SOC Analyst
We’re expanding our Security Operations Centre in Farnborough and looking for sharp, collaborative L2 SOC Analysts to protect enterprise-scale environments across the Defence sector. You’ll investigate real threats, tune detections, and make measurable impact—using Microsoft Sentinel, Splunk, and MISP.
Your work fuels national security. Your growth fuels our mission.
Role based on site in our Farnborough office and is shift work. 2 x 6am to 6pm, 2 x 6pm to 6am, 4 days off.
You do need to be eligible for DV Clearance for this role, and cannot start until your clearance is through.
What you'll be doing:
- Monitor, analyse security alerts and events, conduct initial investigations, and determine the appropriate response.
- Raise complex incidents to Senior Analysts.
- Manage SOC Incident queues.
- Support the maintenance of monitored asset baselines of the customer environments.
- Prepare reports for managed clients to both technical and non-technical audiences,
- Collaborate on improving detection rules and use cases aligned with Mitre Att&ck and threat-informed defense.
- Participate in a team effort to guarantee that corporate data and technology platform components are shielded from known threats.
- Collaborate with team members to maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies.
- Aid the development and use of threat intelligence throughout the service.
- Ability to work shifts from our office in Farnborough.
What you’ll bring:
- Experience demonstrated in Security Operations Centre.
- Experience using Microsoft Sentinel and Splunk.
- Knowledge and experience with Mitre Att&ck Framework.
- Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products.
- Understanding of networking principles including TCP/IP, WANs, LANs and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP.
- Entry level cyber security certification (e.g. CompTIA Security+, CEH, CPSA).
- CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications.
- Completed an academic module in cyber security or a related subject
It would be great if you had:
- Programming and scripting such as Python, Perl, Bash, PowerShell, C++.
- CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications.
- Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar.
If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do apply, we’d love to hear from you!
Employment Type: Permanent
Location: Office based in Farnborough
Security Clearance Level: Eligible for DV Clearance
Internal Recruiter: Jane
Salary: To £58K Depending on experience, plus on shift allowance.
Benefits: 25 days annual leave with the choice to buy additional days, health cash plan, life assurance, pension, and generous flexible benefits fund.
Loved reading about this job and want to know more about us?
Sopra Steria’s Aerospace, Defence and Security business designs, develops and deploys digital solutions to Central Government clients. The work we do makes a real difference to the client’s goal of National Security, and we operate in a unique and privileged environment.
We are given time for professional development activities, and we coach and mentor our colleagues, sharing knowledge and learning from each other. We foster a culture in which employees feel valued and supported and have pride in their work for the customer, delivering outstanding rates of customer satisfaction in the UK’s most complex safety- and security-critical markets.