SOC / Cyber Threat Detection Analyst – SANS/GIAC in Wokingham
SOC / Cyber Threat Detection Analyst – SANS/GIAC

SOC / Cyber Threat Detection Analyst – SANS/GIAC in Wokingham

Wokingham Full-Time 50000 - 60000 £ / year (est.) No home office possible
C

At a Glance

  • Tasks: Hunt for cyber threats and analyse adversary behaviour in a dynamic environment.
  • Company: Join a leading cyber defence team in Wokingham, Berkshire.
  • Benefits: Competitive salary, excellent benefits, and comprehensive training opportunities.
  • Other info: Ideal for those passionate about cybersecurity and eager to grow their expertise.
  • Why this job: Make a real impact by proactively defending against cyber threats.
  • Qualifications: Experience in threat hunting and strong analytical skills required.

The predicted salary is between 50000 - 60000 £ per year.

Location: Wokingham, Berkshire (On-site)

Salary: Competitive (dependent on experience) + excellent benefits & training

Security Clearance: Ideally SC Cleared or eligible for SC

Role Overview

As a Cyber Threat Detection Analyst, you will play a hands‑on role within an advanced cyber defence function, focused on proactive threat hunting, adversary behaviour analysis, and high‑fidelity threat detection across enterprise environments. This role goes beyond reactive alert handling. You will actively hunt for malicious activity using telemetry, SIEM data, and threat intelligence, develop hypotheses based on MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs), and support incident management and response activities when threats are identified.

We are open to experienced SOC Analysts where threat hunting, investigations, and proactive detection have formed a significant part of their role, and who are looking to further develop in a more hunting‑led environment. This position is well suited to analysts who enjoy thinking like an attacker, have worked alongside or supported red team or purple team activities, and want to deepen their expertise in threat detection and detection engineering.

Skills & Experience We’re Seeking

  • Experience in threat hunting, cyber threat detection, SOC, blue team, or cyber defence environments, with ideally around five years hands‑on experience.
  • Strong hands‑on experience using SIEM platforms, including: Microsoft Sentinel (KQL), Splunk (SPL), Elastic Security/Kibana (KQL, ESQL).
  • Practical and operational understanding of MITRE ATT&CK, attacker techniques, and adversary tradecraft.
  • Experience working with Indicators of Compromise (IOCs) and threat intelligence feeds.
  • Solid experience across the security event life cycle, including detection, investigation, and incident management.
  • Hands‑on experience with EDR/XDR technologies such as Microsoft Defender, CrowdStrike, SentinelOne, or Carbon Black.
  • Strong knowledge of networking fundamentals (TCP/IP, DNS, HTTP/S, Firewalls, VPNs, Proxy technologies).
  • Experience analysing telemetry from Windows, Linux, identity, endpoint, and network sources.
  • Strong analytical mindset with the ability to clearly communicate findings, impact, and risk.

Key Responsibilities

  • Conduct proactive threat hunting activities across log, endpoint, and network telemetry to identify suspicious, stealthy, or previously unknown threats.
  • Develop and execute hunt hypotheses aligned to MITRE ATT&CK TTPs, adversary behaviours, and emerging threat intelligence.
  • Write, refine, and optimise SIEM queries using KQL, SPL, Elastic/ESQL, and Kibana Query Language.
  • Perform IOC analysis, enrichment, and validation, integrating internal and external threat intelligence sources.
  • Lead investigations from initial detection through scoping, root cause analysis, and impact assessment.
  • Support incident management and incident response activities, including containment, remediation, escalation, and lessons learned.
  • Collaborate closely with SOC teams, incident responders, red teams, and purple teams to validate detections and improve defensive coverage.
  • Contribute to detection logic improvements, use‑case development, and continuous enhancement of hunting methodologies.
  • Produce clear investigation write‑ups, timelines, and recommendations for technical and non‑technical stakeholders.

