Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst

Techtrace Partners

Letchworth

On-site

GBP 40,000 - 55,000

Full time

9 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm in Letchworth is seeking an experienced SOC Analyst to join their mission-critical cyber defense team. The ideal candidate will have multiple years in a SOC role, strong skills in Microsoft Sentinel and Splunk, and must be eligible for DV clearance. This hands-on role involves monitoring security alerts, conducting threat analysis, and supporting incident response in a dynamic environment that values team collaboration and career growth opportunities. Relocation support is available for qualified candidates.

Qualifications

  • Multiple years in a SOC or cyber defense role, ideally in a high-threat, enterprise or defense setting.
  • Strong experience with Microsoft Sentinel and Splunk.
  • Eligible for SC / DV clearance.

Responsibilities

  • Monitoring and triaging security alerts across host and network infrastructure.
  • Conducting threat analysis using SIEM tools and threat intel feeds.
  • Supporting incident response from escalation through containment and recovery.

Skills

Experience in SOC or cyber defense role
Proficient with Microsoft Sentinel
Proficient with Splunk
Understanding of MITRE ATT&CK
Networking fundamentals (TCP/IP, VPNs)
Job description

South of England | On-Site | British Citizens Only | Shift-Based | Open to Relocators |

Must be eligible for DV Clearence

Step into a mission-critical cyber defence environment where every alert, action, and analysis helps protect critical national infrastructure. We're looking for experienced SOC Analysts to join support one of the UKs most secure & diverse SOC environments.

This is a real hands‑on role - not just clicking dashboards. You’ll be working with Microsoft Sentinel, Splunk, and a range of security tools to identify and respond to advanced threats in a highly trusted, maturing SOC environment.

What You’ll Be Doing
  • Monitoring and triaging security alerts across host and network infrastructure
  • Conducting threat analysis using SIEM tools, log data, and threat intel feeds
  • Supporting incident response from escalation through containment and recovery
  • Improving detection rules and playbooks with a threat‑informed approach
  • Contributing to a collaborative, experienced team where your input drives maturity
What You’ll Need
  • Multiple years in a SOC or cyber defence role ideally in a high‑threat, enterprise or defence setting
  • Strong experience with Microsoft Sentinel and Splunk
  • Comfortable with MITRE ATT&CK, threat modelling, and security event triage
  • Confident in networking fundamentals (TCP/IP, VPNs, proxies, DNS) and security tooling
  • British Citizenship is essential (must meet criteria for secure site access)
  • Eligible for SC / DV clearance
Open to Relocators

Based elsewhere in the UK? No problem. We're open to cleared candidates looking to relocate to join a purpose‑driven team in a secure location. Relocation support can be discussed post‑screening.

Why This Team?
  • Be part of a team that’s building real capability, not just chasing SLA metrics
  • Operate in a tool‑rich, well‑funded SOC that values your voice
  • Work on high‑value systems and incidents that genuinely matter
  • Shift‑based schedule designed for work‑life rhythm
  • Long‑term programme stability with scope for clearance upgrades and career growth

Apply now for a confidential conversation.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.