Enable job alerts via email!

Principle SOC Analyst (Remote)

Sanderson Government & Defence

Newbury

Remote

GBP 60,000 - 90,000

Full time

6 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A fast-growing cyber security consultancy seeks a Senior or Principal SOC Analyst. You'll work alongside the SOC leadership team to detect and respond to advanced threats while shaping processes and potentially stepping into a management role. With 100% remote working and opportunities for strategic input, it’s a pivotal time to join.

Benefits

Flexibility for people management
Investment in team growth
Minimal travel requirements

Qualifications

  • Significant experience in a SOC or cyber threat analysis role.
  • Strong analytical mindset focusing on threats.
  • Comfortable in technical escalation roles.

Responsibilities

  • Lead detection and response to advanced threats.
  • Collaborate with analysts and engineers.
  • Scrutinize threat data and improve processes.

Skills

Analytical mindset
Threat analysis
Incident response
Technical escalation
Data investigation

Tools

Elastic SIEM
Microsoft Sentinel
CrowdStrike Falcon
Defender for Endpoint
MISP

Job description

Sanderson G&D are partnering with a fast-growing cyber security consultancy undergoing significant change and transformation - and they’re looking for a Senior or Principal SOC Analyst to take a leading role in detecting and responding to advanced threats across a growing portfolio of clients.

With recent internal promotions, this is a newly defined, high-impact opportunity sitting at the heart of the SOC leadership team. Reporting into the Head of SOC, you’ll serve as both a technical escalation point and an analytical expert - collaborating closely with analysts, engineers, and strategic stakeholders.

The Role

This is more than just a hands-on analyst role. You’ll be looking at the bigger picture; investigating threats, guiding incident flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like:

  • Elastic SIEM
  • Microsoft Sentinel
  • Defender for Endpoint
  • CrowdStrike Falcon
  • MISP (Malware Information Sharing Platform)

As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management role if you’re interested in developing others.

What We’re Looking For

  • Significant experience in a SOC or cyber threat analysis role, ideally within a multi-client (MSSP or consultancy) environment
  • Strong analytical mindset – focused on not just what happened, but why, how, and how to prevent it
  • Comfortable being an escalation point for technical and analytical issues
  • Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.)
  • Natural curiosity and willingness to get hands-on with data and investigations
  • Broad exposure across cyber domains beyond pure SOC is highly valued

Why This Role?

  • Be a key hire in a growing and evolving SOC leadership team
  • Join during a time of strong momentum and investment
  • Flexibility to take on people management and strategic input
  • 100% remote working with minimal travel (2–3 events per year)
  • Shape how the team detects, responds, and prevents future threats

Security Clearance: Must be eligible for SC clearance

Ready to step up and shape the future of SOC operations?

Apply now or get in touch for a confidential chat.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.