Enable job alerts via email!

SOC Analyst

Learning People

City Of London

Hybrid

GBP 40,000 - 60,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity company based in London seeks a motivated SOC Analyst to enhance their cyber defense capabilities. The role involves monitoring security incidents, responding to threats, and collaborating with IT teams. Candidates should have experience in a SOC or related field and knowledge of cybersecurity fundamentals. Offering a hybrid working model and opportunities for professional growth.

Benefits

Competitive salary based on experience
Ongoing training and professional development
Exposure to advanced security tools
Career progression opportunities

Qualifications

  • 1-3 years of experience in SOC, NOC, or security monitoring role.
  • Strong understanding of malware, phishing, DDoS, and insider threats.
  • Knowledge of TCP/IP, DNS, firewalls, IDS/IPS.

Responsibilities

  • Monitor and analyze security events and alerts.
  • Investigate suspicious activities and incidents.
  • Produce incident reports and metrics.

Skills

Cybersecurity fundamentals
Incident response experience
Familiarity with SIEM tools
Networking fundamentals
Scripting skills

Education

Relevant certifications (e.g., CompTIA Security+)

Tools

SIEM tools (e.g., Splunk)
Job description
Job Description

SOC Analyst

Location: London, UK

Employment Type: Full-time

About the Role

We are seeking a motivated and detail-oriented SOC Analyst to join our London-based Security Operations Centre. As a SOC Analyst, you will be on the front line of our cyber defence, monitoring, detecting, and responding to security incidents that could impact our business and clients. This is a key role in safeguarding our information assets, ensuring compliance, and supporting continuous improvements to our security posture.

Key Responsibilities
  • Monitor and analyse security events, logs, and alerts from SIEM and other security tools.
  • Investigate suspicious activities, potential threats, and incidents.
  • Respond to and escalate security events in line with incident response procedures.
  • Conduct initial triage and root cause analysis of security issues.
  • Support vulnerability management processes and assist in patching/mitigation efforts.
  • Produce incident reports, metrics, and recommendations to strengthen defences.
  • Collaborate with IT, Infrastructure, and Security teams to improve monitoring and detection capabilities.
  • Stay up to date with emerging cyber threats, attack techniques, and best practices.
Requirements

Skills & Experience

  • Prior experience in a SOC, NOC, or security monitoring role (1-3 years for entry-level/mid, more for senior).
  • Strong understanding of cybersecurity fundamentals, including malware, phishing, DDoS, and insider threats.
  • Familiarity with SIEM tools (e.g., Splunk, QRadar, Sentinel, ArcSight, etc.).
  • Knowledge of networking fundamentals (TCP/IP, DNS, firewalls, IDS/IPS).
  • Incident response and escalation experience.
  • Scripting skills (Python, PowerShell, Bash) desirable but not essential.
  • Relevant certifications (e.g., CompTIA Security+, CySA+, SSCP, GSEC, or equivalent) are a plus.
Benefits

What We Offer

  • Competitive salary based on experience.
  • Hybrid working model (London office & remote).
  • Ongoing training and professional development opportunities.
  • Exposure to advanced security tools and technologies.
  • Career progression within our growing Cyber Security team.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.