Title: Security Operations Centre (SOC) Analyst
Salary: £55,000 DOE
UK – Remote | 24/7 Shift Pattern | SC Eligibility Required
A growing UK cyber security services provider is expanding its 24/7 Security Operations Centre and is looking for a SOC Analyst to join a modern, technically driven team.
This role is well suited to someone early in their SOC career, or an infrastructure / networking professional looking to transition into hands-on cyber security operations. You’ll gain real investigation experience across multiple customer environments, working with modern SIEM, EDR, and XDR platforms while being supported by senior analysts and structured training.
The Role
As part of a 24/7 SOC, you’ll be responsible for monitoring, investigating, and escalating security events across a range of customer environments. You’ll work alongside experienced analysts who will support your development, expose you to real-world incidents, and help you build strong foundations in detection and investigation.
This is not a “ticket-only” role — you’ll be encouraged to understand attacker behaviour, contribute to SOC improvements, and grow technically over time.
Key Responsibilities
- Monitor and triage alerts across SIEM, EDR/XDR, email and web security platforms
- Investigate suspicious activity and determine appropriate escalation paths
- Follow SOC runbooks and investigation workflows
- Build clear timelines and maintain accurate investigation notes
- Escalate complex cases with full technical context
- Participate in threat hunting activities and detection improvements
- Contribute to continuous improvement of dashboards, use cases and runbooks
- Provide clear written updates for internal teams and customers
- Take part in structured shift handovers to ensure continuity
Experience & Skills
Essential:
- 1+ year experience in a SOC environment or
- 3+ years in infrastructure or networking roles with security exposure
- Experience investigating security alerts and incidents
- Understanding of attacker behaviour, phishing, malware execution chains, and IOCs
- Familiarity with at least one SIEM, EDR or XDR platform
- Working knowledge of Windows, macOS and Linux
- Understanding of core networking concepts (DNS, HTTP, SMB, LDAP)
- Experience using ticketing systems (e.g. ServiceNow, Jira or similar)
- Awareness of MITRE ATT&CK
Desirable:
- Experience with modern SIEM or XDR platforms
- Exposure to query languages (e.g. KQL, XQL, CQL or similar)
- Awareness of threat intelligence concepts
- Interest in scripting or automation
Location & Working Pattern
- Location: Home-based (UK) with occasional office visits
- Shift pattern: 12-hour shifts (2 days, 2 nights, 4 off)
- Clearance: Eligibility for SC clearance required (UK residency for the past 5 years). DV eligibility is advantageous
Why Apply?
- Work in a modern SOC using up-to-date security tooling
- Strong focus on training, development and career progression
- Clear pathways into senior SOC roles, detection engineering, threat intelligence, or incident response
- Supportive, collaborative culture with technically minded leadership
- Competitive salary and comprehensive benefits package
Key Skills
Ranked by relevance
Related Jobs
3 roles aligned with this opportunity
Business Analyst
2026-04-11
💻 C#.NET Core Backend Engineer | 💳 Greenfield Payments Platform | £130,000 + Bonus + Benefits | Hybrid (London)
2026-04-10
Golang Engineer
2026-04-11
- Posted
- Jan 05, 2026
- Type
- Full-time
- Level
- Mid-Senior
- Location
- United Kingdom
- Company
- InfoSec People Ltd
Industries
Categories
Related Jobs
3 roles aligned with this opportunity
Business Analyst
2026-04-11
💻 C#.NET Core Backend Engineer | 💳 Greenfield Payments Platform | £130,000 + Bonus + Benefits | Hybrid (London)
2026-04-10
Golang Engineer
2026-04-11