At a Glance
- Tasks: Monitor and investigate security events to protect against cyber threats.
- Company: Join a modern SOC with a focus on continuous improvement and collaboration.
- Benefits: Structured training, career progression, and a supportive team culture.
- Why this job: Be on the frontline of cyber defence and make a real impact.
- Qualifications: 1+ year in SOC or strong security exposure with relevant skills.
- Other info: Dynamic environment with opportunities in Threat Intelligence and Incident Response.
The predicted salary is between 36000 - 60000 Β£ per year.
Ready to be on the frontline of cyber defence? Our client is looking for a Security Operations Centre (SOC) Analyst to join a modern, continuously evolving SOC environment. Youβll work hands-on with real-world threats, monitoring and investigating security events across multiple customer environments while developing your skills alongside experienced analysts. This role is ideal for someone who enjoys investigation, thrives in fast-paced environments, and wants clear progression within cyber security.
Responsibilities
- Monitor and triage alerts across SIEM, EDR/XDR, email and web security platforms
- Investigate suspicious activity and determine impact and severity
- Build clear timelines and maintain high-quality investigation notes
- Escalate complex cases with clear technical context
- Review vulnerability outputs and provide basic prioritisation insight
Hunt & Improve
- Participate in threat hunting activities
- Contribute ideas to improve detections, dashboards and runbooks
- Support testing of new detection logic and use cases
- Provide clear written updates to customers and internal stakeholders
- Take part in shift handovers to ensure continuity
- Work closely with senior analysts to grow technical depth
Qualifications
- 1+ year experience in a SOC, or 3+ years in infrastructure or networking with strong security exposure
- Experience triaging and investigating security alerts
- Understanding of attacker behaviour, TTPs and common attack chains
- Ability to identify indicators of compromise across endpoints, networks and logs
- Hands-on experience with at least one SIEM, EDR or XDR platform
- Familiarity with ticketing systems (e.g. ServiceNow, JIRA, Salesforce)
- Knowledge of Windows, macOS and Linux environments
- Understanding of DNS, HTTP, SMB and LDAP
- Awareness of MITRE ATT&CK and distinguishing legitimate vs suspicious activity
A technical, analyst-first SOC that values quality investigations. Structured training, cyber ranges and real incident exposure. Clear career paths into Threat Intelligence, SOC Engineering, Incident Response and senior SOC roles. Collaborative, agile team culture that values curiosity and continuous improvement. Supportive environment with regular knowledge sharing and team events.
Security Operations Center Analyst employer: Franklin Fitch
Contact Detail:
Franklin Fitch Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Security Operations Center Analyst
β¨Tip Number 1
Get your hands dirty with real-world threats! Join online forums or local meetups where SOC analysts hang out. Networking is key, and you never know who might have a lead on your dream job.
β¨Tip Number 2
Show off your skills! Create a personal project or contribute to open-source security tools. This not only boosts your CV but also gives you something tangible to discuss in interviews.
β¨Tip Number 3
Practice makes perfect! Use platforms like StudySmarter to sharpen your knowledge on SIEM, EDR/XDR, and other relevant tools. The more confident you are, the better you'll perform in interviews.
β¨Tip Number 4
Apply through our website! Weβre always on the lookout for passionate SOC analysts. Tailor your application to highlight your investigative skills and eagerness to learn β we love that!
We think you need these skills to ace Security Operations Center Analyst
Some tips for your application π«‘
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with SIEM, EDR/XDR platforms, and any relevant investigations you've conducted. We want to see how your skills match up with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cyber security and why youβre excited about this role. Let us know how your background in monitoring and investigating security events makes you a great fit for our team.
Showcase Your Technical Skills: Donβt forget to mention your hands-on experience with different operating systems and ticketing systems. We love seeing candidates who can identify indicators of compromise and understand attacker behaviour, so make that clear in your application!
Apply Through Our Website: We encourage you to apply directly through our website. Itβs the best way for us to receive your application and ensures you donβt miss out on any important updates. Plus, it shows youβre keen to join our team!
How to prepare for a job interview at Franklin Fitch
β¨Know Your Tools
Familiarise yourself with the specific SIEM, EDR, or XDR platforms mentioned in the job description. Be ready to discuss your hands-on experience and how you've used these tools to triage and investigate security alerts.
β¨Understand the Threat Landscape
Brush up on your knowledge of attacker behaviour, TTPs, and common attack chains. Being able to articulate this understanding will show that youβre not just a technician but someone who can think critically about security threats.
β¨Prepare for Scenario Questions
Expect to be asked about how you would handle specific security incidents. Think through potential scenarios and prepare clear, structured responses that demonstrate your investigative skills and ability to prioritise effectively.
β¨Show Your Curiosity
This role values continuous improvement and curiosity. Be prepared to share examples of how you've contributed ideas in previous roles, whether itβs improving detection logic or enhancing investigation processes. This will highlight your proactive approach.