At a Glance
- Tasks: Monitor and investigate live cyber incidents using industry-leading tools.
- Company: Join a modern, analyst-led Security Operations Centre with a collaborative culture.
- Benefits: Enjoy a competitive salary, strong benefits, and structured training opportunities.
- Why this job: Accelerate your SOC career while working remotely and making a real impact.
- Qualifications: 1+ year SOC experience or 3+ years in infra/networking with security exposure.
- Other info: Flexible shifts with clear progression into senior roles and hands-on training.
The predicted salary is between 36000 - 60000 £ per year.
REMOTE 24/7 SOC Analyst | UK-Based
Frontline cyber defence. Real incidents. Real progression.
This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You will be hands-on with live incidents, real attackers, and industry-leading tools — not just alert watching.
What you will be doing:
- Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
- Analysing attacker behaviour & building incident timelines
- Escalating incidents with clear technical context
- Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
- Contributing to threat hunting, detection improvements & SOC evolution
What we are looking for:
- 1+ year SOC experience or 3+ years infra/networking with security exposure
- Experience investigating alerts & understanding attack chains
- Strong log analysis & endpoint/network fundamentals
- Familiarity with Windows, Linux & macOS
- Curious, analytical mindset with a genuine interest in cyber defence (Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern:
12-hour shifts: 2 days / 2 nights / 4 off. Flexibility required during major incidents.
Clearance:
SC clearance eligibility required (DV advantageous).
Why join?
- Fully remote role (UK-based)
- Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
- Structured training, cyber ranges & real investigation exposure
- Collaborative, technical SOC culture
- Competitive salary + strong benefits
Interested? Apply now or message me for a confidential chat.
24/7 SOC Analyst in Newcastle upon Tyne employer: IP People Ltd
Contact Detail:
IP People Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land 24/7 SOC Analyst in Newcastle upon Tyne
✨Tip Number 1
Network like a pro! Reach out to current SOC Analysts or professionals in the cyber defence field on LinkedIn. Ask them about their experiences and any tips they might have for landing a role like this. You never know who might have a lead or insight that could help us!
✨Tip Number 2
Get hands-on with the tools mentioned in the job description. If you can, set up a lab environment to play around with Microsoft Sentinel or CrowdStrike. Showing that you’ve taken the initiative to learn these tools can really make us stand out during interviews.
✨Tip Number 3
Prepare for technical interviews by brushing up on your log analysis and incident response skills. Practice explaining your thought process when investigating alerts. We want to demonstrate our analytical mindset and how we approach real incidents.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows that you’re genuinely interested in joining our team and contributing to the SOC evolution.
We think you need these skills to ace 24/7 SOC Analyst in Newcastle upon Tyne
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your relevant experience, especially any hands-on work with SIEM, EDR, or XDR tools. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber defence and how your background makes you a great fit for our team. Keep it concise but impactful!
Showcase Your Skills: Don’t just list your skills; demonstrate them! If you've worked with tools like Microsoft Sentinel or CrowdStrike, mention specific projects or incidents where you used them. We love seeing real-world applications of your expertise.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re serious about joining our team!
How to prepare for a job interview at IP People Ltd
✨Know Your Tools
Familiarise yourself with the tools mentioned in the job description, like Microsoft Sentinel and CrowdStrike. Being able to discuss your experience with these tools or similar ones will show that you're ready to hit the ground running.
✨Understand Attack Chains
Brush up on your knowledge of attack chains and how incidents unfold. Be prepared to explain how you would analyse alerts and build incident timelines. This shows your analytical mindset and genuine interest in cyber defence.
✨Showcase Your Experience
Whether you have SOC experience or a strong background in infrastructure/networking, be ready to share specific examples of how you've investigated alerts or contributed to threat hunting. Real-life scenarios can make your answers stand out.
✨Be Ready for Shift Patterns
Since this role involves 12-hour shifts, demonstrate your flexibility and willingness to adapt during major incidents. Discuss any previous experiences where you had to adjust your schedule or work under pressure.