At a Glance
- Tasks: Monitor and investigate live cyber incidents using industry-leading tools.
- Company: Join a modern, analyst-led Security Operations Centre with a collaborative culture.
- Benefits: Enjoy a competitive salary, strong benefits, and structured training opportunities.
- Why this job: Accelerate your SOC career while working remotely and making a real impact.
- Qualifications: 1+ year SOC experience or 3+ years in infra/networking with security exposure.
- Other info: Clear progression paths into senior roles and hands-on investigation experience.
The predicted salary is between 36000 - 60000 £ per year.
REMOTE 24/7 SOC Analyst | UK-Based
Frontline cyber defence. Real incidents. Real progression.
This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You’ll be hands-on with live incidents, real attackers, and industry-leading tools — not just alert watching.
What you’ll be doing:
- Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
- Analysing attacker behaviour & building incident timelines
- Escalating incidents with clear technical context
- Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
- Contributing to threat hunting, detection improvements & SOC evolution
What we’re looking for:
- 1+ year SOC experience or 3+ years infra/networking with security exposure
- Experience investigating alerts & understanding attack chains
- Strong log analysis & endpoint/network fundamentals
- Familiarity with Windows, Linux & macOS
- Curious, analytical mindset with a genuine interest in cyber defence (Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern:
12-hour shifts: 2 days / 2 nights / 4 off. Flexibility required during major incidents.
Clearance:
SC clearance eligibility required (DV advantageous).
Why join?
- Fully remote role (UK-based)
- Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
- Structured training, cyber ranges & real investigation exposure
- Collaborative, technical SOC culture
- Competitive salary + strong benefits
Interested? Apply now or message me for a confidential chat.
24/7 SOC Analyst in York employer: IP People Ltd
Contact Detail:
IP People Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land 24/7 SOC Analyst in York
✨Tip Number 1
Network like a pro! Reach out to current SOC Analysts or professionals in the cyber defence field on LinkedIn. Ask them about their experiences and any tips they might have for landing a role like this. You never know who might have a lead or insight that could help us!
✨Tip Number 2
Get hands-on with the tools mentioned in the job description. If you haven't already, try out Microsoft Sentinel or CrowdStrike in a lab environment. Showing that you’ve played around with these tools can really set us apart from other candidates.
✨Tip Number 3
Prepare for the interview by brushing up on your incident response scenarios. Be ready to discuss how you would handle specific alerts or incidents. We want to see your analytical mindset in action, so practice articulating your thought process clearly.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining our team and being part of the SOC culture we’re building.
We think you need these skills to ace 24/7 SOC Analyst in York
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your relevant experience, especially any hands-on work with SIEM, EDR, or XDR tools. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber defence and how your background makes you a great fit for our team. Keep it concise but impactful!
Showcase Your Skills: Don’t just list your skills; demonstrate them! If you've worked with Microsoft Sentinel or CrowdStrike, mention specific projects or incidents where you used these tools. We love seeing real-world applications of your expertise.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re serious about joining our team!
How to prepare for a job interview at IP People Ltd
✨Know Your Tools
Familiarise yourself with the tools mentioned in the job description, like Microsoft Sentinel and CrowdStrike. Being able to discuss your experience with these tools or similar ones will show that you're ready to hit the ground running.
✨Understand Attack Chains
Brush up on your knowledge of attack chains and how to analyse them. Be prepared to discuss how you've investigated alerts in the past and what steps you took to understand the attacker’s behaviour.
✨Show Your Curiosity
Demonstrate your analytical mindset by discussing recent trends in cyber defence or incidents you've followed. This shows your genuine interest in the field and your commitment to staying updated.
✨Prepare for Scenario Questions
Expect scenario-based questions where you'll need to triage an alert or explain how you'd handle a specific incident. Practising these scenarios can help you articulate your thought process clearly during the interview.