24/7 SOC Analyst
REMOTE 24/7 SOC Analyst | UK-Based
Frontline cyber defence. Real incidents. Real progression.
Looking to build (or accelerate) your SOC career without commuting?
This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You'll be hands-on with live incidents, real attackers, and industry-leading tools — not just alert watching.
What you'll be doing
- Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
- Analysing attacker behaviour & building incident timelines
- Escalating incidents with clear technical context
- Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
- Contributing to threat hunting, detection improvements & SOC evolution
What we're looking for
1+ year SOC experience or 3+ years infra/networking with security exposure
Experience investigating alerts & understanding attack chains
Strong log analysis & endpoint/network fundamentals
Familiarity with Windows, Linux & macOS
Curious, analytical mindset with a genuine interest in cyber defence
(Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern
- 12-hour shifts: 2 days / 2 nights / 4 off
- Flexibility required during major incidents
Clearance
- SC clearance eligibility required (DV advantageous)
Why join?
- Fully remote role (UK-based)
- Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
- Structured training, cyber ranges & real investigation exposure
- Collaborative, technical SOC culture
- Competitive salary + strong benefits
Interested?
Apply now or message me for a confidential chat.