SOC Threathunting

SOC Threathunting

Full-Time 36000 - 60000 Β£ / year (est.) Home office (partial)
Go Premium
E

At a Glance

  • Tasks: Create and tune threat detection content while hunting for potential threats.
  • Company: Join a leading data security firm focused on innovation and collaboration.
  • Benefits: Flexible contract work, opportunities for continuous learning, and a supportive team environment.
  • Why this job: Make a real difference in cybersecurity by developing tailored detection strategies.
  • Qualifications: Experience in threat detection and a passion for proactive security measures.
  • Other info: Engage with diverse teams and enhance your skills in a dynamic tech landscape.

The predicted salary is between 36000 - 60000 Β£ per year.

As a member of the SOC Content Team, you will be responsible for contributing to the creation, deployment, and tuning of threat detection content and delivery of proactive threat hunting. You will work in close partnership with client Lead Analysts, threat intelligence teams, and other SOC functions to help ensure that detection strategies are tailored to each client's threat profile and security objectives. This role offers a balance of technical hands-on work, collaboration, and knowledge sharing, with a strong emphasis on continual learning and process improvement.

Key Responsibilities

  • Threat Detection Use Case Development – Design and implement detection logic aligned to specific threat scenarios, using industry frameworks such as MITRE ATT&CK. Maintain detection content throughout its lifecycle – from development and testing to deployment and tuning; work with client Lead Analysts to ensure content relevance and effectiveness across environments.
  • Proactive Threat Hunting – Conduct hypothesis-driven threat hunts based on client telemetry, threat intelligence, and observed anomalies. Use available data sources and tools to identify suspicious or malicious activity that may bypass existing detections; document and present findings in a clear and actionable format for both internal teams and clients.
  • Content QA and Maintenance – Participate in the review and validation of detection content prior to deployment. Assist in updating runbooks, SOPs, and detection playbooks to reflect changes in tools, threats, or client requirements; support efforts to maintain consistency, accuracy, and quality in all delivered content.
  • Collaboration & Knowledge Sharing – Actively engage with the wider SOC, threat intelligence, and tooling teams to refine detection strategies. Share insights, findings, and improvements with team members through documentation, workshops, or informal sessions; support cross-team initiatives and drive a culture of continuous improvement and innovation.

SOC Threathunting employer: e-Frontiers

E-Frontiers Ltd is an exceptional employer that fosters a collaborative and innovative work culture, particularly in the dynamic field of data security. With a strong emphasis on continual learning and professional development, employees are encouraged to engage in knowledge sharing and contribute to meaningful projects that directly impact client security objectives. Located in a vibrant tech hub, E-Frontiers offers unique opportunities for growth and advancement within a supportive team environment, making it an ideal place for those passionate about cybersecurity.
E

Contact Detail:

e-Frontiers Recruiting Team

StudySmarter Expert Advice 🀫

We think this is how you could land SOC Threathunting

✨Tip Number 1

Network like a pro! Reach out to folks in the industry, attend meetups, and join online forums. The more connections we make, the better our chances of landing that SOC Threat Hunting role.

✨Tip Number 2

Show off your skills! Create a portfolio or GitHub repository showcasing your threat detection projects or any relevant work. This gives potential employers a taste of what we can bring to the table.

✨Tip Number 3

Prepare for interviews by brushing up on the latest trends in threat hunting and detection strategies. We should be ready to discuss how we can tailor detection strategies to specific client needs.

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing familiar faces from our community!

We think you need these skills to ace SOC Threathunting

Threat Detection Use Case Development
Detection Logic Design
MITRE ATT&CK Framework
Proactive Threat Hunting
Data Analysis
Documentation Skills
Collaboration
Knowledge Sharing
Content QA and Maintenance
Runbook Updating
SOP Development
Detection Playbook Management
Continuous Improvement
Analytical Skills

Some tips for your application 🫑

Tailor Your Application: Make sure to customise your CV and cover letter for the SOC Threat Hunting role. Highlight your experience with threat detection and any relevant frameworks like MITRE ATT&CK. We want to see how your skills align with our needs!

Showcase Your Collaboration Skills: Since this role involves working closely with various teams, emphasise your teamwork and communication abilities. Share examples of how you've collaborated in the past to solve problems or improve processes. We love a good team player!

Be Clear and Concise: When writing your application, keep it straightforward and to the point. Use bullet points where possible to make your achievements stand out. We appreciate clarity and want to quickly see what you bring to the table!

Apply Through Our Website: Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensures you’re considered for the role. We can’t wait to hear from you!

How to prepare for a job interview at e-Frontiers

✨Know Your Threat Detection Frameworks

Familiarise yourself with industry frameworks like MITRE ATT&CK. Be ready to discuss how you would design and implement detection logic for specific threat scenarios, as this will show your technical expertise and understanding of the role.

✨Showcase Your Proactive Hunting Skills

Prepare examples of past experiences where you've conducted hypothesis-driven threat hunts. Highlight how you used telemetry and threat intelligence to identify suspicious activities, as this demonstrates your hands-on approach and analytical skills.

✨Emphasise Collaboration and Knowledge Sharing

Think of instances where you've worked closely with other teams, such as threat intelligence or SOC functions. Be ready to discuss how you shared insights and contributed to process improvements, as collaboration is key in this role.

✨Be Ready for Technical Questions

Expect technical questions related to detection content lifecycle management and QA processes. Brush up on how to maintain consistency and quality in detection content, as this will reflect your attention to detail and commitment to excellence.

SOC Threathunting
e-Frontiers
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

E
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>