Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Senior SOC Analyst - DV Cleared
Location: Stoke-on-Trent (on-site)
Salary: From £52,000 + shift allowance
Clearance: DV clearance required (UK Sole Nationals only due to the nature of the work)
We are looking for a skilled and proactive Tier 2 (Senior) SOC Analyst to take a leading role within a 24x7 Security Operations Centre. This position is ideal for experienced security analysts as well as Service Leavers or Veterans with strong backgrounds in cyber, intelligence, communications, CIS or operational security environments.
About the Role:
You will lead medium to high-severity investigations, support incident containment and remediation, and act as the escalation point for Tier 1 analysts. You’ll play a key part in threat hunting, detection engineering, improving SIEM capability and strengthening the organisation’s overall security posture.
This is a hands-on, high-impact role where your expertise genuinely makes a difference.
What You Will Be Doing:
• Leading triage, investigation and classification of security events
• Owning complex incident response, containment and root cause analysis
• Providing technical escalation support to junior analysts
• Conducting threat intelligence analysis and sharing insights
• Enhancing SIEM rules and detection logic
• Supporting onboarding of new data sources and improving correlations
• Leading post-incident reviews and reporting
• Engaging in vulnerability lifecycle management and remediation guidance
• Contributing to continuous improvement, automation and MITRE ATT&CK maturity
What We Are Looking For:
• 1–5 years’ SOC or operational cyber experience
• Strong hands-on experience with SIEM tools (LogRhythm, Elastic, Sentinel etc.)
• Ability to manage incidents end-to-end with confidence
• Solid understanding of networking, firewalls, IDS/IPS and endpoint security
• Strong analytical skills and clear written/ verbal communication
• Interest or experience in scripting and automation
• Certifications such as Security+, CEH, CISSP, CCSP, BTL1/2 are desirable but not essential
Why This Is an Excellent Fit for Service Leavers
This role aligns perfectly with military experience across:
• Defensive cyber
• Communications / CIS
• Intelligence analysis
• Security operations
• Technical leadership
• Incident response environments
Your ability to stay calm under pressure, assess complex information quickly and lead others effectively makes you a natural fit for a Tier 2 SOC environment.
You will have the opportunity to mentor junior analysts, shape detection and response capability, influence security strategy and operate within a structured, operationally mature team that values and respects the experience Service Leavers bring.
Key Skills
Ranked by relevanceReady to apply?
Join NexGen Associates and take your career to the next level!
Application takes less than 5 minutes

