At a Glance
- Tasks: Lead incident response and threat hunting to protect critical data assets.
- Company: Global leader in Data Security and Insider Risk with a focus on innovation.
- Benefits: Up to £65,000 salary, performance bonus, and advanced security tools.
- Other info: Clear career progression into senior roles and access to cutting-edge technology.
- Why this job: Join a sophisticated team and make a real impact in data security.
- Qualifications: 3+ years in SOC or Incident Response, strong data security knowledge.
The predicted salary is between 65000 - 65000 £ per year.
Location: Fully Remote (UK Based)
Salary: Up to £65,000 + Performance Bonus + Benefits
Employment Type: Full-Time
The Opportunity
We are representing a global leader in Data Security and Insider Risk to find a high-calibre SOC Analyst to join their internal security operations. This isn't your typical "ticket-churning" MSP role. You will be part of a sophisticated, data-centric security team focused on protecting critical infrastructure and high-value data assets.
If you are a security professional who loves hunting through logs, identifying complex lateral movement, and automating responses rather than just staring at a dashboard—this is for you.
Key Responsibilities
- Incident Response: Lead the detection, triage, and remediation of security events across cloud, on-prem, and hybrid environments.
- Threat Hunting: Proactively search for undetected threats using SIEM, EDR, and specialized Data Security Platforms.
- Alert Optimization: Work closely with the engineering team to tune detection logic, reducing "noise" and improving True Positive rates.
- Forensics & Analysis: Conduct deep-dive analysis into malicious files, suspicious emails, and anomalous user behaviour.
- Stakeholder Communication: Provide clear, concise briefings to technical and non-technical leadership during high-priority incidents.
Your Technical Profile
We are looking for a candidate who is "curious by nature" and possesses:
- Experience: 3+ years in a dedicated SOC or Incident Response role.
- The "Data" Mindset: Strong understanding of Data Security Platforms (DSPM) or File Integrity Monitoring (FIM) is highly desirable.
- Technical Stack: Proficiency with modern SIEMs (e.g., Sentinel, Splunk) and EDR tools (e.g., CrowdStrike, SentinelOne).
- Networking & OS: Deep knowledge of TCP/IP, Active Directory, and Windows/Linux internals.
- Cloud Proficiency: Comfortable investigating incidents within AWS, Azure, or M365 environments.
- Certifications (Bonus): GCIH, GCIA, SC-200, or equivalent industry-recognized credentials.
Why Join This Team?
- Competitive Package: Up to £65k base plus a rewarding bonus structure.
- Advanced Tooling: You will have access to enterprise-grade, cutting-edge security proprietary tools that most analysts only dream of using.
- Growth Path: Clear progression into Senior SOC, Incident Response Lead, or Security Engineering.
Security Operation Analyst employer: Intaso
Contact Detail:
Intaso Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operation Analyst
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. We all know that sometimes it’s not just what you know, but who you know that can help you land that dream job.
✨Tip Number 2
Prepare for those interviews by brushing up on your technical skills and incident response scenarios. We recommend doing mock interviews with friends or using online platforms to get comfortable with the questions you might face.
✨Tip Number 3
Showcase your passion for security! Share your projects, blogs, or any contributions to open-source tools. We want to see that you’re not just another candidate, but someone who lives and breathes data security.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step to connect with us directly.
We think you need these skills to ace Security Operation Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the job description. Highlight your experience in SOC or Incident Response roles, and don’t forget to mention any relevant certifications you have!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about data security and how your curiosity drives you to hunt for threats. Keep it concise but impactful!
Showcase Your Technical Skills: Be specific about your technical proficiencies. Mention the SIEMs and EDR tools you’ve worked with, and give examples of how you've used them in past roles. This will show us you’re ready to hit the ground running!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates from our team!
How to prepare for a job interview at Intaso
✨Know Your Tools
Familiarise yourself with the specific SIEM and EDR tools mentioned in the job description, like Sentinel and CrowdStrike. Be ready to discuss your experience with these platforms and how you've used them in past roles.
✨Showcase Your Incident Response Skills
Prepare examples of incidents you've managed, focusing on your role in detection, triage, and remediation. Highlight any unique challenges you faced and how you overcame them to demonstrate your problem-solving abilities.
✨Understand the Data Security Landscape
Brush up on current trends in data security and insider risk. Being able to discuss recent threats or breaches will show your passion for the field and your proactive approach to threat hunting.
✨Communicate Clearly
Practice explaining complex technical concepts in simple terms. You'll need to communicate effectively with both technical and non-technical stakeholders, so being clear and concise is key during your interview.