Social network you want to login/join with: SecurityOperations Center Analyst, Leeds, West … Yorkshire Client: Anson McCade Location: Leeds, West Yorkshire, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 2 Posted: 08.05.2025 Expiry Date: 22.06.2025 Job Description: Senior SOCAnalyst Please note: Candidates must be eligible for DV clearance (sole British national). We’re looking for an experienced Senior SOCAnalyst to … Conduct in-depth incident investigations, reporting, and remediation. Utilise threat intelligence to detect and respond to potential threats. Support incident response activities for national-scale cyber events. Help improve SOC workflows, including automation and threat detection use cases. Coach junior analysts and contribute to continuous improvement across the team. Hands-on experience with Microsoft Sentinel (critical to this role More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
SOCAnalyst required for my client based near Leeds for a permanent role. Salary £35-60k DOE Hours: 8am - 4.30pm/9.30am - 6pm Following probation 1 week in 4 you will be required to be on call 6pm - 8am (home based) where you will receive additional remuneration + overtime. This includes weekends. The Role: As a … SOCAnalyst - Microsoft Sentinel Specialist, you’ll be at the heart of the managed SOC services, monitoring, investigating, and responding to security incidents across client environments. You’ll leverage Microsoft Sentinel, Defender XDR, and KQL to detect threats, improve detection rules, and help clients stay secure. What You’ll Do: Monitor and analyse security alerts in … automation playbooks Assist in onboarding new clients into Sentinel (connectors, log sources, playbooks) Collaborate with engineers and clients to enhance security visibility Contribute to threat hunting, detection tuning, and SOC process improvements Skills You’ll Need: 2-5+ years in a SOC, threat detection, or incident response role Hands-on experience with Microsoft Sentinel (KQL, analytics rules More ❯
Job Title: SOCAnalyst - Microsoft Sentinel Specialist Location: Leeds Reports To: SOC Manager/Head of Managed Security Services Package: £55,000 - £60,000 About Us We're a top-tier cybersecurity MSP and trusted advisor to organizations across industries, delivering cutting-edge security solutions and 24/7 protection. With a strong focus on Microsoft … security technologies, we're growing fast - and looking for skilled SOC Analysts to help drive our Microsoft Sentinel-powered operations. The Opportunity This is not your average SOC role. As a Microsoft Sentinel Specialist , you'll be front and center in our managed SOC, leading the charge in threat detection, incident response, and security monitoring across client … optimize detection coverage and incident resolution . Drive continuous improvement through automation, process refinement, and operational enhancements. What You Bring Must-Have Experience: 2-5+ years in a SOC or threat detection role. Proven, hands-on Microsoft Sentinel expertise - including custom KQL, analytics rule creation, playbook development, and connector integration. Solid grasp of the Microsoft Defender XDR suite More ❯
for supporting leading security solutions and services for our clients. The successful candidates will need to not only be technically minded but also be adept in documenting their work. SOC Analysts are the first point of contact for our customers, providing excellent customer service and immediate response to ongoing incidents. This is a full-time permanent position and shifts More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
SOCAnalyst | Remote Contract | Outside IR35 Our client is looking for two experienced SOC Analysts to join them on a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK. Key Responsibilities: Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel ). Conduct … threats. Analyze logs and network traffic to identify anomalies. Collaborate with incident response teams to contain and remediate threats. Create and maintain documentation, playbooks, and incident reports. Continuously improve SOC processes and detection capabilities. What We're Looking For: Strong background in cybersecurity with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience More ❯