Security Operations Center Analyst
Security Operations Center Analyst

Security Operations Center Analyst

Manchester Full-Time 33600 - 65800 £ / year (est.) Home office (partial)
Go Premium
N

At a Glance

  • Tasks: As a SOC Analyst, you'll identify and respond to security incidents using advanced technologies.
  • Company: Join an innovative company in Manchester focused on revolutionising security operations.
  • Benefits: Enjoy a competitive salary, shift allowances, and opportunities for hybrid work from February.
  • Why this job: Be part of a dynamic team where you can innovate and grow your skills in cybersecurity.
  • Qualifications: 3+ years in Security Operations with incident management experience; SC clearance eligibility required.
  • Other info: Work on-site 3 days a week with a flexible shift pattern; perfect for tech enthusiasts!

The predicted salary is between 33600 - 65800 £ per year.

This range is provided by Ntrinsic Consulting. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.

Base pay range

Director – Ntrinsic Consulting UK / Cpl Talent Solutions GmbH – Technology

SOC Analyst

SOC Analyst is sought by our client in Manchester who are a highly innovative company in their field. Consequentially they require an accomplished, well-practised SOC Analyst to impact their mission to innovate security response to deliver a best in class Security Operations Centre.

As SOC Analyst you will identify incidents using multiple SIEM technologies and subsequent analysis and investigation to determine their severity and the response required. The SOC Analyst will act as incident responder for potential incidents identified, ensure that incidents are documented in accordance with the relevant policies and procedures and required escalations/notifications take place. Be prepared to provide technical expertise during security incidents, establishing the extent of an attack, and advising on how best to contain the incident along with advice on systems hardening and mitigation measures to prevent a re-occurrence.

The SOC Analyst will collaborate with other teams and departments to implement necessary changes to counter an attack and contain malicious activity. The SOC Analyst will maintain a keen understanding of evolving threats and vulnerabilities to ensure the security of the network. Assist in updating Protective Monitoring/SOC documentation, processes and procedures and ensure currency. Additionally you will generate reports for IT administrators, business managers, and security leaders. These reports serve as an input to evaluate the efficacy of the security controls as well as gather forensic data and physical equipment. The SOC Analyst will perform SIEM use case tuning and support the development of new detection content including but not limited to indicator/signature matching, user behaviour and machine learning analytics.

Within this SOC Analyst opportunity there is tremendous scope to innovate resources within a highly accomplished team. If you seek autonomy and desire to challenge your expertise within an inventive, fast-moving SOC Team; with growth for further learning, personal growth; then please consider the skillset requirements below.

** Candidates must be eligible to acquire SC (Security Check level) clearance and be happy to work on-site 3 days a week at offices in Manchester across a shift pattern 4 days on 4 days off 7 AM–7 PM / 7 PM–7 AM. Onsite is only Days – weekend and nights from Feb will be hybrid that they\’re trialling this from February.

  • At least 3 years experience within a Security Operations role previously with at least plus security incident management experience.
  • Ability to work under pressure and gather information for the purpose of supporting decision making.
  • Able to evidence collaborative working with teams and stakeholders to share information and coordinate responses.
  • Previous experience within a Security role, ideally within incident response or detection.
  • In-depth understanding of the cyber threat landscape and advanced adversary tactics, being able to relate them back to MITRE Att&ck Framework.
  • Understanding of low-level concepts including operating systems and networking.
  • Knowledge of cloud environments and SaaS applications such as AWS, Azure, Office 365, & Defender.
  • Must have the ability to gain and hold HMG Security Clearance at “Security Check” (SC) level.

Contract: Permanent.

Salary: up to £47,000 base salary + shift allowance and discretionary bonus.

Location: Manchester

Interview times: ASAP

To find out more about this SOC Analyst permanent opportunity, please apply via the link.

Seniority level

  • Mid-Senior level

Employment type

  • Full-time

Job function

  • Analyst and Information Technology
  • Industries: IT Services and IT Consulting and Information Services

#J-18808-Ljbffr

N

Contact Detail:

Ntrinsic Consulting Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Security Operations Center Analyst

Tip Number 1

Familiarise yourself with the MITRE ATT&CK Framework, as it's crucial for understanding advanced adversary tactics. Being able to discuss specific techniques and how they relate to your previous experiences will impress interviewers.

Tip Number 2

Showcase your experience with SIEM technologies during discussions. Be prepared to share examples of incidents you've managed, including your approach to analysis and response, as this demonstrates your hands-on expertise.

Tip Number 3

Highlight your collaborative skills by discussing past projects where you worked with cross-functional teams. This is essential for a SOC Analyst role, as you'll need to coordinate responses and share information effectively.

Tip Number 4

Stay updated on the latest cyber threats and vulnerabilities. Being knowledgeable about current trends will not only help you in interviews but also show your commitment to continuous learning in the field of cybersecurity.

We think you need these skills to ace Security Operations Center Analyst

Incident Response
Security Information and Event Management (SIEM)
Threat Analysis
Cybersecurity Knowledge
MITRE ATT&CK Framework
Operating Systems Understanding
Networking Concepts
Cloud Security (AWS, Azure, Office 365)
Technical Documentation
Collaboration Skills
Problem-Solving Skills
Attention to Detail
Ability to Work Under Pressure
Forensic Data Analysis
Communication Skills

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in Security Operations, particularly focusing on incident management and collaboration with teams. Use specific examples that demonstrate your skills in identifying incidents and responding effectively.

Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cybersecurity and your understanding of the cyber threat landscape. Mention your familiarity with SIEM technologies and how your previous experiences align with the responsibilities of a SOC Analyst.

Highlight Relevant Skills: In your application, emphasise your knowledge of cloud environments, operating systems, and networking concepts. Make sure to mention any experience you have with the MITRE ATT&CK Framework and your ability to work under pressure.

Proofread Your Application: Before submitting, carefully proofread your CV and cover letter for any spelling or grammatical errors. A polished application reflects your attention to detail, which is crucial in a security role.

How to prepare for a job interview at Ntrinsic Consulting

Understand the Cyber Threat Landscape

Make sure you have a solid grasp of the current cyber threat landscape and advanced adversary tactics. Familiarise yourself with the MITRE ATT&CK Framework, as this will likely come up during your interview.

Showcase Your Incident Management Experience

Be prepared to discuss your previous experience in security incident management. Highlight specific incidents you've handled, your role in those situations, and the outcomes of your actions.

Demonstrate Collaborative Skills

Since collaboration is key in a SOC environment, be ready to provide examples of how you've worked with other teams or stakeholders. Discuss how you shared information and coordinated responses to incidents.

Familiarise Yourself with SIEM Technologies

As a SOC Analyst, you'll be using multiple SIEM technologies. Brush up on your knowledge of these tools and be ready to discuss any relevant experience you have with them, including use case tuning and detection content development.

Security Operations Center Analyst
Ntrinsic Consulting
Location: Manchester
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

N
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>