At a Glance
- Tasks: Monitor security alerts and manage incidents for enterprise customers using Microsoft Sentinel/Defender.
- Company: Join a top Microsoft partner known for its award-winning culture and advanced security solutions.
- Benefits: Enjoy hybrid work flexibility with remote options and competitive pay up to £525 a day.
- Why this job: Be part of a dynamic team tackling real-world security challenges in a supportive environment.
- Qualifications: Experience in Microsoft MDR/XDR SOC, KQL skills, and relevant cyber qualifications are essential.
- Other info: SC Level Security clearance provided; must have 5 years minimum UK residency.
The predicted salary is between 42000 - 63000 £ per year.
Senior Security Operations / Incident Analyst x3 6 month contract To £525 a day *Based hybrid, remote + site 5-6 days a month* Manchester, Birmingham or Maidenhead all work High level overview: Essentially 3x Microsoft Security advanced L2 SOC Analysts, or L3 SOC Analysts, depending on your work environments as this requires more than most! Based remote plus a single site in either Manchester, Birmingham or Maidenhead for only a handful of days a month on site. SC Level Security clearance will be provided (*5 years minimum in the UK only to pass clearance). You’ll review security incidents occurring in their customers’ environments, alerting them to malicious activities and working with them to investigate and remediate the incidents to resolution. The Company: You will work for one of Microsoft UK’s deepest embedded partners in their Managed XDR Security Operations Center (SOC) team. They deliver Microsoft security services and solutions among other services, into enterprise customers across Commercial, Public Sector, Government and Microsoft fronted critical national infrastructure focusing on Microsoft XDR SOC services for Sentinel, Defender and more! They’re also a Microsoft Security Solutions Partner (with all 6 solutions partner designations in total), have multiple Microsoft Advanced specializations including all the security ones, and have a Microsoft certified MXDR SOC. A Microsoft Intelligent Security Association (MISA) member they are one of the biggest names in IT Services in the UK with a multi award winning culture built around the values of its people. The role… As a Senior level SOC analyst/incident response expert in the Microsoft Security operations team, you’ll be responsible for: Monitoring for security alerts from Security Platforms, primarily Microsoft Sentinel/Defender. Providing advanced second line security incident management and analysis to the customers through effective monitoring, reporting, and technical guidance for successful resolution Maintaining high levels of ownership through the security incident lifecycle Documenting and managing cases to utilise information for customers reports, providing insight and intelligent recommendations Interfacing with our customers to resolve issues, provide additional information, and answer questions related to incidents and monitoring Maintaining high quality security incident resolution and performance adherence Identifying and reporting tuning and automation opportunities Ideally you will have… Experience working in a Microsoft MDR/XDR SOC, Preferably MSSP environment experience, although if you’ve previously been in busy end customer SOC environment this will be considered The ability to dynamically assess risks, threats & threat actors for new and existing customers KQL (Kusto Query Language) experience Cyber qualifications such as the Microsoft SC-200 or related certs Previous experience with SIEM tools including Microsoft Sentinel, and Defender Familiarity with cyber security concepts and their application in different business environments Detail orientated, with excellent communication skills and the ability to take a structured approach to procedures and working instructions for incident response/resolution
Senior Security Operations / Incident Analyst employer: Cloud Decisions
Contact Detail:
Cloud Decisions Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Security Operations / Incident Analyst
✨Tip Number 1
Make sure to familiarize yourself with Microsoft Sentinel and Defender, as these are key tools you'll be working with. Understanding their functionalities and how they integrate into security operations will give you a significant edge during the interview process.
✨Tip Number 2
Highlight any experience you have in a Managed Security Service Provider (MSSP) environment. If you've worked in a busy end customer SOC, be ready to discuss specific incidents you've managed and how you approached them.
✨Tip Number 3
Brush up on your KQL (Kusto Query Language) skills. Being able to demonstrate your ability to write queries and analyze data effectively will show that you're prepared for the technical demands of the role.
✨Tip Number 4
Prepare to discuss your approach to incident management and resolution. Be ready to share examples of how you've maintained ownership throughout the security incident lifecycle and how you've communicated with customers during incidents.
We think you need these skills to ace Senior Security Operations / Incident Analyst
Some tips for your application 🫡
Understand the Role: Make sure to thoroughly read the job description for the Senior Security Operations / Incident Analyst position. Highlight the key responsibilities and required skills, such as experience with Microsoft Sentinel and KQL, and tailor your application to reflect your relevant experience.
Highlight Relevant Experience: In your CV and cover letter, emphasize your previous work in a Microsoft MDR/XDR SOC or similar environments. Provide specific examples of incidents you have managed and how you contributed to their resolution, showcasing your ability to handle security alerts and incidents effectively.
Showcase Your Skills: Detail your technical skills related to security incident management, including any cyber qualifications like Microsoft SC-200. Mention your familiarity with SIEM tools and your ability to assess risks and threats, as these are crucial for the role.
Craft a Strong Cover Letter: Write a compelling cover letter that not only summarizes your qualifications but also expresses your enthusiasm for working with a leading Microsoft partner. Discuss your passion for cybersecurity and how you can contribute to their Managed XDR Security Operations Center team.
How to prepare for a job interview at Cloud Decisions
✨Showcase Your Technical Expertise
Be prepared to discuss your experience with Microsoft Sentinel and Defender in detail. Highlight specific incidents you've managed, the tools you used, and the outcomes of your actions. This will demonstrate your hands-on knowledge and ability to handle security incidents effectively.
✨Demonstrate Problem-Solving Skills
Prepare examples of how you've dynamically assessed risks and threats in previous roles. Discuss your thought process when identifying and resolving security incidents, as well as any tuning or automation opportunities you've implemented to improve incident response.
✨Communicate Clearly and Effectively
Since you'll be interfacing with customers, strong communication skills are essential. Practice explaining complex security concepts in simple terms. Be ready to answer questions about your approach to incident management and how you ensure high-quality resolution.
✨Understand the Company Culture
Research the company's values and culture, especially their focus on teamwork and innovation. Be prepared to discuss how your personal values align with theirs and how you can contribute to their multi-award-winning culture within the SOC team.