Job Search and Career Advice Platform

Enable job alerts via email!

24/7 SOC Analyst

IP PEOPLE LTD

Remote

GBP 40,000 - 60,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm is seeking a remote 24/7 SOC Analyst to manage live incidents within an analyst-led Security Operations Centre. You will monitor alerts, investigate breaches, and enhance security measures using advanced tools. The ideal candidate has at least one year of SOC experience or three years of networking with security exposure. This role offers clear progression into senior positions and provides structured training and cyber security exposure.

Benefits

Competitive salary
Strong benefits
Structured training

Qualifications

  • 1+ year SOC experience or 3+ years infra/networking with security exposure.
  • Experience investigating alerts & understanding attack chains.
  • Strong log analysis & endpoint/network fundamentals.
  • Familiarity with Windows, Linux & macOS.
  • Curious, analytical mindset with genuine interest in cyber defence.

Responsibilities

  • Monitoring, triaging & investigating alerts across SIEM / EDR / XDR.
  • Analysing attacker behaviour & building incident timelines.
  • Escalating incidents with clear technical context.
  • Contributing to threat hunting, detection improvements & SOC evolution.

Skills

Log analysis
Incident investigation
Endpoint fundamentals
Network fundamentals
Curiosity in cyber defence

Tools

Microsoft Sentinel
Google SecOps
Defender XDR
CrowdStrike
SentinelOne
Job description
REMOTE 24/7 SOC Analyst | UK-Based

Frontline cyber defence. Real incidents. Real progression.

Looking to build (or accelerate) your SOC career without commuting?

This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You’ll be hands‑on with live incidents, real attackers, and industry-leading tools — not just alert watching.

What you’ll be doing
  • Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
  • Analysing attacker behaviour & building incident timelines
  • Escalating incidents with clear technical context
  • Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
  • Contributing to threat hunting, detection improvements & SOC evolution
What we’re looking for
  • ✔️ 1+ year SOC experience or 3+ years infra/networking with security exposure
  • ✔️ Experience investigating alerts & understanding attack chains
  • ✔️ Strong log analysis & endpoint/network fundamentals
  • ✔️ Familiarity with Windows, Linux & macOS
  • ✔️ Curious, analytical mindset with a genuine interest in cyber defence
  • (Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern
  • 12-hour shifts: 2 days / 2 nights / 4 off
  • Flexibility required during major incidents
🔐 Clearance
  • SC clearance eligibility required (DV advantageous)
Why join?
  • Fully remote role (UK-based)
  • Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
  • Structured training, cyber ranges & real investigation exposure
  • Collaborative, technical SOC culture
  • Competitive salary + strong benefits
Interested?

Apply now or message me for a confidential chat.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.