At a Glance
- Tasks: Monitor security alerts and conduct threat analysis in a hands-on role.
- Company: Join TECHTRACE PARTNERS, a leader in cyber defence protecting national infrastructure.
- Benefits: Enjoy a shift-based schedule, relocation support, and opportunities for career growth.
- Why this job: Make a real impact in a secure SOC environment with a collaborative team.
- Qualifications: Experience in SOC roles, strong skills in Microsoft Sentinel and Splunk required.
- Other info: British citizenship and SC clearance eligibility are essential; relocation options available.
The predicted salary is between 36000 - 60000 £ per year.
Step into a mission-critical cyber defence environment where every alert, action, and analysis helps protect critical national infrastructure. We are looking for experienced SOC Analysts to support one of the UK’s most secure & diverse SOC environments. This is a real hands-on role—not just clicking dashboards. You’ll be working with Microsoft Sentinel, Splunk, and a range of security tools to identify and respond to advanced threats in a highly trusted, maturing SOC environment.
What You’ll Be Doing:
- Monitoring and triaging security alerts across host and network infrastructure
- Conducting threat analysis using SIEM tools, log data, and threat intel feeds
- Supporting incident response from escalation through containment and recovery
- Improving detection rules and playbooks with a threat-informed approach
- Contributing to a collaborative, experienced team where your input drives maturity
What You’ll Need:
- Multiple years in a SOC or cyber defence role – ideally in a high-threat, enterprise or defence setting
- Strong experience with Microsoft Sentinel and Splunk
- Comfortable with MITRE ATT&CK, threat modelling, and security event triage
- Confident in networking fundamentals (TCP/IP, VPNs, proxies, DNS) and security tooling
- British Citizenship is essential (must meet criteria for secure site access)
- Eligible for SC / DV clearance
Based elsewhere in the UK? No problem. We are open to cleared candidates looking to relocate to join a purpose-driven team in a secure location. Relocation support can be discussed post-screening.
Why This Team?
- Be part of a team that’s building real capability, not just chasing SLA metrics
- Operate in a tool-rich, well-funded SOC that values your voice
- Work on high-value systems and incidents that genuinely matter
- Shift-based schedule designed for work-life rhythm
- Long-term programme stability with scope for clearance upgrades and career growth
Apply now for a confidential conversation.
SOC Analyst (L2) employer: TECHTRACE PARTNERS
Contact Detail:
TECHTRACE PARTNERS Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst (L2)
✨Tip Number 1
Make sure to familiarise yourself with Microsoft Sentinel and Splunk, as these are key tools you'll be using in the role. Consider setting up a home lab or using online resources to practice your skills and demonstrate your hands-on experience.
✨Tip Number 2
Brush up on your knowledge of the MITRE ATT&CK framework and threat modelling techniques. Being able to discuss specific examples of how you've applied these concepts in previous roles will show your depth of understanding during conversations with the hiring team.
✨Tip Number 3
Network with current SOC professionals or join relevant online communities. Engaging with others in the field can provide insights into the latest trends and challenges, which you can bring up in discussions to showcase your passion and commitment to the role.
✨Tip Number 4
Prepare for potential scenario-based questions during interviews. Think about past incidents you've handled, how you triaged alerts, and the steps you took for incident response. This will help you articulate your experience effectively and demonstrate your problem-solving skills.
We think you need these skills to ace SOC Analyst (L2)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in SOC or cyber defence roles. Emphasise your familiarity with Microsoft Sentinel, Splunk, and any other security tools mentioned in the job description.
Craft a Strong Cover Letter: Write a cover letter that showcases your passion for cyber security and your understanding of the role. Mention specific experiences where you successfully monitored and triaged security alerts or conducted threat analysis.
Highlight Relevant Skills: In your application, clearly outline your knowledge of networking fundamentals and your comfort with MITRE ATT&CK. This will demonstrate your technical proficiency and suitability for the role.
Showcase Your Teamwork: Since the role involves contributing to a collaborative team, include examples of how you've worked effectively within a team in previous positions. Highlight any contributions that drove maturity in your past roles.
How to prepare for a job interview at TECHTRACE PARTNERS
✨Showcase Your Technical Skills
Be prepared to discuss your experience with Microsoft Sentinel and Splunk in detail. Highlight specific instances where you've used these tools to identify and respond to threats, as this will demonstrate your hands-on expertise.
✨Understand the MITRE ATT&CK Framework
Familiarise yourself with the MITRE ATT&CK framework and be ready to discuss how you have applied it in previous roles. This knowledge is crucial for a SOC Analyst, as it shows your ability to think critically about threat modelling and incident response.
✨Demonstrate Team Collaboration
Since the role involves contributing to a collaborative team, prepare examples of how you've worked effectively with others in high-pressure situations. Emphasising your teamwork skills can set you apart from other candidates.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving abilities in real-time situations. Practice articulating your thought process when triaging security alerts or responding to incidents, as this will showcase your analytical skills.