At a Glance
- Tasks: Monitor and investigate live cyber incidents using industry-leading tools.
- Company: Join a modern, analyst-led Security Operations Centre with a collaborative culture.
- Benefits: Enjoy a competitive salary, strong benefits, and structured training opportunities.
- Why this job: Accelerate your SOC career while working remotely and making a real impact.
- Qualifications: 1+ year SOC experience or 3+ years in infra/networking with security exposure.
- Other info: Clear progression paths into senior roles and hands-on investigation experience.
The predicted salary is between 36000 - 60000 £ per year.
REMOTE 24/7 SOC Analyst | UK-Based
Frontline cyber defence. Real incidents. Real progression.
This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You’ll be hands-on with live incidents, real attackers, and industry-leading tools — not just alert watching.
What you’ll be doing:
- Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
- Analysing attacker behaviour & building incident timelines
- Escalating incidents with clear technical context
- Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
- Contributing to threat hunting, detection improvements & SOC evolution
What we’re looking for:
- 1+ year SOC experience or 3+ years infra/networking with security exposure
- Experience investigating alerts & understanding attack chains
- Strong log analysis & endpoint/network fundamentals
- Familiarity with Windows, Linux & macOS
- Curious, analytical mindset with a genuine interest in cyber defence (Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern:
12-hour shifts: 2 days / 2 nights / 4 off. Flexibility required during major incidents.
Clearance:
SC clearance eligibility required (DV advantageous).
Why join?
- Fully remote role (UK-based)
- Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
- Structured training, cyber ranges & real investigation exposure
- Collaborative, technical SOC culture
- Competitive salary + strong benefits
Interested? Apply now or message me for a confidential chat.
24/7 SOC Analyst in Stockport employer: IP People Ltd
Contact Detail:
IP People Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land 24/7 SOC Analyst in Stockport
✨Tip Number 1
Network like a pro! Reach out to current SOC Analysts or professionals in the cyber defence field on LinkedIn. A friendly chat can give us insights into the role and might even lead to a referral.
✨Tip Number 2
Show off your skills! During interviews, be ready to discuss specific incidents you've handled or tools you've used. We want to hear about your hands-on experience with SIEM, EDR, or any other relevant tech.
✨Tip Number 3
Stay curious! Keep up with the latest trends in cyber security and be prepared to discuss them. This shows your genuine interest in the field and helps us see you as a proactive candidate.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step to connect directly with us.
We think you need these skills to ace 24/7 SOC Analyst in Stockport
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your relevant SOC experience and skills. We want to see how your background aligns with the role, so don’t be shy about showcasing your achievements in monitoring, triaging, and investigating alerts.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to express your genuine interest in cyber defence and how you can contribute to our team. We love seeing enthusiasm and a clear understanding of the role.
Showcase Your Technical Skills: Mention any tools you’ve used like Microsoft Sentinel or CrowdStrike. If you have experience with log analysis or understanding attack chains, make sure to highlight that. We’re looking for candidates who are hands-on and ready to tackle real incidents!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy and straightforward!
How to prepare for a job interview at IP People Ltd
✨Know Your Tools
Familiarise yourself with the tools mentioned in the job description, like Microsoft Sentinel and CrowdStrike. Being able to discuss your experience with these tools or similar ones will show that you're ready to hit the ground running.
✨Understand Attack Chains
Brush up on your knowledge of attack chains and how to analyse them. Be prepared to discuss how you've investigated alerts in the past and what steps you took to understand the attacker’s behaviour.
✨Show Your Curiosity
Demonstrate your analytical mindset by discussing recent incidents or trends in cyber defence that interest you. This shows that you’re not just looking for a job, but are genuinely passionate about the field.
✨Prepare for Scenario Questions
Expect scenario-based questions where you might need to triage an alert or explain how you would handle a specific incident. Practising these scenarios can help you articulate your thought process clearly during the interview.