Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst

Experis

City Of London

Hybrid

GBP 80,000 - 100,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading security solutions provider is seeking SOC Analysts to join their team in London. The roles focus on real-time security monitoring and incident response, requiring expertise in tools such as Microsoft Defender and SentinelOne. Candidates should have proven experience in SOC operations and effective communication skills. This role offers a competitive day rate and moves to a hybrid working model after an initial training period.

Qualifications

  • Strong expertise in at least two of the required technical skills.
  • Proven experience in a hands-on SOC Analyst role.
  • Excellent communication skills and teamwork abilities.

Responsibilities

  • Monitor and respond to security alerts across multiple platforms.
  • Conduct in-depth investigations of security events.
  • Produce incident documentation and reports.

Skills

Microsoft Security Stack
Microsoft Defender for Endpoint
Trellix (ePO)
SentinelOne
Incident documentation
Security frameworks (MITRE ATT&CK, NIST, ISO 27001)
Job description

Job Title: SOC Analyst (x3 Roles)

Location: On‑site, London moving to hybrid 3 days on‑site after 2‑week induction
Start Date: Immediate

Contract length: 31/03/26 further extensions expected
Clearance Required: BPSS (must be obtained prior to onboarding)
Day rate: 400 – 500

Overview

Our client is seeking three hands‑on SOC Analysts to join a security operations team in London. These roles are focused on real‑time monitoring, investigation, and incident response across a modern enterprise security environment. Collectively, the team must cover a broad set of security technologies, and candidates who bring strong, recent experience in at least two of the listed tools will be prioritised.

Key Responsibilities
  • Monitor, triage, and respond to security alerts across multiple platforms, including Microsoft and endpoint security tools.
  • Conduct in‑depth investigations of security events, escalating and containing incidents as required.
  • Optimise and tune detection rules, policies, and alerting mechanisms to improve SOC efficiency.
  • Collaborate with internal teams to support security operations, threat analysis, and incident recovery.
  • Produce clear incident documentation, reports, and recommendations for continuous improvement.
  • Contribute to maintaining and enhancing SOC processes, runbooks, and operational workflows.
Required Technical Expertise

Across the three hires, the team must collectively cover the following skill sets; individual candidates should possess strong expertise in at least two:

Microsoft Security Stack
  • Experience triaging and managing Microsoft security alerts from the Microsoft Security Center / Microsoft Defender portal
  • Microsoft Defender for Endpoint (MDE): advanced or enterprise‑level operational expertise, including investigations, threat hunting, and response
Trellix (ePO)
  • Hands‑on experience with configuration, policy management, agent deployment, and alert handling
SentinelOne
  • SOC operations experience including tuning, alert triage, threat investigation, and incident response
General Requirements
  • Proven experience in a hands‑on SOC Analyst role within an enterprise environment
  • Strong understanding of security operations, threat detection, and incident response workflows
  • Excellent communication skills and the ability to work effectively within a collaborative SOC team
Desirable Skills
  • Experience with incident documentation and reporting
  • Familiarity with security frameworks (MITRE ATT&CK, NIST, ISO 27001)
  • Ability to adapt quickly to new tools, threats, and operational priorities
  • Any relevant certifications (e.g., Security+, CySA+, Microsoft SC‑series, GIAC)
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.