Enable job alerts via email!

Senior SOC Analyst (Level 3) - Technology Services Provider

Hamilton Barnes Associates Limited

West Midlands

On-site

GBP 60,000 - 71,000

Full time

26 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading global technology services provider is seeking a Senior SOC Analyst to join a new Security Operations Centre in Solihull. This role involves overseeing security monitoring, leading incident response efforts, and integrating threat intelligence. Candidates should have 3–5+ years’ experience in SOC environments and hands-on experience with SIEM tools. Offering a salary up to £71,000 with a bonus and impressive benefits, this position is ideal for those looking to make a significant impact in a modern SOC environment.

Benefits

BUPA Healthcare
Income Protection
Life Assurance
25 days holiday

Qualifications

  • Proven experience in SOC or MDR environments (3–5+ years).
  • Strong knowledge of Incident Response, Threat Hunting, and Network Security.
  • Strong analytical, communication, and documentation skills.

Responsibilities

  • Oversee and enhance SIEM monitoring for incident detection.
  • Lead response activities to contain and remediate security incidents.
  • Integrate threat intelligence to enhance proactive detection.
  • Manage and optimise SIEM platforms and implement new SOC technologies.

Skills

Eligibility for SC Clearance
Experience in SOC or MDR environments
Hands-on experience with SIEM tools
Knowledge of Incident Response
Understanding of MITRE ATT&CK
Familiarity with Vulnerability Management
Strong analytical skills
Relevant certifications

Tools

Microsoft Sentinel
QRadar
Splunk
Job description
Role overview

We’re working with a leading global technology services provider that’s establishing a brand-new Security Operations Centre (SOC) in Solihull. This is an exciting opportunity to join as a Senior SOC Analyst (L3) and play a key role in building, shaping, and optimising a modern SOC environment.

You’ll act as a technical escalation point for L1 and L2 analysts, taking ownership of complex incidents, investigations, and threat-hunting activities. You’ll help strengthen detection and response capabilities, develop use cases, and drive continual improvement across SOC operations.

If you’re a Senior SOC Analyst ready to take on a pivotal role in a forward-thinking organisation, we’d love to hear from you.

Apply now to discuss this opportunity in confidence.

Responsibilities
  • Security Monitoring & Investigation
    • Oversee and enhance SIEM monitoring to ensure high-quality incident detection.
    • Conduct in-depth analysis of security events and coordinate response activities.
    • Support and mentor SOC Analysts (L1/L2) to ensure best practices are followed.
    • Document findings and contribute to ongoing SOC process improvement.
  • Incident Response
    • Lead response activities to contain and remediate security incidents.
    • Develop and maintain incident response plans aligned with industry best practices.
    • Conduct root cause analysis and produce post-incident reports.
  • Threat Intelligence & Hunting
    • Integrate threat intelligence feeds to enhance proactive detection.
    • Fine-tune SIEM detection rules and use cases to reduce false positives.
    • Conduct adversary simulations and proactive threat hunting using EDR/SIEM tools.
  • Security Tool Management
    • Manage and optimise SIEM platforms (e.g. Sentinel, QRadar, Splunk).
    • Evaluate and implement new SOC technologies and automation (SOAR, Sigma, YARA).
  • Collaboration & Documentation
    • Work closely with internal technical teams, service managers, and clients.
    • Produce detailed reporting packs, runbooks, and playbooks.
    • Support pre-sales activities, demonstrations, and service design for new opportunities.
Skills & Experience
  • Eligibility for SC Clearance (or currently hold SC).
  • Proven experience in SOC or MDR environments (3–5+ years).
  • Hands-on experience with SIEM tools (Microsoft Sentinel preferred).
  • Strong knowledge of Incident Response, Threat Hunting, and Network Security.
  • Understanding of MITRE ATT&CK, Cyber Kill Chain, and forensic methodologies.
  • Familiarity with Vulnerability Management, Pen Testing, and Cloud Security (AWS/Azure).
  • Strong analytical, communication, and documentation skills.
  • Relevant certifications such as CISSP, GIAC, SC-200, or Certified SOC Analyst are advantageous.
Benefits
  • Be part of a brand-new SOC environment with cutting-edge security technologies.
  • Work for a global leader in cyber defence and managed security services.
  • Enjoy an empowering culture that values innovation, collaboration, and professional growth.
Salary & Package
  • Up to £71,000 + 10% Bonus + Excellent Benefits
  • BUPA Healthcare
  • Income Protection (5 years / 75% salary)
  • 25 days holiday (option to buy 5 more)
  • Life Assurance (x4 salary)
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.