Security Operations Center Analyst
Security Operations Center Analyst

Security Operations Center Analyst

Full-Time 36000 - 60000 Β£ / year (est.) No home office possible
Go Premium
F

At a Glance

  • Tasks: Monitor and investigate security events to protect against cyber threats.
  • Company: Join a modern SOC with a focus on continuous improvement and collaboration.
  • Benefits: Structured training, career progression, and a supportive team culture.
  • Why this job: Be on the frontline of cyber defence and make a real impact.
  • Qualifications: 1+ year in SOC or strong security exposure with relevant skills.
  • Other info: Dynamic environment with opportunities in Threat Intelligence and Incident Response.

The predicted salary is between 36000 - 60000 Β£ per year.

Ready to be on the frontline of cyber defence? Our client is looking for a Security Operations Centre (SOC) Analyst to join a modern, continuously evolving SOC environment. You’ll work hands-on with real-world threats, monitoring and investigating security events across multiple customer environments while developing your skills alongside experienced analysts. This role is ideal for someone who enjoys investigation, thrives in fast-paced environments, and wants clear progression within cyber security.

Responsibilities

  • Monitor and triage alerts across SIEM, EDR/XDR, email and web security platforms
  • Investigate suspicious activity and determine impact and severity
  • Build clear timelines and maintain high-quality investigation notes
  • Escalate complex cases with clear technical context
  • Review vulnerability outputs and provide basic prioritisation insight

Hunt & Improve

  • Participate in threat hunting activities
  • Contribute ideas to improve detections, dashboards and runbooks
  • Support testing of new detection logic and use cases
  • Provide clear written updates to customers and internal stakeholders
  • Take part in shift handovers to ensure continuity
  • Work closely with senior analysts to grow technical depth

Qualifications

  • 1+ year experience in a SOC, or 3+ years in infrastructure or networking with strong security exposure
  • Experience triaging and investigating security alerts
  • Understanding of attacker behaviour, TTPs and common attack chains
  • Ability to identify indicators of compromise across endpoints, networks and logs
  • Hands-on experience with at least one SIEM, EDR or XDR platform
  • Familiarity with ticketing systems (e.g. ServiceNow, JIRA, Salesforce)
  • Knowledge of Windows, macOS and Linux environments
  • Understanding of DNS, HTTP, SMB and LDAP
  • Awareness of MITRE ATT&CK and distinguishing legitimate vs suspicious activity

A technical, analyst-first SOC that values quality investigations. Structured training, cyber ranges and real incident exposure. Clear career paths into Threat Intelligence, SOC Engineering, Incident Response and senior SOC roles. Collaborative, agile team culture that values curiosity and continuous improvement. Supportive environment with regular knowledge sharing and team events.

Security Operations Center Analyst employer: Franklin Fitch

Join a forward-thinking organisation that prioritises your growth and development as a Security Operations Centre Analyst. With a collaborative and agile team culture, you'll benefit from structured training, hands-on experience with real-world threats, and clear career progression opportunities in the dynamic field of cyber security. Located in a modern SOC environment, this role offers a supportive atmosphere where curiosity and continuous improvement are highly valued.
F

Contact Detail:

Franklin Fitch Recruiting Team

StudySmarter Expert Advice 🀫

We think this is how you could land Security Operations Center Analyst

✨Tip Number 1

Get your hands dirty with real-world threats! Join online forums or local meetups where SOC analysts hang out. Networking is key, and you never know who might have a lead on your dream job.

✨Tip Number 2

Show off your skills! Create a personal project or contribute to open-source security tools. This not only boosts your CV but also gives you something tangible to discuss in interviews.

✨Tip Number 3

Practice makes perfect! Use platforms like StudySmarter to sharpen your knowledge on SIEM, EDR/XDR, and other relevant tools. The more confident you are, the better you'll perform in interviews.

✨Tip Number 4

Apply through our website! We’re always on the lookout for passionate SOC analysts. Tailor your application to highlight your investigative skills and eagerness to learn – we love that!

We think you need these skills to ace Security Operations Center Analyst

SIEM
EDR
XDR
Security Event Monitoring
Incident Investigation
Threat Hunting
Technical Writing
Vulnerability Assessment
Understanding of TTPs
Indicators of Compromise Identification
Familiarity with Ticketing Systems
Knowledge of Windows, macOS and Linux
Understanding of DNS, HTTP, SMB and LDAP
Awareness of MITRE ATT&CK
Collaboration Skills

Some tips for your application 🫑

Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with SIEM, EDR/XDR platforms, and any relevant investigations you've conducted. We want to see how your skills match up with what we're looking for!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cyber security and why you’re excited about this role. Let us know how your background in monitoring and investigating security events makes you a great fit for our team.

Showcase Your Technical Skills: Don’t forget to mention your hands-on experience with different operating systems and ticketing systems. We love seeing candidates who can identify indicators of compromise and understand attacker behaviour, so make that clear in your application!

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates. Plus, it shows you’re keen to join our team!

How to prepare for a job interview at Franklin Fitch

✨Know Your Tools

Familiarise yourself with the specific SIEM, EDR, or XDR platforms mentioned in the job description. Be ready to discuss your hands-on experience and how you've used these tools to triage and investigate security alerts.

✨Understand the Threat Landscape

Brush up on your knowledge of attacker behaviour, TTPs, and common attack chains. Being able to articulate this understanding will show that you’re not just a technician but someone who can think critically about security threats.

✨Prepare for Scenario Questions

Expect to be asked about how you would handle specific security incidents. Think through potential scenarios and prepare clear, structured responses that demonstrate your investigative skills and ability to prioritise effectively.

✨Show Your Curiosity

This role values continuous improvement and curiosity. Be prepared to share examples of how you've contributed ideas in previous roles, whether it’s improving detection logic or enhancing investigation processes. This will highlight your proactive approach.

Security Operations Center Analyst
Franklin Fitch
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

F
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>