At a Glance
- Tasks: Lead incident response and hunt for threats in a dynamic security environment.
- Company: Global leader in Data Security and Insider Risk with a focus on innovation.
- Benefits: Competitive salary up to £65k, performance bonus, and advanced security tools.
- Other info: Clear career progression into senior roles and access to cutting-edge technology.
- Why this job: Join a sophisticated team and make a real impact on data security.
- Qualifications: 3+ years in SOC or Incident Response, strong data security knowledge.
The predicted salary is between 65000 - 65000 £ per year.
Location: Fully Remote (UK Based)
Salary: Up to £65,000 + Performance Bonus + Benefits
Employment Type: Full-Time
The Opportunity
We are representing a global leader in Data Security and Insider Risk to find a high-calibre SOC Analyst to join their internal security operations. This isn't your typical "ticket-churning" MSP role. You will be part of a sophisticated, data-centric security team focused on protecting critical infrastructure and high-value data assets.
If you are a security professional who loves hunting through logs, identifying complex lateral movement, and automating responses rather than just staring at a dashboard—this is for you.
Key Responsibilities
- Incident Response: Lead the detection, triage, and remediation of security events across cloud, on-prem, and hybrid environments.
- Threat Hunting: Proactively search for undetected threats using SIEM, EDR, and specialized Data Security Platforms.
- Alert Optimization: Work closely with the engineering team to tune detection logic, reducing "noise" and improving True Positive rates.
- Forensics & Analysis: Conduct deep-dive analysis into malicious files, suspicious emails, and anomalous user behaviour.
- Stakeholder Communication: Provide clear, concise briefings to technical and non-technical leadership during high-priority incidents.
Your Technical Profile
We are looking for a candidate who is "curious by nature" and possesses:
- Experience: 3+ years in a dedicated SOC or Incident Response role.
- The "Data" Mindset: Strong understanding of Data Security Platforms (DSPM) or File Integrity Monitoring (FIM) is highly desirable.
- Technical Stack: Proficiency with modern SIEMs (e.g., Sentinel, Splunk) and EDR tools (e.g., CrowdStrike, SentinelOne).
- Networking & OS: Deep knowledge of TCP/IP, Active Directory, and Windows/Linux internals.
- Cloud Proficiency: Comfortable investigating incidents within AWS, Azure, or M365 environments.
- Certifications (Bonus): GCIH, GCIA, SC-200, or equivalent industry-recognized credentials.
Why Join This Team?
- Competitive Package: Up to £65k base plus a rewarding bonus structure.
- Advanced Tooling: You will have access to enterprise-grade, cutting-edge security proprietary tools that most analysts only dream of using.
- Growth Path: Clear progression into Senior SOC, Incident Response Lead, or Security Engineering.
Security Operations Analyst I employer: Intaso
Contact Detail:
Intaso Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Analyst I
✨Tip Number 1
Network like a pro! Reach out to current employees on LinkedIn or attend industry events. A friendly chat can give us insights into the company culture and maybe even a referral!
✨Tip Number 2
Show off your skills in real-time! Consider setting up a personal project or contributing to open-source security tools. This not only sharpens your skills but also gives us something tangible to discuss during interviews.
✨Tip Number 3
Prepare for those tricky interview questions! Brush up on your incident response scenarios and be ready to explain your thought process. We want to see how you tackle challenges, so practice makes perfect!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are genuinely interested in joining our team!
We think you need these skills to ace Security Operations Analyst I
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the job description. Highlight your experience in SOC or Incident Response roles, and don’t forget to mention any relevant certifications you have!
Craft a Compelling Cover Letter: Your cover letter is your chance to show us your personality and passion for security. Explain why you're excited about this role and how your 'curious by nature' mindset makes you a perfect fit for our team.
Showcase Your Technical Skills: Be specific about your technical proficiencies. Mention the SIEMs and EDR tools you’ve worked with, and give examples of how you've used them in past roles to tackle security incidents.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for this exciting opportunity!
How to prepare for a job interview at Intaso
✨Know Your Tools Inside Out
Make sure you’re familiar with the specific SIEM and EDR tools mentioned in the job description, like Sentinel and CrowdStrike. Brush up on how they work, their features, and any recent updates or trends in the industry.
✨Show Off Your Threat Hunting Skills
Prepare to discuss your experience with threat hunting and incident response. Have examples ready that showcase your ability to identify complex threats and how you’ve automated responses in previous roles.
✨Communicate Clearly
Since you'll need to brief both technical and non-technical stakeholders, practice explaining complex security concepts in simple terms. This will demonstrate your communication skills and your ability to work with diverse teams.
✨Be Curious and Ask Questions
During the interview, don’t hesitate to ask insightful questions about the company’s security operations and challenges they face. This shows your genuine interest in the role and your proactive mindset, which is crucial for a SOC Analyst.