Cyber Security SOC Incident Analyst
š Milton Keynes
š° Ā£40,000 + Benefits
Are you a driven Cyber Security professional looking to take the next step in your SOC career? Our client is looking for a proactive and detail-oriented SOC Incident Analyst to join a high-performing Cyber Security Operations team, supporting a diverse client base across multiple sectors.
š The Opportunity
In this role, youāll be at the frontline of cyber defenceāmonitoring, detecting, and responding to security threats in a fast-paced 24/7 Security Operations Centre. Youāll play a key role in protecting critical systems and data, working with cutting-edge technologies and collaborating with experienced security professionals.
This is an excellent opportunity for someone with SOC or strong infrastructure experience looking to deepen their expertise in modern security operations.
š ļø Key Responsibilities
* Monitor, triage, and respond to security incidents using SIEM tools such as Microsoft Sentinel
* Investigate and resolve alerts, escalating where necessary
* Support a 24/7 SOC rota (including nights and weekends)
* Manage and maintain SOC tools, configurations, and updates
* Follow ITIL-based processes for incident, problem, and service management
* Produce regular reports and analytics on security incidents
* Contribute to continuous improvement of SOC processes and services
šÆ What Weāre Looking For
* Experience in a SOC Analyst role or strong systems administration background with security exposure
* Hands-on experience with Microsoft Sentinel and Microsoft Defender technologies
* Good understanding of networking concepts (DNS, IP, routing, SSL, etc.)
* Familiarity with cloud environments (Azure preferred)
* Experience with Windows and/or Linux administration
* Strong analytical and problem-solving skills
* Ability to work independently and make sound decisions under pressure
ā
Certifications & Requirements
* SC-200 (Microsoft Security Operations Analyst) ā required or willing to achieve during probation
* Other certifications such as Security+ are beneficial
* Ability to obtain Security Clearance (SC)
š Desirable Skills
* Experience with SIEM tools such as Graylog
* Scripting or programming (PowerShell, Python, etc.)
* Knowledge of hybrid AD / Entra ID environments
* Exposure to Cloudflare or similar technologies
* ITIL Foundation certification
š” Whatās in It for You?
* Exposure to a wide range of technologies and industries
* Supportive team environment with strong development focus
* Clear progression opportunities within Cyber Security
If you're passionate about cyber security and want to make a real impact in a growing SOC environment, weād love to hear from you.