Job Search and Career Advice Platform

Enable job alerts via email!

SOC Analyst

Tria

United Kingdom

Hybrid

GBP 38,000 - 45,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading IT security firm in Bristol is looking for a skilled SOC Analyst to join their IT Security team. The role involves monitoring security alerts, investigating incidents, and developing detection rules. Candidates should have 3+ years of experience in SOC or incident response, strong knowledge of Microsoft security tools, and scripting skills. This position offers a competitive salary, generous benefits, and the opportunity for professional development within a hybrid working environment.

Benefits

Generous benefits package
Yearly salary review
Professional development opportunities

Qualifications

  • 3+ years experience in SOC or incident response roles.
  • Strong knowledge of Microsoft security stack and SIEM tools.
  • Experience writing and optimizing detection queries.
  • Good scripting skills in Python and PowerShell.

Responsibilities

  • Monitor and triage security alerts and incidents.
  • Investigate incidents and perform root-cause analysis.
  • Develop detection rules and automate response workflows.
  • Contribute to SOC process improvements and documentation.

Skills

Experience in a SOC or security operations role
Knowledge of Microsoft security stack
Writing detection queries (e.g. KQL)
Automation or scripting skills (e.g. Python, PowerShell)
Threat-hunting and analytical mindset
Communication skills

Tools

SIEM tools
Microsoft Defender
Job description

SOC Analyst: IT Security Team

Location: Bristol

Remote: 1 day onsite per month

Salary: Up to 45,000 + generous benefits package, yearly salary review and personal development / business success bonus

Contract: Permanent, full–time (35 hours per week); core hours 09:00–17:00 (incl. 1 hour lunch)

I'm working with a company that’s looking to bring a skilled SOC Analyst into their IT Security team as part of continued growth within the function. They’re keen to move quickly for the right person.

What you’ll be doing
  • Operate, tune and configure SIEM tools
  • Monitor and triage security alerts, applying custom queries (e.g. KQL) and correlation rules to detect suspicious activity.
  • Investigate security incidents across endpoints, networks, and cloud environments; perform root–cause analysis, impact assessment and containment actions.
  • Develop and maintain detection rules, use cases, threat–intelligence processes, and incident response playbooks.
  • Automate detection and response workflows, using scripting tools (e.g. Python, PowerShell).
  • Perform threat–hunting, log–analysis (including firewall, web/email filters), implement or review DLP controls, and collaborate with infrastructure/cloud/application teams on remediation and security posture improvements.
  • Contribute to continuous improvement of SOC processes (alert tuning, log–source enrichment, documentation), and take part in an on–call rotation to support out–of–hours coverage if needed.
What we’re looking for
  • Solid experience, ideally 3+ years working in a SOC or security operations/incident–response role.
  • Strong working knowledge of Microsoft security stack (e.g. Sentinel, Defender) and hands–on experience with SIEM tooling, alerts triage, detection logic, and security incident workflows.
  • Ability to write and optimise detection queries (e.g. in KQL), review firewall and security logs, manage email/web filtering policies, and implement / review Data Loss Prevention (DLP) controls.
  • Experience with automation or scripting (e.g. Python, PowerShell) to streamline detection/response and improve SOC efficiency.
  • Threat–hunting and analytical mindset; proactive and collaborative approach; good communication skills and ability to work across teams.
Why consider this opportunity
  • You’ll join a growing, forward–thinking security operations function, gaining hands–on responsibility for threat detection, incident response and overall security posture.
  • Competitive salary and benefits, plus opportunities for professional development and long–term career growth.
  • Flexible, hybrid working with monthly in–office requirement, suitable if you value work/life balance.
  • Great entry point for someone experienced in general SOC/InfoSec backgrounds, no need to have previous experience in the legal or financial sector (though that kind of background is welcome).

If you’re looking to join an established team that will aid career growth, whilst offering an excellent work–life balance.

Apply NOW

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.