At a Glance
- Tasks: Monitor and respond to security threats in Microsoft environments while collaborating with a dynamic team.
- Company: Fast-growing cyber security provider focused on managed detection and response services.
- Benefits: £40k salary, remote work, flexible hours, 25 days leave, and fully funded training.
- Other info: Great career progression opportunities and regular team socials.
- Why this job: Join a collaborative team and make a real impact in the exciting field of cyber security.
- Qualifications: 1-2 years in SOC, hands-on with Microsoft Defender XDR, and strong KQL knowledge.
The predicted salary is between 40000 - 40000 £ per year.
Join a fast-growing, specialist cyber security provider delivering managed detection and response services to a range of customers. We’re looking for a SOC Analyst to join a collaborative team focused on identifying and responding to threats across modern Microsoft environments.
This is a hands-on role where you’ll be actively monitoring, investigating, and responding to security activity while developing deeper expertise across the Microsoft security ecosystem. You’ll work closely with senior analysts and engineers, contributing to both operational response and continuous improvement of detection capabilities.
What You’ll Do- Monitor and triage security alerts across Microsoft Defender XDR and Sentinel, separating genuine threats from noise
- Investigate alerts end-to-end, driving incidents through to resolution
- Proactively hunt for threats, misconfigurations, and suspicious activity across customer environments
- Escalate high-priority incidents with clear, structured technical handovers
- Support onboarding of new customers onto security platforms, ensuring smooth transitions
- Document investigations, findings, and remediation steps to a high standard
- Collaborate with engineering teams on automation, integrations, and detection improvements
- Participate in an on-call rota (with full compensation)
- 1-2 years’ experience in a SOC or similar security operations role
- Must have hands-on experience with Microsoft Defender XDR and Microsoft Sentinel
- Strong working knowledge of Kusto Query Language (KQL)
- Ability to correlate data across multiple sources and build attack timelines (e.g. using MITRE ATT&CK)
- Clear communicator, able to present technical findings to both technical and non-technical audiences
- Comfortable working in a fast-paced, incident-driven environment
- Willingness to take part in an on-call rota
- Based within commuting distance of Manchester and eligible to work in the UK
- Willing to undergo BPSS clearance
- Microsoft security certifications (e.g. SC-900, SC-200)
- Experience in a 24/7 or shift-based SOC environment
- Exposure to threat intelligence tooling or additional EDR platforms
- Scripting experience (PowerShell, Python) for automation
- £40k
- Remote working with occasional trips to the Manchester office
- Flexible working hours
- 25 days annual leave + bank holidays
- Pension scheme
- Fully funded certifications and ongoing training (including cyber security and AI)
- Paid on-call rota
- Regular team socials
- Clear progression opportunities within a growing cyber security business
Security Operation Analyst in Manchester employer: Langham Recruitment
Contact Detail:
Langham Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operation Analyst in Manchester
✨Tip Number 1
Network like a pro! Reach out to current SOC Analysts or professionals in the cyber security field on LinkedIn. Ask them about their experiences and any tips they might have for landing a role like this. You never know who might have a lead on an opportunity!
✨Tip Number 2
Get hands-on with Microsoft Defender XDR and Sentinel if you haven't already. Set up a lab environment to practice your skills. The more familiar you are with these tools, the better you'll be able to showcase your expertise during interviews.
✨Tip Number 3
Prepare for technical interviews by brushing up on Kusto Query Language (KQL). Practice writing queries that could help in real-world scenarios. Being able to demonstrate your problem-solving skills will definitely impress potential employers.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for passionate individuals ready to join our team. Plus, it’s a great way to ensure your application gets the attention it deserves!
We think you need these skills to ace Security Operation Analyst in Manchester
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with Microsoft Defender XDR and Sentinel, and don’t forget to mention any relevant certifications or skills that match what we’re looking for.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cyber security and how your background makes you a great fit for our team. Keep it concise but impactful!
Showcase Your Technical Skills: We want to see your technical prowess! Include specific examples of how you've used Kusto Query Language (KQL) or investigated security incidents in your previous roles. This will help us understand your hands-on experience.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, we love seeing applications come directly from our site!
How to prepare for a job interview at Langham Recruitment
✨Know Your Tools
Make sure you’re familiar with Microsoft Defender XDR and Sentinel. Brush up on your Kusto Query Language (KQL) skills, as you'll likely be asked to demonstrate your ability to investigate alerts and correlate data during the interview.
✨Showcase Your Experience
Prepare to discuss your previous experience in a SOC or similar role. Be ready to share specific examples of how you've monitored security alerts, investigated incidents, and contributed to threat hunting. This will help the interviewers see how you can add value to their team.
✨Communicate Clearly
As a SOC Analyst, you’ll need to present technical findings to both technical and non-technical audiences. Practice explaining complex concepts in simple terms, so you can demonstrate your communication skills during the interview.
✨Be Ready for Scenario Questions
Expect scenario-based questions that test your problem-solving skills in a fast-paced environment. Think about how you would handle high-priority incidents or misconfigurations, and be prepared to walk the interviewers through your thought process.