Security Operations Center Analyst
Senior SOC Analyst (L2)
Location: Hemel Hempstead – Onsite
Shift pattern: 12-hour shifts (Days & Nights)
Eligibility for DV Clearance required
Start the year in a SOC role that actually develops you.
If you're currently in a SOC where every shift feels the same, this is your chance to step into a role that offers real variety, real responsibility, and real progression.
A great chance to join and expand our Cyber Defence practice, and we are looking for L2 Senior SOC Analysts to join a growing team supporting multiple enterprise-scale, high-profile defence clients. You'll be working in a fast-paced, technology-led SOC where learning, collaboration, and development are genuinely encouraged.
This role is ideal for an experienced SOC Analyst who wants to broaden their exposure, deepen their technical skills, and start the year with a clear pathway forward.
What you'll be doing:
- Monitoring, triaging and investigating security incidents across mission-critical client environments.
- Performing in-depth analysis of logs, network traffic and system events to identify threats and vulnerabilities.
- Providing incident response support, working through alerts to resolution.
- Contributing to the continuous improvement of SOC processes, tooling and triage techniques.
- Producing clear, high-quality reports for both technical and non-technical stakeholders.
- Maintaining and updating incident documentation, analysis findings and recommended remediation actions.
The technology you'll work with:
- Microsoft Sentinel
- Splunk
- MISP threat intelligence sharing
- Exposure to a broad range of enterprise and defence-grade security tooling
What you'll bring:
- Proven experience working in a Security Operations Centre environment.
- Hands-on experience managing or operating Microsoft Sentinel and/or Splunk.
- Working knowledge of the MITRE ATT&CK framework.
- Strong understanding of:
- Client-server and multi-tier web applications
- Relational databases
- Firewalls, VPNs and enterprise endpoint protection
- Networking fundamentals (TCP/IP, LAN/WAN, SMTP, FTP, LDAP)
Nice to have:
- Exposure to static malware analysis or reverse engineering.
- CREST Practitioner Intrusion Analyst certification.
- Experience with SIEM platforms including Sentinel, Splunk, and ideally some QRadar.
Why join?
- A varied SOC environment supporting multiple high-profile clients
- Clear career progression within a growing cyber defence practice
- Ongoing training and development to strengthen your technical depth
- Flexible benefits tailored to your needs
- A strong team culture with experienced analysts around you
Start the year in a role that challenges you, supports your growth, and builds your future in cyber security.