asset baselines of the customer environments. Prepare reports for managed clients to both technical and non-technical audiences, Collaborate on improving detection … SMTP, HTTP, FTP, POP, LDAP. Entry level cyber security certification (e.g. CompTIA Security+, CEH, CPSA). CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Completed an academic module in cyber security or a related subject It would be great if you had: Programming and scripting such as Python, Perl, Bash, PowerShell More ❯
This role is based five days per week on-site in Corsham. SecurityAnalyst – SOC (Corsham, On-Site) An exciting opportunity to join an established SecurityOperationsCentre, providing cyber expertise to support day-to-day operations. The role involves regular SOC activities, introducing new processes, and embedding best practice across the workplace. This role is … and share knowledge of current cyber issues, vulnerabilities, and exploits through research, technical reports, and briefs. Skills and Experience Experience working as a SecurityAnalyst in a SOC or equivalent security monitoring and response environment. Current SC clearance (essential). Knowledge of data networks. Experience with SIEM toolsets and security management tools. Desirable certifications: CompTIA Security+, CySA+ More ❯
Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst 2-3 Days onsite - Crawley 6-9 Month duration Reporting line: The Analyst will report to the Cyber Security Response Manager and work within the Information Systems directorate, based in the Crawley office. Job purpose: The role of an Incident Response (CSIRT)/SOC … protect network systems and customer data from cyber threats. Dimensions People – Work collaboratively in a team of around 14 cyber securityoperations staff. Mentor Level 1 and Level 2 SOC Analysts, providing guidance and training. Suppliers – Regular interaction with technical resources from outsourced Managed Security Service Providers (MSSPs) and cyber security tooling vendors. Communication – Communicate technical cybersecurity concepts to … vulnerabilities, and anomalies, then use this intelligence and tooling to uncover and remove hidden threats that may have bypassed existing defences across IT and OT environments. Policy Development: Develop SOC policies, technical standards, and procedure documentation aligned to industry best practice. Log Management: Work with MSSPs and service owners to ensure log sources are onboarded into the SIEM solution. More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid/Remote Options
Morson Edge
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯
Crawley, Sussex, United Kingdom Hybrid/Remote Options
Morson Edge
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley click apply for full job More ❯