Enable job alerts via email!

Security Operations Center Analyst

JR United Kingdom

Newcastle upon Tyne

On-site

GBP 50,000 - 70,000

Full time

7 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in cybersecurity is expanding its Security Operations Centre and seeks a Senior SOC Analyst. This role involves analyzing security incidents, optimizing detection strategies, and developing the SOC to meet national security challenges. Ideal candidates will have hands-on experience with relevant tools and knowledge of networking fundamentals.

Benefits

25 days of annual leave
Option to purchase more leave

Qualifications

  • Proven experience in Security Operations Centre is essential.
  • Experience with Microsoft Sentinel and Splunk crucial.
  • Knowledge of security tools and network fundamentals required.

Responsibilities

  • Analyze security incidents using Microsoft Sentinel and Splunk.
  • Fine-tune detection rules using MITRE ATT&CK.
  • Develop the Security Operations Centre's capabilities.

Skills

Security Operations Centre experience
Microsoft Sentinel
Splunk
MITRE ATT&CK familiarity
Networking fundamentals
Enterprise security tools knowledge
Log data analysis
Static malware analysis
Additional SIEM tools

Job description

Security Operations Center Analyst, Newcastle-upon-Tyne, Tyne and Wear

Client:
Location:

Newcastle-upon-Tyne, Tyne and Wear, United Kingdom

Job Category:

Other

EU work permit required:

Yes

Job Views:

3

Posted:

06.06.2025

Expiry Date:

21.07.2025

Job Description:

Job Title: Senior SOC Analyst - DV Cleared

Location: Gosport - On-site - (Mon-Fri, 9:00-17:30)

Role: We are rapidly expanding our Security Operations Centre (SOC) team and are looking for driven SOC Analysts who thrive in fast-paced, high-tech environments. This is a fantastic opportunity to support multiple high-profile clients across enterprise-scale environments while using industry-leading tools like Microsoft Sentinel, Splunk, and MISP. If you're ready to lead from the front, contribute to national security, and grow your cybersecurity career—this is the role for you.

Responsibilities:
  1. Analyzing security incidents using tools like Microsoft Sentinel and Splunk.
  2. Fine-tuning detection rules and strategies with frameworks like MITRE ATT&CK to stay ahead of threats.
  3. Contributing to the development of our Security Operations Centre to adapt to new challenges.
Skills / Must have:
  • Proven experience working in a Security Operations Centre.
  • Hands-on experience with Microsoft Sentinel and Splunk.
  • Familiarity with the MITRE ATT&CK framework.
  • Strong understanding of networking fundamentals (TCP/IP, WANs, LANs, protocols).
  • Knowledge of enterprise security tools such as firewalls, VPNs, antivirus, IDS/IPS, and log management.
  • Experience analyzing log data and network security events.
  • Understanding of static malware analysis and reverse engineering.
  • Familiarity with additional SIEM tools like QRadar.

Additional benefits include 25 days of annual leave, with the option to purchase more.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Security Operations Center Analyst

JR United Kingdom

Middlesbrough

On-site

GBP 40,000 - 60,000

6 days ago
Be an early applicant