Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst

Anson McCade

Remote

GBP 100,000 - 125,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cyber security firm is looking for a SOC Analyst to enhance their security function. This remote role requires candidates to have at least 12 months of commercial SOC experience and strong skills in Microsoft Sentinel and KQL. Responsibilities include monitoring security events, triaging alerts, and developing detection rules. A competitive salary of up to £42,000 DOE plus a £7,000 bonus is offered, with an emphasis on professional development without shift work.

Qualifications

  • At least 12 months of commercial SOC experience.
  • Strong experience with Microsoft Sentinel.
  • Confident in using KQL for detection and threat-hunting.

Responsibilities

  • Monitor and analyse security events for threats.
  • Carry out triage and investigation of alerts.
  • Build analytics and detection rules using KQL.

Skills

Commercial SOC experience
Microsoft Sentinel
KQL for detection and hunting
Understanding of intrusion analysis
Job description
SOC Analyst

Location: Remote (you must be based near London, Leeds, Manchester, or Gloucester)

Salary: Up to £42,000 DOE + £7,000 bonus

Clearance: You must be eligible for DV clearance.

Our client is expanding their cyber security function and is hiring a SOC Analyst to support the detection and investigation of complex threats across a large-scale environment. This is a Monday–Friday role with no shift work.

They’re looking for someone with at least a year of commercial SOC experience who’s confident working with Microsoft Sentinel and comfortable writing, adjusting, and analysing KQL queries for detection, investigation and threat-hunting.

Role Responsibilities
  • Monitor and analyse security events to identify threats, attacks and suspicious activity.
  • Carry out full triage and investigation of alerts.
  • Use KQL within Microsoft Sentinel to build analytics, detection rules, and conduct hunts for indicators of compromise.
  • Contribute to SIEM / SOAR playbooks and improve detection capabilities.
  • Document incidents, TTPs and root-cause findings.
  • Work with internal and external stakeholders during investigations.
  • Support continuous improvements to threat awareness and team capability.
What You’ll Need
  • 12+ months commercial SOC experience.
  • Strong Microsoft Sentinel experience.
  • Confident using KQL for detection rules or threat-hunting.
  • Understanding of intrusion analysis across Windows and Azure environments.
  • Good grounding in MITRE ATT&CK, networking and core security principles.
  • Ability to pick up new tools, techniques and attacker behaviours quickly.

If you have hands-on Sentinel and KQL experience and want a role where you can deepen your threat detection skills without shift work, we’d encourage you to apply.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.