LYNK has partnered with a cybersecurity services provider to recruit multiple SOC Analysts as part of a growing detection and response function.This is advertised as remote due to the day to day responsibilities, however there is a 2–3 day on boarding requirement as well as 8–12 meetups per year. To make this easier we will prioritise candidates in the NW of England or as close to this as possible.
The company supports a diverse client base across critical sectors and operates a 24/7 SOC model with a strong emphasis on
quality triage, incident response, threat hunting, and internal cyber development not just alert monitoring.
You ll be part of a well–supported, technically capable team with a strong track record in crisis response and hands–on security operations. Whether you're looking to deepen your detection skills, expand into advisory work, or strengthen your incident response profile this is a role where you can genuinely grow.
What s in it for you?- GBP45,000 GBP55,000 salary (DOE)
- Additional training budget + vendor certifications
- 23 days holiday + bank holidays + 3 extra days over Christmas
- Private healthcare buyback scheme
- Remote–first working model
- Occasional trips to HQ (Gloucestershire) or serviced office (Manchester) monthly or quarterly
- All onboarding travel is expensed
- 37.5 hour week with early finish one day a week
- Structured progression and internal knowledge–sharing culture
Key Responsibilities- Triage and investigate alerts from a range of SIEM and EDR platforms
- Perform initial escalation, incident classification, and severity assessment
- Conduct threat hunting and intel correlation using raw log sources
- Produce clear incident documentation and response reports
- Participate in internal security operations (log management, monitoring, etc.)
- Engage in client–focused services such as dark web monitoring, supply chain risk, and CIS–based gap analysis
- Contribute to the design and improvement of playbooks, procedures, and crisis simulations
- Occasionally support advisory work around common threats like ransomware, insider threat, and lateral movement
About You- 1.5+ years in a SOC or CSIRT role
- Experience working with raw data and security log analysis
- Comfortable with threat intel, IOC correlation, and incident documentation
- Knowledge of security methodologies, intrusion techniques, and detection frameworks
- A strong communicator able to explain security issues clearly to both technical and non–technical teams
- Preferably experienced in one or more core tech areas (cloud, endpoint, networks, etc.)
- You must have the unrestricted right to work in the UK this role is not eligible for visa sponsorship.
Please note: This is a
24/7 SOC, with 8–hour rotational shift patterns. A rota is available upon request.
Interested?Apply now or contact
(url removed) for more info.