At a Glance
- Tasks: Monitor and investigate sophisticated threats using Microsoft Security tools.
- Company: Rapidly scaling Cyber Security Consultancy with a focus on technical growth.
- Benefits: Competitive salary, hybrid work model, and clear career progression.
- Other info: Mentorship from senior experts and opportunities for professional development.
- Why this job: Join an elite team and gain hands-on experience in modern security operations.
- Qualifications: 1-2 years in SOC or security monitoring, familiarity with Microsoft security tools.
The predicted salary is between 40000 - 50000 £ per year.
Location: Hybrid – Oxfordshire (2 days onsite)
Salary: £40,000 – £50,000 + Benefits
The Opportunity
Are you a SOC Analyst with 1–2 years of experience who feels like you’ve hit a ceiling? A rapidly scaling Cyber Security Consultancy is looking for a technically curious Analyst to join their elite Security Operations capability. This isn’t a "ticket farm" role; it’s an opportunity to move beyond basic monitoring and gain deep, hands-on exposure to modern Microsoft Security Tooling within complex client environments.
The Role
- Detection & Analysis: Monitor and investigate sophisticated threats within a Microsoft Sentinel SIEM environment.
- Proactive Triage: Go beyond the alert—analyze logs, identify patterns, and determine the "root cause" of security incidents.
- Continuous Improvement: Assist in tuning detection rules and reducing "noise" to ensure the SOC is always one step ahead.
- Incident Response: Support the end-to-end investigation and reporting of live security breaches.
Technical Profile
What you need:
- SOC Foundation: 1–2 years of experience in a SOC or security monitoring role.
- SIEM Exposure: Experience navigating SIEM platforms (if you’ve used Microsoft Sentinel, that’s a major win).
- Threat Knowledge: A solid grasp of common attacker techniques (MITRE ATT&CK framework knowledge is highly regarded).
- Microsoft Ecosystem: Familiarity with Microsoft Defender for Endpoint/Identity or Azure security tools.
- The "Investigator" Mindset: A natural curiosity to dig into logs until you find the answer.
The "Value Add" (Nice to Have):
- KQL Skills: Experience writing Kusto Query Language for data hunting.
- Certifications: SC-200 (Cyber Security Operations Analyst), SC-900, or AZ-500.
- Consultancy Spirit: Comfortable communicating findings to external stakeholders.
Why Join?
- Technical Progression: Clear path toward Senior Analyst, Threat Hunter, or Incident Responder.
- Modern Stack: Work exclusively with cutting-edge Microsoft security tech.
- Hybrid Balance: 2 days onsite in Oxfordshire allows for team collaboration and mentoring, with the rest of the week remote.
Ready to level up? If you are looking for a role where you’ll be mentored by senior experts and given the tools to become a specialist, we want to hear from you. Apply directly for a confidential discussion.
SOC Analyst - Microsoft Security Stack in Oxford employer: Adeptis Group
Contact Detail:
Adeptis Group Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst - Microsoft Security Stack in Oxford
✨Tip Number 1
Network like a pro! Reach out to your connections in the cyber security field, especially those who work with Microsoft Security tools. A friendly chat can lead to insider info about job openings or even a referral.
✨Tip Number 2
Show off your skills! If you’ve got experience with Microsoft Sentinel or KQL, make sure to highlight that in conversations. Share examples of how you've tackled security incidents or improved detection rules—this will set you apart!
✨Tip Number 3
Prepare for interviews by brushing up on the MITRE ATT&CK framework and common attacker techniques. Being able to discuss these topics confidently will show you're not just a candidate, but a passionate SOC Analyst ready to dive deep.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, we love hearing from candidates who are eager to join our team and grow their careers in cyber security.
We think you need these skills to ace SOC Analyst - Microsoft Security Stack in Oxford
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the SOC Analyst role. Highlight your experience with Microsoft Security tools and any relevant projects you've worked on. We want to see how you fit into our team!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your curiosity drives you to dig deeper into incidents. Let us know what excites you about working with Microsoft Sentinel and our consultancy.
Show Off Your Technical Skills: Don’t hold back on showcasing your technical prowess! If you’ve got experience with KQL or any Microsoft security tools, make sure to mention it. We love seeing candidates who are eager to learn and grow in their technical abilities.
Apply Through Our Website: We encourage you to apply directly through our website for a smoother application process. It helps us keep track of your application and ensures you don’t miss out on any updates. Plus, we can’t wait to hear from you!
How to prepare for a job interview at Adeptis Group
✨Know Your Microsoft Security Stack
Make sure you brush up on your knowledge of Microsoft Sentinel and other Microsoft security tools. Be ready to discuss how you've used these tools in your previous roles, as well as any specific incidents where you had to analyse logs or respond to threats.
✨Understand the MITRE ATT&CK Framework
Familiarise yourself with common attacker techniques outlined in the MITRE ATT&CK framework. This will not only show your understanding of threat landscapes but also demonstrate your proactive approach to security analysis during the interview.
✨Show Off Your Investigative Skills
Prepare to share examples of how you've approached investigations in the past. Highlight your 'investigator' mindset by discussing specific cases where you identified root causes of incidents or improved detection rules to reduce noise in alerts.
✨Communicate Clearly and Confidently
Since this role involves communicating findings to external stakeholders, practice articulating your thoughts clearly. Use simple language to explain complex concepts, and be prepared to answer questions about your findings and recommendations.