Incident Response Analyst (SOC) in London
Incident Response Analyst (SOC)

Incident Response Analyst (SOC) in London

London Full-Time 36000 - 60000 £ / year (est.) No home office possible
Go Premium
B

At a Glance

  • Tasks: Respond to cybersecurity incidents and perform log analysis using advanced tools.
  • Company: Global investment bank with a strong focus on cyber security.
  • Benefits: Competitive pay, potential for permanent role, and professional growth opportunities.
  • Why this job: Join a dynamic team and protect critical assets in the financial sector.
  • Qualifications: Experience in incident response and knowledge of SIEM tools required.
  • Other info: Exciting opportunity to work in a fast-paced environment with career advancement.

The predicted salary is between 36000 - 60000 £ per year.

Bonhill Partners are excited to represent our global investment bank as they look to expand their cyber security teams as part of a globalisation initiative.

Project snapshot:

  • Experience responding to cybersecurity incidents (triage, containment, eradication, recovery)
  • Knowledge of SIEM tools (e.g., Splunk, Sentinel, QRadar, ArcSight)
  • Ability to perform log analysis across network, host, application, and cloud sources
  • Understanding of malware behaviour, attack vectors, and common threat actor techniques
  • Familiarity with MITRE ATT&CK, incident handling frameworks (NIST, SANS)
  • Experience with alert investigation, root-cause analysis, and writing clear incident reports
  • Ability to use EDR tools (CrowdStrike, Carbon Black, SentinelOne etc.)
  • Knowledge of network security fundamentals (TCP/IP, DNS, HTTP, firewalls, proxies)
  • Ability to analyse Windows / Linux host artifacts

Incident Response Analyst (SOC) in London employer: Bonhill Partners

At Bonhill Partners, we pride ourselves on being an exceptional employer, offering our Incident Response Analysts a dynamic work environment in the heart of London. Our commitment to employee growth is evident through comprehensive training programmes and opportunities for career advancement within our global investment bank. With a strong focus on collaboration and innovation, we foster a culture that values diversity and encourages our team members to thrive in their roles while contributing to cutting-edge cybersecurity initiatives.
B

Contact Detail:

Bonhill Partners Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Incident Response Analyst (SOC) in London

✨Tip Number 1

Network, network, network! Get out there and connect with professionals in the cybersecurity field. Attend meetups, webinars, or even local events. You never know who might have a lead on that perfect Incident Response Analyst role!

✨Tip Number 2

Show off your skills! Create a portfolio or a personal blog where you can share your insights on incident response, malware behaviour, or even your experiences with SIEM tools. This not only showcases your expertise but also makes you memorable to potential employers.

✨Tip Number 3

Don’t just apply blindly! Tailor your approach for each job. Research the company’s recent incidents or security initiatives and mention them in your conversations. This shows you’re genuinely interested and have done your homework.

✨Tip Number 4

Finally, don’t forget to check out our website for openings! We’ve got some fantastic opportunities that could be your next big break. Plus, applying through us means you’ll get insider tips and support throughout the process!

We think you need these skills to ace Incident Response Analyst (SOC) in London

Incident Response
Cybersecurity Incident Triage
Containment and Eradication
Recovery from Cyber Incidents
SIEM Tools (e.g., Splunk, Sentinel, QRadar, ArcSight)
Log Analysis
Malware Behaviour Understanding
Attack Vectors Knowledge
Threat Actor Techniques Familiarity
MITRE ATT&CK Framework
Incident Handling Frameworks (NIST, SANS)
Alert Investigation
Root-Cause Analysis
Incident Reporting
EDR Tools (e.g., CrowdStrike, Carbon Black, SentinelOne)
Network Security Fundamentals (TCP/IP, DNS, HTTP, firewalls, proxies)
Windows and Linux Host Artifacts Analysis

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your experience with incident response and cybersecurity tools. We want to see how your skills match the job description, so don’t be shy about showcasing your knowledge of SIEM tools and EDR solutions!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cybersecurity and how your background makes you a perfect fit for the Incident Response Analyst role. We love seeing enthusiasm and a personal touch!

Showcase Relevant Experience: When detailing your past roles, focus on specific incidents you've handled and the outcomes. We’re keen to know about your experience with log analysis, malware behaviour, and any frameworks you’ve worked with, like MITRE ATT&CK.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy – just a few clicks and you’re done!

How to prepare for a job interview at Bonhill Partners

✨Know Your Incident Response Basics

Make sure you brush up on your incident response fundamentals. Be ready to discuss your experience with triage, containment, eradication, and recovery. They’ll want to hear specific examples of incidents you've handled, so have a couple of stories in mind that showcase your skills.

✨Familiarise Yourself with SIEM Tools

Since knowledge of SIEM tools like Splunk or QRadar is crucial, take some time to review how these tools work. If you’ve used them before, be prepared to explain how you leveraged them in past roles. If not, at least understand their purpose and functionalities.

✨Understand Malware and Attack Vectors

You should have a solid grasp of malware behaviour and common attack vectors. Brush up on the MITRE ATT&CK framework and be ready to discuss how you would identify and respond to different types of threats. This shows you’re not just familiar with theory but can apply it practically.

✨Prepare for Technical Questions

Expect technical questions related to log analysis and network security fundamentals. Review key concepts around TCP/IP, DNS, and firewalls. Being able to articulate your understanding of these topics will demonstrate your technical proficiency and readiness for the role.

Incident Response Analyst (SOC) in London
Bonhill Partners
Location: London
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>