Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Job Title: Level 1 SOC Analyst
Join the front line of cyber defence as a Level 1 SOC Analyst, where you’ll play a vital role in monitoring and responding to real-time security threats across diverse client environments. This is an ideal opportunity for someone with foundational cybersecurity or IT support experience who wants to accelerate their career in threat detection and incident response. You’ll work with cutting-edge tools such as Microsoft Sentinel, Defender XDR, CrowdStrike Falcon, Rapid7, and Microsoft Defender for Endpoint, while learning directly from experienced analysts in a supportive, growth-focused environment.
If you’re looking for hands-on exposure to live security operations, mentorship to fast-track your development, and the chance to make a real impact in protecting clients from evolving cyber threats, this role is for you.
Responsibilities:
Monitor and triage security alerts across SIEM, EDR, XDR, and other detection technologies.
Investigate potential security incidents and escalate in line with established processes.
Collaborate with senior analysts and threat response teams to resolve incidents efficiently.
Maintain detailed documentation of investigations, incidents, and actions taken.
Provide guidance and support to clients on incident handling and mitigation.
Support the creation and tuning of detection rules, threat-hunting queries, and analytics
Stay current on emerging threats, attacker behaviours, and new security technologies.
Skills / Must Have:
Experience with SIEM platforms and log analysis.
Ability to query and interpret log data; familiarity with KQL is beneficial.
Exposure to EDR tools such as CrowdStrike, Microsoft Defender for Endpoint, or Carbon Black.
Understanding of malware behaviour, IoCs, and basic analysis techniques.
Knowledge of networking fundamentals (TCP/IP, DNS, HTTP/S, SMB, RDP) and core security concepts (IDS/IPS, firewalls, VPNs).
Familiarity with cloud security monitoring, especially in Microsoft Azure.
Degree in Cybersecurity/IT or equivalent practical experience.
Strong attention to detail, process-driven approach, and excellent written and verbal communication.
Willingness to work in a collaborative, shift-based SOC environment.
Security-minded, ethical attitude with a desire to continuously learn.
Benefits:
Career progression pathways into threat hunting, incident response, engineering, or senior SOC roles.
Hands-on experience with industry-leading security tools and real-world incidents.
Mentorship from experienced analysts to accelerate your development.
Support for certifications and ongoing professional training.
A collaborative, high-growth environment with access to diverse client environments.
Salary:
£32,500 base + 15% shift allowance
Key Skills
Ranked by relevanceReady to apply?
Join Hamilton Barnes 🌳 and take your career to the next level!
Application takes less than 5 minutes