Security Certifications (Highly Beneficial)

  • SANS/GIAC certifications, including but not limited to: GCIH – Incident Handler, GCIA – Intrusion Analyst, GCED – Enterprise Defender, GCTI – Cyber Threat Intelligence, GMON – Continuous Monitoring, GDAT – Defending Advanced Threats, GCAT – Advanced Threat Intelligence.
  • OSCP or equivalent offensive security qualifications.
  • Crest certifications, such as: Crest Practitioner Intrusion Analyst (CPIA), Crest Registered Intrusion Analyst (CRIA), Crest Certified Threat Intelligence Analyst (CCTIA), Crest Certified Blue Team Professional (CCBTP).
  • Microsoft SC-200 or related detection and response certifications.
  • Other recognised cyber security or threat intelligence credentials.

SOC / Cyber Threat Detection Analyst – SANS/GIAC in Wokingham employer: Cyber UK

As a leading employer in the cybersecurity sector, we offer a dynamic work environment in Wokingham, Berkshire, where innovation and collaboration thrive. Our commitment to employee growth is evident through extensive training opportunities, including support for SANS/GIAC certifications, and a culture that encourages proactive threat hunting and continuous learning. Join us to be part of a team that values your expertise and empowers you to make a meaningful impact in the fight against cyber threats.
C

Contact Detail:

Cyber UK Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC / Cyber Threat Detection Analyst – SANS/GIAC in Wokingham

Tip Number 1

Network like a pro! Attend industry meetups, conferences, or webinars related to cyber security. It's a great way to meet potential employers and learn about job openings that might not be advertised.

Tip Number 2

Show off your skills! Create a portfolio showcasing your threat hunting projects or any relevant work you've done. This can really set you apart from other candidates when you're chatting with hiring managers.

Tip Number 3

Practice makes perfect! Brush up on your technical skills by working on labs or simulations that focus on SIEM platforms and MITRE ATT&CK techniques. The more hands-on experience you have, the better you'll perform in interviews.

Tip Number 4

Apply through our website! We often have exclusive roles listed there, and it’s a direct line to us. Plus, it shows you're genuinely interested in joining our team. Don’t miss out!

We think you need these skills to ace SOC / Cyber Threat Detection Analyst – SANS/GIAC in Wokingham

Threat Hunting
Cyber Threat Detection
SOC Experience
SIEM Platforms
Microsoft Sentinel (KQL)
Splunk (SPL)
Elastic Security/Kibana (KQL, ESQL)
MITRE ATT&CK
Indicators of Compromise (IOCs)
EDR/XDR Technologies
Microsoft Defender
CrowdStrike
SentinelOne
Carbon Black
Networking Fundamentals

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the SOC / Cyber Threat Detection Analyst role. Highlight your experience with threat hunting, SIEM platforms, and any relevant certifications. We want to see how your skills align with what we're looking for!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber defence and how your background makes you a great fit for our team. Don’t forget to mention any hands-on experience you've had with MITRE ATT&CK or EDR technologies.

Show Off Your Analytical Skills: In your application, be sure to showcase your analytical mindset. Provide examples of how you've tackled complex problems in previous roles, especially those related to threat detection and incident response. We love seeing how you think like an attacker!

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our awesome team at StudySmarter!

How to prepare for a job interview at Cyber UK

Know Your MITRE ATT&CK

Make sure you brush up on the MITRE ATT&CK framework before your interview. Be ready to discuss how you've applied it in your previous roles, especially in threat hunting and detection. This shows that you understand the tactics and techniques attackers use, which is crucial for the role.

Show Off Your SIEM Skills

Since experience with SIEM platforms is key, prepare to talk about your hands-on experience with tools like Microsoft Sentinel or Splunk. Bring examples of specific queries you've written or how you've used these tools to detect threats. This will demonstrate your practical knowledge and problem-solving skills.

Communicate Clearly

As a Cyber Threat Detection Analyst, you'll need to communicate findings effectively. Practice explaining complex technical concepts in simple terms. Think about how you would present your investigation results to both technical and non-technical stakeholders, as this will be a big part of your job.

Prepare for Scenario Questions

Expect scenario-based questions where you'll need to think on your feet. Prepare for questions about how you would handle specific incidents or threats. This will help you showcase your analytical mindset and your ability to lead investigations from detection to resolution.

SOC / Cyber Threat Detection Analyst – SANS/GIAC in Wokingham
Cyber UK
Location: Wokingham

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>