SOC Analyst – 3-month contract – Northampton My Customer is looking for a proactive SOC Analyst to join their team and take ownership of
monitoring, triaging, and responding to security alerts
across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft Defender and Sentinel is needed. Key Skills & Experience from the SOC Analyst Strong experience with
Microsoft Sentinel
(SIEM) and
Microsoft Defender suite
(Defender for Endpoint, Identity, Cloud, etc.). Proven track record in
security monitoring, incident response,
and
alert troubleshooting. Working knowledge of
SOAR platforms
(preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft's security ecosystem. Key Responsibilities of the SOC Analyst Monitor, investigate, and respond to security alerts and incidents in
Microsoft Sentinel
and
Microsoft Defender. Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise
SOAR (Security Orchestration, Automation and Response)
playbooks to enhance incident response and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Beneficial Experience Exposure to
Operational Technology (OT)
environments. Experience with
Tenable
(vulnerability management). Knowledge of
Microsoft Purview
(data governance, compliance, and information protection). Apply now to speak with VIQU IT in confidence about the SOC Analyst role. Or reach out to Connor Smal via the VIQU IT website. Do you know someone great? We'll thank you with up to £1,000 if your referral is successful (terms apply). For more exciting roles and opportunities like this, please follow us on LinkedIn @VIQU IT Recruitment.
TPBN1_UKTJ