Security Operation Analyst
Security Operation Analyst

Security Operation Analyst

Full-Time 65000 - 65000 £ / year (est.) Home office possible
I

At a Glance

  • Tasks: Lead incident response and threat hunting to protect critical data assets.
  • Company: Global leader in Data Security and Insider Risk with a focus on innovation.
  • Benefits: Up to £65,000 salary, performance bonus, and advanced security tools.
  • Other info: Clear career progression into senior roles and access to cutting-edge technology.
  • Why this job: Join a sophisticated team and make a real impact in data security.
  • Qualifications: 3+ years in SOC or Incident Response, strong data security knowledge.

The predicted salary is between 65000 - 65000 £ per year.

Location: Fully Remote (UK Based)

Salary: Up to £65,000 + Performance Bonus + Benefits

Employment Type: Full-Time

The Opportunity

We are representing a global leader in Data Security and Insider Risk to find a high-calibre SOC Analyst to join their internal security operations. This isn't your typical "ticket-churning" MSP role. You will be part of a sophisticated, data-centric security team focused on protecting critical infrastructure and high-value data assets.

If you are a security professional who loves hunting through logs, identifying complex lateral movement, and automating responses rather than just staring at a dashboard—this is for you.

Key Responsibilities

  • Incident Response: Lead the detection, triage, and remediation of security events across cloud, on-prem, and hybrid environments.
  • Threat Hunting: Proactively search for undetected threats using SIEM, EDR, and specialized Data Security Platforms.
  • Alert Optimization: Work closely with the engineering team to tune detection logic, reducing "noise" and improving True Positive rates.
  • Forensics & Analysis: Conduct deep-dive analysis into malicious files, suspicious emails, and anomalous user behaviour.
  • Stakeholder Communication: Provide clear, concise briefings to technical and non-technical leadership during high-priority incidents.

Your Technical Profile

We are looking for a candidate who is "curious by nature" and possesses:

  • Experience: 3+ years in a dedicated SOC or Incident Response role.
  • The "Data" Mindset: Strong understanding of Data Security Platforms (DSPM) or File Integrity Monitoring (FIM) is highly desirable.
  • Technical Stack: Proficiency with modern SIEMs (e.g., Sentinel, Splunk) and EDR tools (e.g., CrowdStrike, SentinelOne).
  • Networking & OS: Deep knowledge of TCP/IP, Active Directory, and Windows/Linux internals.
  • Cloud Proficiency: Comfortable investigating incidents within AWS, Azure, or M365 environments.
  • Certifications (Bonus): GCIH, GCIA, SC-200, or equivalent industry-recognized credentials.

Why Join This Team?

  • Competitive Package: Up to £65k base plus a rewarding bonus structure.
  • Advanced Tooling: You will have access to enterprise-grade, cutting-edge security proprietary tools that most analysts only dream of using.
  • Growth Path: Clear progression into Senior SOC, Incident Response Lead, or Security Engineering.

Security Operation Analyst employer: Intaso

Join a forward-thinking leader in Data Security and Insider Risk, where you will be part of a dynamic and innovative security operations team. Enjoy a fully remote work environment that fosters collaboration and growth, with access to advanced tools and a clear path for career advancement. With competitive compensation and a culture that values curiosity and expertise, this is an exceptional opportunity for security professionals looking to make a meaningful impact.
I

Contact Detail:

Intaso Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Security Operation Analyst

✨Tip Number 1

Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. We all know that sometimes it’s not just what you know, but who you know that can help you land that dream job.

✨Tip Number 2

Prepare for those interviews by brushing up on your technical skills and incident response scenarios. We recommend doing mock interviews with friends or using online platforms to get comfortable with the questions you might face.

✨Tip Number 3

Showcase your passion for security! Share your projects, blogs, or any contributions to open-source tools. We want to see that you’re not just another candidate, but someone who lives and breathes data security.

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step to connect with us directly.

We think you need these skills to ace Security Operation Analyst

Incident Response
Threat Hunting
SIEM
EDR
Data Security Platforms
Forensics & Analysis
Stakeholder Communication
TCP/IP
Active Directory
Windows/Linux Internals
AWS
Azure
M365
GCIH
GCIA

Some tips for your application 🫡

Tailor Your CV: Make sure your CV reflects the skills and experiences that match the job description. Highlight your experience in SOC or Incident Response roles, and don’t forget to mention any relevant certifications you have!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about data security and how your curiosity drives you to hunt for threats. Keep it concise but impactful!

Showcase Your Technical Skills: Be specific about your technical proficiencies. Mention the SIEMs and EDR tools you’ve worked with, and give examples of how you've used them in past roles. This will show us you’re ready to hit the ground running!

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates from our team!

How to prepare for a job interview at Intaso

✨Know Your Tools

Familiarise yourself with the specific SIEM and EDR tools mentioned in the job description, like Sentinel and CrowdStrike. Be ready to discuss your experience with these platforms and how you've used them in past roles.

✨Showcase Your Incident Response Skills

Prepare examples of incidents you've managed, focusing on your role in detection, triage, and remediation. Highlight any unique challenges you faced and how you overcame them to demonstrate your problem-solving abilities.

✨Understand the Data Security Landscape

Brush up on current trends in data security and insider risk. Being able to discuss recent threats or breaches will show your passion for the field and your proactive approach to threat hunting.

✨Communicate Clearly

Practice explaining complex technical concepts in simple terms. You'll need to communicate effectively with both technical and non-technical stakeholders, so being clear and concise is key during your interview.

Security Operation Analyst
Intaso

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>