Our client, a leading global organisation, is partnering with a prestigious end client based in Manchester.We are excited to offer a fantastic opportunity for a talented SOC Analyst L3 to join a dynamic and agile development teamon an initial 6-month contract, with the potential for extension. If you are interested and have the relevant skills and experience, please apply promptly to discuss further. Job Title: SOC Analyst Level 3 Location: Manchester, UK (Hybrid minimum 3 days on-site per week) Contract Type: Contract (6 months) Day Rate: Inside IR35 (Flexible) About the Role A leading organisation is seeking an experienced SOC Analyst (Level 3) to join its cybersecurity operations team. This senior role is ideal for professionals who excel in high-stakes environments and possess a strong engineering background, particularly within the Microsoft and Azure security ecosystem. The ideal candidate will be instrumental in driving SOC maturity, optimizing license consumption, and enhancing security visibility across the enterprise. Key Responsibilities Lead the investigation and resolution of high-severity security incidents Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite Develop and fine-tune analytic rules, detection use-cases, and SOAR playbooks Monitor and optimise license consumption across Microsoft security tools Manage log onboarding/offboarding processes across varied sources and environments Drive SOC maturity initiatives, identifying and implementing process improvements Perform deep-dive analysis on malware, phishing, and lateral movement threats Correlate events across diverse log sources, including cloud and on-prem infrastructure Collaborate with engineering teams to enhance integration and performance of Microsoft security tools Mentor junior SOC analysts and contribute to internal capability development Maintain and enhance incident response playbooks, processes, and documentation Produce regular performance metrics and threat intelligence summaries Required Skills & Experience 5 years in cybersecurity, with at least 2 years at SOC Level 3 or senior analyst level Strong expertise in Microsoft Azure, including security monitoring and engineering Deep experience with Microsoft Sentinel (KQL, custom rules, automation, dashboards) Hands-on proficiency with Microsoft Defender for Endpoint, Identity, and Office 365 Strong understanding of log management (onboarding, parsing, retention strategies) Demonstrated ability to build and manage detection use cases aligned with evolving threats Familiarity with the MITRE ATT&CK framework and threat modeling Solid understanding of Windows, Linux, networking, and endpoint security Skilled in threat intelligence, digital forensics, and advanced incident handling Experience with SOAR platforms and security automation Excellent written and verbal communication skills Nice to Have Experience in the retail or FMCG sector supporting large-scale SOC environments Background in major incident response and operational recovery Esther Urtecho Senior Delivery Consultant London | Bristol | Amsterdam