Duration: Initial 3 months
IR35: Outside IR35
Location: Hybrid
Shift: 4 on / 4 off (2 days, 2 nights)
Overview
Seeking an experienced Cyber Detect Analyst to support a 24/7 SOC. The role focuses on alert triage, investigation, and threat detection using Microsoft Sentinel and KQL.
Key Responsibilities
* Monitor and investigate security alerts in Microsoft Sentinel
* Conduct incident triage and response
* Write and optimise KQL queries for detection and threat hunting
* Maintain clear incident records and handovers
* Work effectively within a shift-based SOC environment
Required Experience
* Hands‑on experience as a Cyber Detect / SOC Analyst
* Strong Microsoft Sentinel experience
* Proficient in KQL
* Experience working shift patterns (days/nights)
* Solid understanding of common cyber threats and attack techniques
Desirable
* Threat hunting or detection engineering experience
* Azure / Microsoft Defender exposure
#J-18808-Ljbffr