Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst

Sopra Steria Limited

Farnborough

On-site

GBP 40,000 - 60,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology firm is seeking L2 SOC Analysts to join their Security Operations Centre in Farnborough. The role involves investigating security threats, managing incidents, and tuning detections. Required qualifications include experience in a Security Operations Centre, familiarity with Microsoft Sentinel and Splunk, and relevant certifications. This position is shift-based with opportunities for professional development in a supportive environment focused on national security.

Benefits

Support for professional development
Mentorship opportunities
Collaborative work environment

Qualifications

  • Ability to work shifts from our office in Farnborough.
  • Experience demonstrated in Security Operations Centre.
  • Basic knowledge of client-server applications, multi-tier web applications, databases, and firewalls.

Responsibilities

  • Monitor, analyze security alerts and conduct investigations.
  • Raise complex incidents to Senior Analysts.
  • Manage SOC Incident queues.
  • Prepare reports for clients and improve detection rules.

Skills

Security Operations Centre experience
Microsoft Sentinel
Splunk
Mitre Att&ck Framework knowledge
Basic knowledge of client-server applications
Networking principles (TCP/IP, WANs, LANs)
Entry-level cybersecurity certification (e.g. CompTIA Security+)
Programming/scripting (Python, PowerShell)

Education

Academic module in cybersecurity or related subject
CREST Practitioner Intrusion Analyst/Blue Teams Level 1
Job description

We're expanding our Security Operations Centre in Farnborough and looking for sharp, collaborative L2 SOC Analysts to protect enterprise-scale environments across the Defence sector. You'll investigate real threats, tune detections, and make measurable impact-using Microsoft Sentinel, Splunk, and MISP. Your work fuels national security. Your growth fuels our mission. Role based on site in our Farnborough office and is shift work. 2 x 6am to 6pm, 2 x 6pm to 6am, 4 days off. You do need to be eligible for DV Clearance for this role, and cannot start until your clearance is through.

Responsibilities
  • Monitor, analyse security alerts and events, conduct initial investigations, and determine the appropriate response.
  • Raise complex incidents to Senior Analysts.
  • Manage SOC Incident queues.
  • Support the maintenance of monitored asset baselines of the customer environments.
  • Prepare reports for managed clients to both technical and non-technical audiences.
  • Collaborate on improving detection rules and use cases aligned with Mitre Att&ck and threat-informed defense.
  • Participate in a team effort to guarantee that corporate data and technology platform components are shielded from known threats.
  • Collaborate with team members to maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies.
  • Aid the development and use of threat intelligence throughout the service.
Qualifications
  • Ability to work shifts from our office in Farnborough.
  • Experience demonstrated in Security Operations Centre.
  • Experience using Microsoft Sentinel and Splunk.
  • Knowledge and experience with Mitre Att&ck Framework.
  • Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products.
  • Understanding of networking principles including TCP/IP, WANs, LANs and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP.
  • Entry level cyber security certification (e.g. CompTIA Security+, CEH, CPSA).
  • CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications.
  • Completed an academic module in cyber security or a related subject.
Nice to Have
  • Programming and scripting such as Python, Perl, Bash, PowerShell, C++.
  • CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications.
  • Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar.
About the Company

Sopra Steria's Aerospace, Defence and Security business designs, develops and deploys digital solutions to Central Government clients. The work we do makes a real difference to the client's goal of National Security, and we operate in a unique and privileged environment.

We are given time for professional development activities, and we coach and mentor our colleagues, sharing knowledge and learning from each other. We foster a culture in which employees feel valued and supported and have pride in their work for the customer, delivering outstanding rates of customer satisfaction in the UK's most complex safety- and security-critical markets.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.