Enable job alerts via email!

Senior Security Operations Center Analyst

ZipRecruiter

Hemel Hempstead

On-site

GBP 80,000 - 100,000

Full time

30 days ago

Job summary

A leading security firm in Hemel Hempstead seeks a Senior SOC Analyst to join their expanding Security Operations Centre. The role involves monitoring security incidents, analyzing network traffic, and providing Incident Response support. Candidates should have hands-on experience with Microsoft Sentinel and Splunk, alongside a strong understanding of networking fundamentals. Benefits include 25 days of annual leave, health cash plans, and a pension scheme.

Benefits

25 days annual leave, option to purchase more
Health cash plan
Life assurance
Pension scheme
Generous flexible benefits fund

Qualifications

  • Proven experience in a Security Operations Centre.
  • Familiarity with the Mitre ATT&CK framework.
  • Knowledge of firewalls, VPNs, AV, IDS/IPS.

Responsibilities

  • Monitor, triage, and investigate security incidents.
  • Conduct in-depth analysis of network traffic and logs.
  • Provide Incident Response support and documentation.
  • Continuously improve SOC tool usage and practices.
  • Prepare reports for clients tailored for stakeholders.

Skills

Security Operations Centre experience
Hands-on experience with Microsoft Sentinel
Hands-on experience with Splunk
Understanding of networking fundamentals
Knowledge of enterprise security tools
Experience analysing log data

Tools

Microsoft Sentinel
Splunk
QRadar
Job description

Job Description

Job Title:

Senior SOC Analyst

Role :

We are rapidly expanding our Security Operations Centre (SOC) team and are looking for driven SOC Analysts who thrive in fast-paced, high-tech environments. This is a fantastic opportunity to support multiple high-profile clients across enterprise-scale environments while using industry-leading tools like Microsoft Sentinel, Splunk, and MISP. If you're ready to lead from the front, contribute to security, and grow your cybersecurity career—this is the role for you.

Responsibilities:

Monitor, triage, and investigate security incidents on critical client infrastructure.

Conduct in-depth analysis of network traffic, system events, and logs to detect security threats and vulnerabilities.

Provide Incident Response support and maintain thorough incident documentation.

Continuously improve SOC tool usage, operational practices, and knowledge-sharing across the team.

Prepare and present reports for managed clients, tailoring content for both technical and non-technical stakeholders.

Skills/Must have:

Proven experience working in a Security Operations Centre.

Hands-on experience with Microsoft Sentinel and Splunk.

Familiarity with the Mitre ATT&CK framework.

Strong understanding of networking fundamentals (TCP/IP, WANs, LANs, common Internet protocols).

Knowledge of enterprise-grade security tools such as firewalls, VPNs, AV, IDS/IPS, and log management.

Experience analysing log data and network security events.

Desirable Skills:

Understanding of static malware analysis and reverse engineering.

CREST Practitioner Intrusion Analyst certification.

Familiarity with additional SIEM tools such as QRadar.

Benefits:

25 days annual leave, with the option to purchase more

Health cash plan

Life assurance

Pension scheme

Generous flexible benefits fund

Salary:

Competitive

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs