REMOTE 24/7 SOC Analyst | UK-Based
Frontline cyber defence. Real incidents. Real progression.
Looking to build (or accelerate) your SOC career without commuting?
This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You’ll be hands-on with live incidents, real attackers, and industry-leading tools — not just alert watching.
What you’ll be doing
* Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
* Analysing attacker behaviour & building incident timelines
* Escalating incidents with clear technical context
* Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
* Contributing to threat hunting, detection improvements & SOC evolution
What we’re looking for
✔️ 1+ year SOC experience or 3+ years infra/networking with security exposure
✔️ Experience investigating alerts & understanding attack chains
✔️ Strong log analysis & endpoint/network fundamentals
✔️ Familiarity with Windows, Linux & macOS
✔️ Curious, analytical mindset with a genuine interest in cyber defence
(Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern
* 12-hour shifts: 2 days / 2 nights / 4 off
* Flexibility required during major incidents
🔐 Clearance
* SC clearance eligibility required (DV advantageous)
Why join?
* Fully remote role (UK-based)
* Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
* Structured training, cyber ranges & real investigation exposure
* Collaborative, technical SOC culture
* Competitive salary + strong benefits
Interested?
Apply now or message me for a confidential chat.