SOC Analyst - SC Cleared

SOC Analyst - SC Cleared

Posted 1 week ago by SR2 | Socially Responsible Recruitment | Certified B Corporation™ on Linkedin

Negotiable
Undetermined
Undetermined
London, England, United Kingdom

Summary: The role of SOC Analyst involves joining a leading security operations team within a high-profile organization, aimed at junior security professionals with 1-2 years of experience. The successful candidates will monitor and respond to security threats in real-time, gaining exposure to enterprise-level security tools and incident response processes. This position offers an excellent opportunity for skill development within a structured and high-performing security environment. Candidates will work collaboratively within a dynamic Security Operations Centre (SOC) to enhance detection and response capabilities.

Key Responsibilities:

  • Monitor SIEM tools and other security technologies to detect and investigate potential threats.
  • Analyse security alerts, escalate incidents as necessary, and provide initial response and triage.
  • Assist in incident containment, eradication, and recovery efforts as part of the SOC team.
  • Work with Microsoft Security Stack, including Microsoft Sentinel and Defender.
  • Support the development of SOC playbooks, threat hunting procedures, and incident response workflows.
  • Conduct basic forensic investigations and contribute to post-incident reporting.
  • Maintain accurate documentation of security incidents, resolutions, and investigative findings.
  • Collaborate with senior analysts and security engineers to improve detection and response capabilities.
  • Stay updated on emerging cyber threats, vulnerabilities, and attack techniques.

Key Skills:

  • 1-2 years of security experience, with at least 1 year in a commercial SOC environment.
  • Hands-on experience with SIEM platforms (preferably Microsoft Sentinel or other enterprise solutions).
  • Basic knowledge of cyber threat detection, security monitoring, and incident response methodologies.
  • Understanding of common attack techniques and frameworks (e.g., MITRE ATT&CK).
  • Familiarity with security tools such as EDR, IDS/IPS, firewalls, and log analysis platforms.
  • Strong analytical and problem-solving skills with the ability to assess and escalate threats effectively.
  • Ability to work in a fast-paced environment with shifts/on-call duties as required.
  • Experience with Microsoft Defender for Endpoint, Azure Security Center, or other Microsoft security tools (desirable).
  • Certifications such as CompTIA Security+, Microsoft SC-200, or GIAC (GCIH, GCIA, or GCFA) (desirable).
  • Knowledge of basic scripting (PowerShell, Python) for security automation (desirable).
  • Previous experience in threat intelligence, vulnerability management, or digital forensics (desirable).

Salary (Rate): undetermined

City: London

Country: United Kingdom

Working Arrangements: undetermined

IR35 Status: undetermined

Seniority Level: Entry Level

Industry: IT