Security Operations Analyst I
Security Operations Analyst I

Security Operations Analyst I

Full-Time 65000 - 65000 £ / year (est.) Home office possible
I

At a Glance

  • Tasks: Lead incident response and hunt for threats in a dynamic security environment.
  • Company: Global leader in Data Security and Insider Risk with a focus on innovation.
  • Benefits: Competitive salary up to £65k, performance bonus, and advanced security tools.
  • Other info: Clear career progression into senior roles and access to cutting-edge technology.
  • Why this job: Join a sophisticated team and make a real impact on data security.
  • Qualifications: 3+ years in SOC or Incident Response, strong data security knowledge.

The predicted salary is between 65000 - 65000 £ per year.

Location: Fully Remote (UK Based)

Salary: Up to £65,000 + Performance Bonus + Benefits

Employment Type: Full-Time

The Opportunity

We are representing a global leader in Data Security and Insider Risk to find a high-calibre SOC Analyst to join their internal security operations. This isn't your typical "ticket-churning" MSP role. You will be part of a sophisticated, data-centric security team focused on protecting critical infrastructure and high-value data assets.

If you are a security professional who loves hunting through logs, identifying complex lateral movement, and automating responses rather than just staring at a dashboard—this is for you.

Key Responsibilities

  • Incident Response: Lead the detection, triage, and remediation of security events across cloud, on-prem, and hybrid environments.
  • Threat Hunting: Proactively search for undetected threats using SIEM, EDR, and specialized Data Security Platforms.
  • Alert Optimization: Work closely with the engineering team to tune detection logic, reducing "noise" and improving True Positive rates.
  • Forensics & Analysis: Conduct deep-dive analysis into malicious files, suspicious emails, and anomalous user behaviour.
  • Stakeholder Communication: Provide clear, concise briefings to technical and non-technical leadership during high-priority incidents.

Your Technical Profile

We are looking for a candidate who is "curious by nature" and possesses:

  • Experience: 3+ years in a dedicated SOC or Incident Response role.
  • The "Data" Mindset: Strong understanding of Data Security Platforms (DSPM) or File Integrity Monitoring (FIM) is highly desirable.
  • Technical Stack: Proficiency with modern SIEMs (e.g., Sentinel, Splunk) and EDR tools (e.g., CrowdStrike, SentinelOne).
  • Networking & OS: Deep knowledge of TCP/IP, Active Directory, and Windows/Linux internals.
  • Cloud Proficiency: Comfortable investigating incidents within AWS, Azure, or M365 environments.
  • Certifications (Bonus): GCIH, GCIA, SC-200, or equivalent industry-recognized credentials.

Why Join This Team?

  • Competitive Package: Up to £65k base plus a rewarding bonus structure.
  • Advanced Tooling: You will have access to enterprise-grade, cutting-edge security proprietary tools that most analysts only dream of using.
  • Growth Path: Clear progression into Senior SOC, Incident Response Lead, or Security Engineering.

Security Operations Analyst I employer: Intaso

Join a leading global player in Data Security and Insider Risk, where you will be part of a dynamic and innovative security operations team. Enjoy a competitive salary of up to £65,000, along with performance bonuses and access to advanced security tools that empower your professional growth. With a fully remote work environment in the UK, we foster a culture of curiosity and collaboration, providing clear pathways for career advancement into senior roles within the organisation.
I

Contact Detail:

Intaso Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Security Operations Analyst I

✨Tip Number 1

Network like a pro! Reach out to current employees on LinkedIn or attend industry events. A friendly chat can give us insights into the company culture and maybe even a referral!

✨Tip Number 2

Show off your skills in real-time! Consider setting up a personal project or contributing to open-source security tools. This not only sharpens your skills but also gives us something tangible to discuss during interviews.

✨Tip Number 3

Prepare for those tricky interview questions! Brush up on your incident response scenarios and be ready to explain your thought process. We want to see how you tackle challenges, so practice makes perfect!

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are genuinely interested in joining our team!

We think you need these skills to ace Security Operations Analyst I

Incident Response
Threat Hunting
SIEM
EDR
Data Security Platforms
Forensics & Analysis
Stakeholder Communication
TCP/IP
Active Directory
Windows Internals
Linux Internals
AWS
Azure
M365
Certifications (GCIH, GCIA, SC-200)

Some tips for your application 🫡

Tailor Your CV: Make sure your CV reflects the skills and experiences that match the job description. Highlight your experience in SOC or Incident Response roles, and don’t forget to mention any relevant certifications you have!

Craft a Compelling Cover Letter: Your cover letter is your chance to show us your personality and passion for security. Explain why you're excited about this role and how your 'curious by nature' mindset makes you a perfect fit for our team.

Showcase Your Technical Skills: Be specific about your technical proficiencies. Mention the SIEMs and EDR tools you’ve worked with, and give examples of how you've used them in past roles to tackle security incidents.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for this exciting opportunity!

How to prepare for a job interview at Intaso

✨Know Your Tools Inside Out

Make sure you’re familiar with the specific SIEM and EDR tools mentioned in the job description, like Sentinel and CrowdStrike. Brush up on how they work, their features, and any recent updates or trends in the industry.

✨Show Off Your Threat Hunting Skills

Prepare to discuss your experience with threat hunting and incident response. Have examples ready that showcase your ability to identify complex threats and how you’ve automated responses in previous roles.

✨Communicate Clearly

Since you'll need to brief both technical and non-technical stakeholders, practice explaining complex security concepts in simple terms. This will demonstrate your communication skills and your ability to work with diverse teams.

✨Be Curious and Ask Questions

During the interview, don’t hesitate to ask insightful questions about the company’s security operations and challenges they face. This shows your genuine interest in the role and your proactive mindset, which is crucial for a SOC Analyst.

Security Operations Analyst I
Intaso

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>