Enable job alerts via email!

SOC Analyst (2nd Line)

Franklin Fitch

Portsmouth

On-site

GBP 50,000 - 70,000

Full time

21 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in the United Kingdom is seeking a Senior Security Analyst for their Cyber Defence function. The role focuses on detecting and responding to cyber threats, mentoring junior staff, and improving SOC operations. Candidates should have 2–4 years of experience and knowledge of SIEM/EDR platforms like Splunk and CrowdStrike. The position offers hybrid flexibility, funded certifications, and opportunities for career development.

Benefits

Hybrid flexibility
Funded certifications
Cutting-edge tooling
Clear development paths

Qualifications

  • 2–4 years' experience in a SOC, CSIRT, or cyber defence environment.
  • Solid knowledge of SIEM and EDR platforms.
  • Understanding of MITRE ATT&CK and security principles.
  • Experience with threat hunting or vulnerability management.

Responsibilities

  • Lead investigations and incident response.
  • Produce incident reports and guide remediation activities.
  • Support automation initiatives.

Skills

Lead investigations
Develop SIEM/EDR use cases
Proactive threat hunting
Coaching junior analysts
Strong analytical skills
Communication skills

Tools

Sentinel
Splunk
Defender
CrowdStrike
Job description
2 Senior Security Analyst – SOC / Incident Response

I'm partnering with a fast–growing Cyber Defence function that's strengthening its Security Operations Centre and looking for a talented Senior Security Analyst to join the team.

You’ll take a leading role in detecting, analysing, and responding to cyber threats across diverse client environments, mentoring junior analysts, improving detection content, and helping drive SOC maturity.

What you'll do:
  • Lead complex investigations and incident response.
  • Develop SIEM/EDR use cases and correlation rules.
  • Perform proactive threat hunting and support automation initiatives.
  • Produce incident reports and guide remediation activities.
  • Help coach and upskill junior analysts.
You should bring:
  • 2–4 years' experience in a SOC, CSIRT, or cyber defence environment.
  • Solid knowledge of SIEM and EDR platforms (Sentinel, Splunk, Defender, CrowdStrike, etc.).
  • Understanding of MITRE ATT&CK and network/cloud security principles.
  • Strong analytical and communication skills.
Bonus points for:
  • Scripting or automation experience (KQL, PowerShell, Python).
  • Background in threat hunting or vulnerability management.
Why apply?

Hybrid flexibility, funded certifications, cutting–edge tooling, and clear development paths into leadership or specialist roles.

If you're ready to step up and help evolve a modern SOC that genuinely invests in its people – let's chat.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.