* Salary up to £60,000 depending on experience, plus shift allowance
* Onsite role, shift work (4 on / 4 off)
* Must be eligible for SC clearance
About the company
Our client operates a growing Security Operations Centre delivering cyber defence services to organisations across a range of industries, from critical infrastructure to complex enterprise environments. The team focuses on high-quality detection, investigation and continuous improvement, rather than alert-only monitoring. Due to continued growth, they are looking for a SOC Analyst to strengthen their operations and help mature their security services.
The benefits
* 25 days annual leave, with the option to buy additional days
* Health cash plan
* Life assurance
The SOC Analyst role
As a SOC Analyst, you will play a key part in protecting client environments by monitoring, investigating and responding to security events. Working as part of a 24/7 onsite SOC, you will handle incidents, contribute to detection improvements, and produce clear reporting for a range of audiences. This is a hands‑on role offering exposure to diverse technologies and real cyber threats.
* Experience working in a Security Operations Centre environment
* Hands‑on experience with Microsoft Sentinel and Splunk
* Knowledge of the MITRE ATT&CK framework
* Understanding of networks and systems, including TCP/IP, firewalls, VPNs and endpoint security
* Strong analytical and problem‑solving skills
* Ability to produce clear reports for technical and non‑technical stakeholders
* Eligibility for SC Clearance
* Scripting or programming experience (Python, PowerShell, Bash, Perl or C++)
* Experience with additional SIEM tools such as QRadar
* Cyber security certifications such as Security+, CEH, CPSA or CREST
KEY SKILLS: SOC Analyst, Security Operations Centre, Microsoft Sentinel, Splunk, SIEM, Incident Response, MITRE ATT and CK, Networking, SC Clearance, NSD
#J-18808-Ljbffr