Social network you want to login/join with:
Security Operations Center Analyst, bolton, greater manchester
col-narrow-left
Client:
Queen Square Recruitment
Location:
bolton, greater manchester, United Kingdom
Job Category:
Other
-
EU work permit required:
Yes
col-narrow-right
Job Views:
3
Posted:
06.06.2025
Expiry Date:
21.07.2025
col-wide
Job Description:
Our client, a leading global consultancy, is partnering with a prestigious end client based in Manchester. We are excited to offer a fantastic opportunity for a talented SOC Analyst - L3 to join a dynamic and agile development team on an initial 6 months contract, with the potential for extension.
If you are interested and have the relevant skills and experience, please apply promptly to discuss further.
Job Title: SOC Analyst – Level 3
Location: Manchester, UK (Hybrid – minimum 3 days on-site per week)
Contract Type: Contract (6 months)
Day Rate: Inside IR35 (Flexible)
About the Role
A leading organisation is looking for an experienced SOC Analyst (Level 3) to join its cybersecurity operations team. This role is ideal for senior professionals who thrive in high-stakes environments and enjoy working on proactive threat detection, incident response, and advanced security automation.
Key Responsibilities
* Lead the investigation and resolution of high-severity security incidents
* Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite
* Develop and fine-tune analytic rules, detection use-cases, and automation playbooks
* Perform deep-dive analysis on malware, phishing, and lateral movement threats
* Correlate events across diverse log sources and technologies
* Collaborate with engineering teams to optimise Microsoft security tool integration
* Mentor junior SOC analysts and contribute to internal knowledge sharing
* Maintain and enhance incident response processes and documentation
* Produce regular SOC performance reports and threat intelligence summaries
Required Skills & Experience:
* 5+ years in cybersecurity, with 2+ years at SOC Level 3 or senior analyst level
* Expertise in Microsoft Sentinel (KQL, custom rules, automation, dashboards)
* Strong hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365
* Proficient in handling incidents aligned with MITRE ATT&CK framework
* Solid understanding of Windows and Linux systems, networking, and endpoint security
* Skilled in digital forensics, threat intelligence, and advanced incident handling
* Familiarity with SOAR platforms and automated workflows
Nice to Have:
* Experience supporting SOC environments in the retail or FMCG sector
* Background in major incident response and recovery
#J-18808-Ljbffr