Security Operations Center Analyst
Level 1 SOC Analyst
UK based | On-site
12 month contract
We’re hiring a Level 1 SOC Analyst to join a growing cyber security team supporting a major defence programme.
The Opportunity
You’ll act as the first responder to security alerts , working closely with an outsourced SOC provider and internal teams to investigate and escalate potential threats.
This is a hands-on role where you’ll build real incident response experience and gain exposure to enterprise-scale security operations.
Key Responsibilities
- Triage and validate alerts from the SOC provider
- Conduct initial investigations using SIEM tools and log data
- Engage with users and stakeholders to gather context and support containment
- Escalate confirmed incidents with clear documentation
- Maintain accurate case records, timelines, and evidence
- Act as the link between internal security teams and external SOC
- Follow established playbooks and suggest improvements
What You’ll Bring
Essential:
- 2 to 4 years’ experience in SOC, IT operations, or security support
- Understanding of threats such as phishing, malware, and privilege escalation
- Knowledge of networking fundamentals and system logs (Windows or Linux)
- Experience with SIEM tools such as Sentinel, Splunk, Elastic or QRadar
- Strong analytical and communication skills
Desirable:
- Awareness of frameworks such as MITRE ATT&CK, NIST or ISO27001
- Experience working with MSSPs or outsourced SOC models
- Basic scripting skills (PowerShell, Python or Bash)
- Certifications such as Security+ or CySA+
Why Join?
- Work on complex and meaningful cyber security challenges
- Be part of a collaborative and supportive team
- Exposure to modern tools, processes, and threat landscapes
Important Information
Due to the nature of the work, security clearance and nationality restrictions apply.