At a Glance
- Tasks: Lead investigations into security incidents and mentor junior analysts in a dynamic SOC environment.
- Company: Join a cutting-edge tech firm focused on high-density compute environments.
- Benefits: Competitive salary, shift allowance, and opportunities for professional growth.
- Other info: Hybrid work model with 24/7 shift-based operations.
- Why this job: Make a real impact in cybersecurity while working with advanced technologies.
- Qualifications: 3+ years in SOC or Incident Response with strong analytical skills.
The predicted salary is between 65000 - 65000 £ per year.
Location: London (hybrid, shift work: incl. days & nights)
Salary: up to £65,000 (depending on experience) + 25% Shift Allowance
NOTE: Due to the nature of the work, you must be eligible for UK DV Security Clearance.
We’re building a high-performing Security Operations capability to support cutting-edge, high-density compute environments. This is a pivotal opportunity for an experienced Lead SOC Analyst to step into a technically demanding, high-impact role within a 24/7 operation.
As a Lead SOC Analyst (L3), you’ll act as the escalation point for complex and high-severity incidents, driving investigations from detection through to resolution.
Key responsibilities include:
- Leading investigations into advanced security incidents, identifying attack vectors, scope, and business impact
- Correlating data across multiple sources (SIEM, EDR, network, cloud) to build a complete incident narrative
- Executing and coordinating containment, eradication, and recovery actions
- Producing detailed incident reports and root cause analyses
- Tuning detection rules and improving alert fidelity alongside engineering teams
- Mentoring and guiding L1/L2 analysts within the SOC
- Contributing to continuous improvement of playbooks, tooling, and detection coverage
- Participating in SOC simulations and incident response exercises
- Operating as part of a 24/7 shift-based SOC team
What We’re Looking For:
- 3+ years’ experience in a SOC, Incident Response, or Threat Analysis role
- Strong hands-on expertise with SIEM and EDR platforms
- Deep understanding of attacker tactics, techniques, and procedures (TTPs)
- Proven experience handling high-severity incidents end-to-end
- Solid knowledge of malware behaviour and forensic investigation techniques
- Strong analytical mindset with the ability to think critically under pressure
Preferred certifications:
- GCIA, GCIH, CompTIA CySA+
- Microsoft SC-200
- Splunk Power User (or equivalent)
If you’re a technically sharp, incident-driven SOC leader, apply today.
Security Operations Center Analyst in Manchester employer: Anson McCade
Contact Detail:
Anson McCade Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Center Analyst in Manchester
✨Tip Number 1
Network like a pro! Reach out to your connections in the cybersecurity field, especially those who work in SOCs. A friendly chat can lead to insider info about job openings or even referrals that could give you an edge.
✨Tip Number 2
Show off your skills! Prepare a portfolio or case studies of past incidents you've handled. This will not only demonstrate your expertise but also give you great talking points during interviews.
✨Tip Number 3
Practice makes perfect! Get involved in mock interviews or role-playing scenarios with friends or mentors. This will help you articulate your experience and thought process when tackling complex security incidents.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for talented individuals like you. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace Security Operations Center Analyst in Manchester
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Lead SOC Analyst role. Highlight your experience with SIEM and EDR platforms, and don’t forget to mention any relevant certifications. We want to see how your skills match what we’re looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re the perfect fit for our team. Share specific examples of how you've handled high-severity incidents and your approach to mentoring others in the SOC.
Showcase Your Analytical Skills: In your application, demonstrate your analytical mindset. Talk about how you’ve tackled complex security incidents and the methods you used to identify attack vectors. We love seeing critical thinking in action!
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. We can’t wait to see what you bring to the table!
How to prepare for a job interview at Anson McCade
✨Know Your Stuff
Make sure you brush up on your knowledge of SIEM and EDR platforms. Be ready to discuss specific incidents you've handled, especially high-severity ones. This is your chance to showcase your expertise in dealing with complex security incidents.
✨Understand the Role
Familiarise yourself with the responsibilities of a Lead SOC Analyst. Be prepared to talk about how you would lead investigations, mentor junior analysts, and contribute to improving detection rules. Showing that you understand the role will set you apart.
✨Showcase Your Analytical Skills
During the interview, highlight your analytical mindset. Share examples of how you've correlated data from multiple sources to build incident narratives. This will demonstrate your ability to think critically under pressure, which is crucial for this role.
✨Prepare for Scenario Questions
Expect scenario-based questions where you'll need to outline your approach to handling incidents. Practice articulating your thought process for containment, eradication, and recovery actions. This will help you convey your strategic thinking and problem-solving skills effectively.