At a Glance
- Tasks: Lead investigations into security incidents and enhance monitoring capabilities.
- Company: Dynamic tech company focused on cybersecurity in Glasgow.
- Benefits: Competitive salary, hybrid working, and opportunities for professional growth.
- Other info: Exciting role with 24/7 operations and excellent career advancement.
- Why this job: Join a passionate team and make a real impact in cyber defence.
- Qualifications: 3+ years in cybersecurity with strong SIEM tool experience.
The predicted salary is between 42000 - 60000 £ per year.
Job Description
Hybrid WORKING
Location: Glasgow, Scotland – United Kingdom Type: Permanent
Senior SOC Analyst
Location: Glasgow (hybrid)
Salary: Up to £57,000 + package
NOTE: Candidates for this role must be eligible for UK Security Clearance (SC).
We are seeking a Senior SOC Analyst to join a growing Security Operations Centre team. This is a hybrid role based in Glasgow, offering the opportunity to take a leading role in incident response and advanced security monitoring within a dynamic environment.
As a Senior SOC Analyst, you will take ownership of escalated incidents from L1 and L2 analysts, leading investigations, performing root cause analysis, and guiding appropriate remediation actions. You will play a key role in developing SOC use cases, enhancing monitoring capabilities, and ensuring incident response follows best practice standards.
This role combines technical depth, client interaction, and leadership, requiring someone who thrives in a fast-moving environment and is comfortable working with both technical and non-technical stakeholders.
Key Responsibilities
- Lead investigations into escalated security incidents, including detailed analysis and root cause identification.
- Monitor and optimise SIEM tools (Splunk, QRadar, or similar), ensuring accurate detection and effective alerting.
- Perform malware analysis, reverse engineering, and develop detection signatures.
- Provide incident response leadership, from containment and eradication to recovery.
- Collaborate with cross-functional teams and external parties (forensics, law enforcement, clients).
- Stay current on threat intelligence and integrate insights into monitoring processes.
- Contribute to the creation and refinement of runbooks, playbooks, and incident response documentation.
- Support pre-sales activities, solution scoping, and client demonstrations when required.
What We're Looking For
- 3+ years' experience in cybersecurity, preferably in a SOC or NOC environment.
- Strong hands-on experience with SIEM tools, specifically QRadar
- Solid understanding of incident response methodologies and DFIR principles.
- Knowledge of network traffic analysis, vulnerability management, penetration testing, and malware reverse engineering.
- Familiarity with ITIL processes (Incident, Problem, Change).
- Strong written and verbal communication, with the ability to produce clear technical documentation and reports.
- Relevant certifications (e.g., CISSP, GIAC, SC-200) are highly desirable.
- Cloud security experience (AWS and/or Azure) preferred.
- Willingness to participate in 24/7 operations or on-call rotations.
If you're passionate about protecting organisations and leading from the front in cyber defence, we'd love to hear from you.
SOC Analyst employer: Anson McCade
Contact Detail:
Anson McCade Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst
✨Tip Number 1
Network like a pro! Attend cybersecurity meetups, webinars, or local events in Glasgow. Connecting with industry folks can open doors and give you insider info on job openings.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your incident response projects or any malware analysis you've done. This will help you stand out when chatting with potential employers.
✨Tip Number 3
Practice makes perfect! Prepare for interviews by simulating incident response scenarios. This will not only boost your confidence but also demonstrate your hands-on experience to interviewers.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for passionate SOC Analysts. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace SOC Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with SIEM tools like QRadar and any relevant certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cybersecurity and explain why you're the perfect fit for our team. Don't forget to mention your experience in incident response and working with cross-functional teams.
Showcase Your Technical Skills: In your application, be sure to showcase your technical skills, especially in malware analysis and network traffic analysis. We love seeing candidates who can demonstrate their hands-on experience and problem-solving abilities.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and we’ll be able to review your application quickly. We can't wait to hear from you!
How to prepare for a job interview at Anson McCade
✨Know Your Tools Inside Out
Make sure you’re well-versed in the SIEM tools mentioned in the job description, especially QRadar. Brush up on how to monitor and optimise these tools, as you might be asked to demonstrate your knowledge during the interview.
✨Showcase Your Incident Response Skills
Prepare to discuss specific incidents you've handled in the past. Be ready to explain your approach to root cause analysis and remediation actions. This will show that you can lead investigations effectively.
✨Stay Current with Threat Intelligence
Familiarise yourself with the latest trends in cybersecurity threats. Being able to discuss recent incidents or emerging threats will demonstrate your commitment to staying informed and proactive in your role.
✨Communicate Clearly and Confidently
Since this role involves interaction with both technical and non-technical stakeholders, practice explaining complex concepts in simple terms. Clear communication is key, so consider preparing a few examples of how you've done this in previous roles.