At a Glance
- Tasks: Lead incident response, improve detection capabilities, and mentor junior analysts in a dynamic SOC environment.
- Company: Join a leading UK retail organisation investing heavily in cyber security.
- Benefits: Competitive salary up to £82,000, annual bonus, and hybrid working model.
- Why this job: Make a real impact in a high-stakes SOC role with opportunities for growth and influence.
- Qualifications: Experience as a Level 3 SOC Analyst with strong knowledge of Microsoft security tools.
- Other info: Work in a collaborative environment with clear progression paths and a focus on innovation.
The predicted salary is between 66000 - 88000 £ per year.
A leading UK retail organisation is continuing to invest heavily in its cyber security capabilities and is looking to hire an experienced Level 3 SOC Analyst to join a mature and well-established Security Operations function. This role sits at the sharp end of detection, investigation, and response. You'll be responsible for handling complex security incidents, improving detection capability, and acting as a technical escalation point for the wider SOC team, while working closely with engineering, threat intelligence, and security leadership.
Key Responsibilities
- Act as the final escalation point for complex security alerts and incidents across the enterprise
- Lead and coordinate incident response activities, including containment, eradication, and post-incident reviews
- Perform advanced threat hunting and proactive investigations using SIEM, EDR, and cloud telemetry
- Develop, tune, and optimise detection rules aligned to MITRE ATT&CK
- Work extensively with the Microsoft Security stack, including Sentinel, Defender XDR, Entra ID, and M365 Security
- Improve SOC processes, playbooks, and response procedures to reduce MTTD and MTTR
- Support and mentor Level 1 and Level 2 analysts, raising overall SOC capability
- Collaborate with wider security teams (engineering, IAM, cloud, risk) on remediation and security improvements
- Provide clear technical reporting and recommendations to both technical and non-technical stakeholders
Required Experience
- Proven experience working as a Level 3 / Senior SOC Analyst or equivalent role
- Strong hands-on experience with the Microsoft security ecosystem (Sentinel, Defender, MDE, MDI)
- Deep understanding of incident response, attacker TTPs, and kill-chain methodologies
- Experience creating and tuning SIEM detections and alerts
- Strong knowledge of Windows environments, Active Directory, Azure, and M365
- Experience with threat hunting and forensic investigation techniques
- Comfortable working in a hybrid on-site model (1–3 days per week in London)
- Experience in large-scale or enterprise environments
- Exposure to retail, e-commerce, or high-volume customer-facing environments
- Scripting or automation experience (PowerShell, KQL, Python)
- Relevant certifications such as GCIA, GCED, GCIH, SC-200, or similar
What's On Offer
- Salary up to £82,000 depending on experience
- Annual performance bonus
- Hybrid working (London-based, 1–3 days per week)
- Opportunity to work in a high-impact SOC role within a well-funded security programme
- Clear progression and the chance to influence SOC strategy and detection maturity
Seniority Level: Mid-Senior level
Employment Type: Full-time
Job Function: Information Technology
Industries: Computer and Network Security
Senior SOC Analyst in London employer: InfoSec People Ltd
Contact Detail:
InfoSec People Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior SOC Analyst in London
✨Network Like a Pro
Get out there and connect with folks in the industry! Attend cyber security meetups, webinars, or conferences. We can’t stress enough how important it is to build relationships; you never know who might have the inside scoop on job openings.
✨Show Off Your Skills
When you get the chance to chat with potential employers, don’t hold back! Share your experiences with incident response and threat hunting. We want to hear about your successes and how you’ve tackled complex security incidents.
✨Tailor Your Approach
Every SOC role is unique, so make sure you tailor your conversations to highlight your relevant experience with Microsoft Security tools and your understanding of the MITRE ATT&CK framework. We’re all about making those connections count!
✨Apply Through Our Website
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. We’re excited to see how you can contribute to our team and help us enhance our cyber security capabilities.
We think you need these skills to ace Senior SOC Analyst in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior SOC Analyst role. Highlight your experience with Microsoft security tools and incident response. We want to see how your skills match what we're looking for!
Showcase Your Achievements: Don’t just list your responsibilities; showcase your achievements! Use specific examples of how you've improved detection capabilities or led incident response activities. This helps us see the impact you've made in previous roles.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Explain why you're passionate about cyber security and how you can contribute to our team. Keep it concise but engaging, and let your personality come through.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it makes the process smoother for everyone involved!
How to prepare for a job interview at InfoSec People Ltd
✨Know Your Tech Inside Out
Make sure you’re well-versed in the Microsoft security stack, especially Sentinel and Defender. Brush up on your knowledge of SIEM, EDR, and cloud telemetry, as these will be crucial in demonstrating your expertise during the interview.
✨Showcase Your Incident Response Skills
Prepare to discuss specific incidents you've handled in the past. Be ready to explain your approach to containment, eradication, and post-incident reviews. This will show that you can lead and coordinate effectively in high-pressure situations.
✨Demonstrate Your Threat Hunting Experience
Have examples ready of how you've performed advanced threat hunting and proactive investigations. Highlight any experience with tuning detection rules aligned to MITRE ATT&CK, as this will showcase your analytical skills and understanding of attacker methodologies.
✨Be Ready to Collaborate
Since this role involves working closely with various teams, prepare to discuss how you've collaborated with engineering, IAM, or risk teams in the past. Emphasise your ability to mentor junior analysts and improve overall SOC capabilities, as teamwork is key in this position.