Job Search and Career Advice Platform

Enable job alerts via email!

24/7 SOC Analyst

IP PEOPLE LTD

Remote

GBP 50,000 - 70,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm is seeking a fully remote 24/7 SOC Analyst based in the UK. This role involves hands-on engagement with live incidents and requires 1+ years of SOC experience or equivalent experience in networking with a security focus. Candidates should have strong analytical skills and familiarity with various operating systems. Opportunities for progression into senior roles and a collaborative environment are offered, along with a competitive salary and strong benefits.

Benefits

Competitive salary
Structured training
Clear progression opportunities

Qualifications

  • 1+ year SOC experience or 3+ years infra/networking with security exposure.
  • Experience investigating alerts & understanding attack chains.
  • Strong log analysis & endpoint/network fundamentals.

Responsibilities

  • Monitoring, triaging & investigating alerts across SIEM / EDR / XDR.
  • Analysing attacker behaviour & building incident timelines.
  • Escalating incidents with clear technical context.

Skills

SOC experience
Log analysis
Analytical mindset
Familiarity with Windows, Linux & macOS

Tools

Microsoft Sentinel
Google SecOps
Defender XDR
CrowdStrike
SentinelOne
Job description
REMOTE 24/7 SOC Analyst | UK-Based

Frontline cyber defence. Real incidents. Real progression.

Looking to build (or accelerate) your SOC career without commuting?

This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You’ll be hands‑on with live incidents, real attackers, and industry-leading tools — not just alert watching.

What you’ll be doing
  • Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
  • Analysing attacker behaviour & building incident timelines
  • Escalating incidents with clear technical context
  • Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
  • Contributing to threat hunting, detection improvements & SOC evolution
What we’re looking for
  • ✔️ 1+ year SOC experience or 3+ years infra/networking with security exposure
  • ✔️ Experience investigating alerts & understanding attack chains
  • ✔️ Strong log analysis & endpoint/network fundamentals
  • ✔️ Familiarity with Windows, Linux & macOS
  • ✔️ Curious, analytical mindset with a genuine interest in cyber defence
  • (Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern
  • 12-hour shifts: 2 days / 2 nights / 4 off
  • Flexibility required during major incidents
🔐 Clearance
  • SC clearance eligibility required (DV advantageous)
Why join?
  • Fully remote role (UK-based)
  • Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
  • Structured training, cyber ranges & real investigation exposure
  • Collaborative, technical SOC culture
  • Competitive salary + strong benefits
Interested?

Apply now or message me for a confidential chat.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.