Job Search and Career Advice Platform

Enable job alerts via email!

24/7 SOC Analyst

IP PEOPLE LTD

Remote

GBP 40,000 - 60,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm is seeking a Remote 24/7 SOC Analyst to join their team. This role involves monitoring, investigating security alerts, and responding to live incidents using top industry tools. Candidates with at least 1 year of SOC experience or 3 years in networking/security are encouraged to apply. This position offers clear progression into senior roles such as Threat Intel and SOC Engineering. Enjoy a competitive salary and strong benefits while working remotely from the UK.

Benefits

Competitive salary
Structured training
Career progression opportunities
Collaborative SOC culture

Qualifications

  • 1+ year SOC experience or 3+ years networking with security exposure.
  • Experience investigating alerts and understanding attack chains.
  • Curious, analytical mindset with a genuine interest in cyber defence.

Responsibilities

  • Monitor, triage & investigate alerts across SIEM/EDR/XDR.
  • Analyse attacker behaviour & build incident timelines.
  • Escalate incidents with clear technical context.

Skills

SOC experience
Investigation of alerts
Log analysis
Familiarity with Windows
Familiarity with Linux
Familiarity with macOS
Analytical mindset

Tools

Microsoft Sentinel
Google SecOps
Defender XDR
CrowdStrike
SentinelOne
Job description
REMOTE 24/7 SOC Analyst | UK-Based

Frontline cyber defence. Real incidents. Real progression.

Looking to build (or accelerate) your SOC career without commuting?

This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You’ll be hands‑on with live incidents, real attackers, and industry-leading tools — not just alert watching.

What you’ll be doing
  • Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
  • Analysing attacker behaviour & building incident timelines
  • Escalating incidents with clear technical context
  • Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
  • Contributing to threat hunting, detection improvements & SOC evolution
What we’re looking for
  • ✔️ 1+ year SOC experience or 3+ years infra/networking with security exposure
  • ✔️ Experience investigating alerts & understanding attack chains
  • ✔️ Strong log analysis & endpoint/network fundamentals
  • ✔️ Familiarity with Windows, Linux & macOS
  • ✔️ Curious, analytical mindset with a genuine interest in cyber defence
  • (Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern
  • 12-hour shifts: 2 days / 2 nights / 4 off
  • Flexibility required during major incidents
🔐 Clearance
  • SC clearance eligibility required (DV advantageous)
Why join?
  • Fully remote role (UK-based)
  • Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
  • Structured training, cyber ranges & real investigation exposure
  • Collaborative, technical SOC culture
  • Competitive salary + strong benefits
Interested?

Apply now or message me for a confidential chat.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.