Job Description
Cyber Security SOC Incident Analyst
Milton Keynes
£40,000 + Benefits
Are you a driven Cyber Security professional looking to take the next step in your SOC career? Our client is looking for a proactive and detail-oriented SOC Incident Analyst to join a high-performing Cyber Security Operations team, supporting a diverse client base across multiple sectors.
The Opportunity
In this role, you’ll be at the frontline of cyber defence—monitoring, detecting, and responding to security threats in a fast-paced 24/7 Security Operations Centre. You’ll play a key role in protecting critical systems and data, working with cutting-edge technologies and collaborating with experienced security professionals.
This is an excellent opportunity for someone with SOC or strong infrastructure experience looking to deepen their expertise in modern security operations.
️ Key Responsibilities
* Monitor, triage, and respond to security incidents using SIEM tools such as Microsoft Sentinel
* Investigate and resolve alerts, escalating where necessary
* Support a 24/7 SOC rota (including nights and weekends)
* Manage and maintain SOC tools, configurations, and updates
* Follow ITIL-based processes for incident, problem, and service management
* Produce regular reports and analytics on security incidents
* Contribute to continuous improvement of SOC processes and services
What We’re Looking For
* Experience in a SOC Analyst role or strong systems administration background with security exposure
* Hands-on experience with Microsoft Sentinel and Microsoft Defender technologies
* Good understanding of networking concepts (DNS, IP, routing, SSL, etc.)
* Familiarity with cloud environments (Azure preferred)
* Experience with Windows and/or Linux administration
* Strong analytical and problem-solving skills
* Ability to work independently and make sound decisions under pressure
Certifications & Requirements
* SC-200 (Microsoft Security Operations Analyst) – required or willing to achieve during probation
* Other certifications such as Security+ are beneficial
* Ability to obtain Security Clearance (SC)
Desirable Skills
* Experience with SIEM tools such as Graylog
* Scripting or programming (PowerShell, Python, etc.)
* Knowledge of hybrid AD / Entra ID environments
* Exposure to Cloudflare or similar technologies
* ITIL Foundation certification
What’s in It for You?
* Exposure to a wide range of technologies and industries
* Supportive team environment with strong development focus
* Clear progression opportunities within Cyber Security
If you're passionate about cyber security and want to make a real impact in a growing SOC environment, we’d love to hear from you.