Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Position Overview
- We are seeking a highly skilled and detail-oriented Security Operations Center (SOC) Analyst to join our remote team in the UK.
- The SOC Analyst will be responsible for monitoring, detecting, investigating, and responding to security incidents across the organization.
- The ideal candidate will have strong analytical skills, deep knowledge of cybersecurity tools, and hands-on experience in threat detection and incident response.
Key Responsibilities
1. Security Monitoring & Detection
- Monitor security alerts, logs, and events via SIEM tools (e.g., Splunk, QRadar, Sentinel, Elastic).
- Analyze network traffic, endpoint events, and cloud security logs to identify suspicious activity.
- Correlate alerts from multiple security tools to detect potential threats.
2. Incident Response
- Triage, analyze, and escalate security incidents based on severity and impact.
- Perform initial investigation and provide containment recommendations.
- Document incident timelines, findings, and recommended remediation actions.
- Collaborate with IT, DevOps, and Security teams to ensure swift incident resolution.
3. Threat Intelligence & Analysis
- Research emerging threats, vulnerabilities, and attack patterns.
- Maintain awareness of latest cyber threat trends, TTPs, and threat actors.
- Use threat intelligence platforms to enrich alerts and support investigations.
4. Vulnerability Management
- Assist with scanning, assessment, and reporting of vulnerabilities.
- Analyse vulnerability data and coordinate remediation with relevant teams.
- Validate patching and mitigation efforts as per security guidelines.
5. Security Tool Management
- Support configuration and tuning of SIEM, EDR, IDS/IPS, and SOAR platforms.
- Improve detection rules, dashboards, and automation playbooks.
- Identify false positives and optimize alerting mechanisms.
6. Compliance & Reporting
- Prepare daily, weekly, and monthly SOC reports.
- Ensure incident documentation complies with ISO 27001, NIST, or company standards.
- Support internal and external audits related to cybersecurity operations.
Required Skills & Qualifications
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
- 2–5 years of experience as SOC Analyst, Cybersecurity Analyst, or similar role.
- Proficiency with SIEM tools (Splunk, Sentinel, QRadar, LogRhythm, etc.).
- Hands-on experience with EDR solutions (CrowdStrike, Carbon Black, SentinelOne, etc.).
- Understanding of MITRE ATT&CK framework.
- Strong knowledge of: Network protocols and logs, Malware behavior, Security incident lifecycle & Cloud security.
- Familiarity with SOAR platforms and automation playbooks.
- Excellent analytical, problem-solving, and communication skills.
Key Skills
Ranked by relevanceReady to apply?
Join iConsultera and take your career to the next level!
Application takes less than 5 minutes

