Security Operations Center Analyst

SOC Analyst: IT Security Team

Location: Bristol

Hybrid: 2 days onsite

Salary: $45,000

Permanent

(Must have Internal/ In-house SOC Experience)

I'm working with a company that's continuing to invest in and grow their IT Security function and is now looking to bring in a skilled SOC Analyst.

This is a great opportunity to join a forward-thinking security operations team, where you'll have hands-on ownership across threat detection, incident response, and overall security posture, alongside a competitive salary, strong benefits, and clear long-term development opportunities.

The role offers flexible, hybrid working with only monthly office attendance, and they're open to candidates from general SOC or InfoSec backgrounds, sector experience is a bonus, not a requirement.

What you'll be doing:

  • Operate, tune and configure SIEM tools
  • Monitor and triage security alerts, applying custom queries (e.g. KQL) and correlation rules to detect suspicious activity.
  • Investigate security incidents across endpoints, networks, and cloud environments; perform root-cause analysis, impact assessment and containment actions.
  • Develop and maintain detection rules, use cases, threat-intelligence processes, and incident response playbooks.
  • Automate detection and response workflows, using scripting tools (e.g. Python, PowerShell).
  • Perform threat-hunting, log-analysis (including firewall, web/email filters), implement or review DLP controls, and collaborate with infrastructure/cloud/application teams on remediation and security posture improvements.

What we're looking for:

  • Strong working knowledge of Microsoft security stack (e.g. Sentinel, Defender) and hands-on experience with SIEM tooling, alerts triage, detection logic, and security incident workflows.
  • Ability to write and optimise detection queries (e.g. in KQL), review firewall and security logs, manage email/web filtering policies, and implement / review Data Loss Prevention (DLP) controls.
  • Experience with automation or scripting (e.g. Python, PowerShell) to streamline detection/response and improve SOC efficiency.
  • Threat-hunting and analytical mindset; proactive and collaborative approach; good communication skills and ability to work across teams.

If you're looking to join an established team that will aid career growth, whilst offering an excellent work-life balance.

Apply NOW

Job Details

Company
TRIA
Location
Bradley Stoke, Gloucestershire, UK
Hybrid / Remote Options
Employment Type
Full-time
Posted