iConsultera
SOC Analyst
iConsulteraUnited Kingdom6 days ago
Full-timeRemote FriendlyOther

Position Overview

  • We are seeking a highly skilled and detail-oriented Security Operations Center (SOC) Analyst to join our remote team in the UK.
  • The SOC Analyst will be responsible for monitoring, detecting, investigating, and responding to security incidents across the organization.
  • The ideal candidate will have strong analytical skills, deep knowledge of cybersecurity tools, and hands-on experience in threat detection and incident response.


Key Responsibilities

1. Security Monitoring & Detection

  • Monitor security alerts, logs, and events via SIEM tools (e.g., Splunk, QRadar, Sentinel, Elastic).
  • Analyze network traffic, endpoint events, and cloud security logs to identify suspicious activity.
  • Correlate alerts from multiple security tools to detect potential threats.

2. Incident Response

  • Triage, analyze, and escalate security incidents based on severity and impact.
  • Perform initial investigation and provide containment recommendations.
  • Document incident timelines, findings, and recommended remediation actions.
  • Collaborate with IT, DevOps, and Security teams to ensure swift incident resolution.

3. Threat Intelligence & Analysis

  • Research emerging threats, vulnerabilities, and attack patterns.
  • Maintain awareness of latest cyber threat trends, TTPs, and threat actors.
  • Use threat intelligence platforms to enrich alerts and support investigations.

4. Vulnerability Management

  • Assist with scanning, assessment, and reporting of vulnerabilities.
  • Analyse vulnerability data and coordinate remediation with relevant teams.
  • Validate patching and mitigation efforts as per security guidelines.

5. Security Tool Management

  • Support configuration and tuning of SIEM, EDR, IDS/IPS, and SOAR platforms.
  • Improve detection rules, dashboards, and automation playbooks.
  • Identify false positives and optimize alerting mechanisms.

6. Compliance & Reporting

  • Prepare daily, weekly, and monthly SOC reports.
  • Ensure incident documentation complies with ISO 27001, NIST, or company standards.
  • Support internal and external audits related to cybersecurity operations.


Required Skills & Qualifications

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
  • 2–5 years of experience as SOC Analyst, Cybersecurity Analyst, or similar role.
  • Proficiency with SIEM tools (Splunk, Sentinel, QRadar, LogRhythm, etc.).
  • Hands-on experience with EDR solutions (CrowdStrike, Carbon Black, SentinelOne, etc.).
  • Understanding of MITRE ATT&CK framework.
  • Strong knowledge of: Network protocols and logs, Malware behavior, Security incident lifecycle & Cloud security.
  • Familiarity with SOAR platforms and automation playbooks.
  • Excellent analytical, problem-solving, and communication skills.

Key Skills

Ranked by relevance