Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst

Experis

Greater London

Hybrid

GBP 100,000 - 125,000

Full time

3 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading recruiting firm is looking for a SOC Analyst to join their security operations team in London. This role involves real-time monitoring and incident response within a modern enterprise security environment. Candidates should have proven experience and strong knowledge of security operations, with skills in tools such as Sentinel and MDE. Successful applicants will need to be eligible for SC clearance. Competitive day rates between £400 to £500 are offered, and the position begins on-site before transitioning to a hybrid model.

Qualifications

  • Proven experience in a hands-on SOC Analyst role within an enterprise environment.
  • Ability to adapt quickly to new tools, threats, and operational priorities.

Responsibilities

  • Monitor, triage, and respond to security alerts across multiple platforms.
  • Conduct in-depth investigations of security events.
  • Optimise and tune detection rules and alerting mechanisms.

Skills

Sentinel, MDE and MDI deployments
Strong understanding of security operations
Excellent communication skills

Education

Relevant certifications (e.g., Security+, CySA+, Microsoft SC-series, GIAC)
Job description

Job Title: SOC Analyst

Location: On–site, London moving to hybrid 3 days on–site after 2–week induction

Start Date: Immediate

Contract length: 31/03/26 further extensions expected

Clearance Required: BPSS (must be obtained prior to onboarding)

Day rate: 400 – 500

Candidates must be eligible for SC clearance

Our client is seeking a SOC Analyst to join a security operations team in London. The role is focused on real–time monitoring, investigation, and incident response across a modern enterprise security environment.

Key Responsibilities
  • Monitor, triage, and respond to security alerts across multiple platforms, including Microsoft and endpoint security tools.
  • Conduct in–depth investigations of security events, escalating and containing incidents as required.
  • Optimise and tune detection rules, policies, and alerting mechanisms to improve SOC efficiency.
  • Collaborate with internal teams to support security operations, threat analysis, and incident recovery.
  • Produce clear incident documentation, reports, and recommendations for continuous improvement.
  • Contribute to maintaining and enhancing SOC processes, runbooks, and operational workflows.
Required Technical Expertise
  • Sentinel, MDE, and MDI deployments
  • Proven experience in a hands–on SOC Analyst role within an enterprise environment
  • Strong understanding of security operations, threat detection, and incident response workflows
  • Excellent communication skills and the ability to work effectively within a collaborative SOC team
Desirable Skills
  • Experience with incident documentation and reporting
  • Familiarity with security frameworks (MITRE ATT&CK, NIST, ISO 27001)
  • Ability to adapt quickly to new tools, threats, and operational priorities
  • Any relevant certifications (e.g., Security+, CySA+, Microsoft SC–series, GIAC)
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.