At a Glance
- Tasks: Monitor and investigate live cyber incidents using industry-leading tools.
- Company: Join a modern, analyst-led Security Operations Centre with a collaborative culture.
- Benefits: Enjoy a competitive salary, strong benefits, and structured training opportunities.
- Why this job: Accelerate your SOC career while working remotely and making a real impact.
- Qualifications: 1+ year SOC experience or 3+ years in infra/networking with security exposure.
- Other info: Clear progression paths into senior roles and hands-on investigation experience.
The predicted salary is between 36000 - 60000 £ per year.
REMOTE 24/7 SOC Analyst | UK-Based
Frontline cyber defence. Real incidents. Real progression.
This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You’ll be hands-on with live incidents, real attackers, and industry-leading tools — not just alert watching.
What you’ll be doing:
- Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
- Analysing attacker behaviour & building incident timelines
- Escalating incidents with clear technical context
- Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
- Contributing to threat hunting, detection improvements & SOC evolution
What we’re looking for:
- 1+ year SOC experience or 3+ years infra/networking with security exposure
- Experience investigating alerts & understanding attack chains
- Strong log analysis & endpoint/network fundamentals
- Familiarity with Windows, Linux & macOS
- Curious, analytical mindset with a genuine interest in cyber defence (Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern:
12-hour shifts: 2 days / 2 nights / 4 off. Flexibility required during major incidents.
Clearance:
SC clearance eligibility required (DV advantageous).
Why join?
- Fully remote role (UK-based)
- Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
- Structured training, cyber ranges & real investigation exposure
- Collaborative, technical SOC culture
- Competitive salary + strong benefits
Interested? Apply now or message me for a confidential chat.
24/7 SOC Analyst in Gloucester employer: IP People Ltd
Contact Detail:
IP People Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land 24/7 SOC Analyst in Gloucester
✨Tip Number 1
Network like a pro! Reach out to current SOC Analysts or professionals in the cyber defence field on LinkedIn. A friendly chat can give us insights into the role and might even lead to a referral.
✨Tip Number 2
Show off your skills! During interviews, be ready to discuss specific incidents you've handled or tools you've used. We want to hear about your hands-on experience with SIEM, EDR, or any other relevant tech.
✨Tip Number 3
Stay curious! Keep up with the latest trends in cyber security and be prepared to discuss them. This shows your genuine interest in the field and helps us see you as a proactive candidate.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step to connect directly with us.
We think you need these skills to ace 24/7 SOC Analyst in Gloucester
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your relevant experience, especially any hands-on work with SIEM, EDR, or XDR tools. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber defence and how your background makes you a great fit for our team. Keep it concise but impactful!
Showcase Your Skills: Don’t just list your skills; demonstrate them! If you've worked with Microsoft Sentinel or CrowdStrike, mention specific projects or incidents where you used these tools. We love seeing real-world applications of your expertise.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re serious about joining our team!
How to prepare for a job interview at IP People Ltd
✨Know Your Tools
Familiarise yourself with the tools mentioned in the job description, like Microsoft Sentinel and CrowdStrike. Being able to discuss your experience with these tools or similar ones will show that you're ready to hit the ground running.
✨Understand Attack Chains
Brush up on your knowledge of attack chains and how to analyse them. Be prepared to discuss how you've investigated alerts in the past and what steps you took to understand the attacker’s behaviour.
✨Show Your Curiosity
Demonstrate your analytical mindset by discussing recent incidents or trends in cyber defence that interest you. This shows that you’re not just looking for a job, but are genuinely passionate about the field.
✨Prepare for Scenario Questions
Expect scenario-based questions where you might need to triage an alert or explain how you would handle a specific incident. Practising these scenarios can help you articulate your thought process clearly during the interview.