At a Glance
- Tasks: Monitor and respond to security threats in a dynamic cyber environment.
- Company: Fast-growing specialist in managed cyber security services.
- Benefits: £40k salary, remote work, flexible hours, and 25 days leave.
- Other info: Opportunities for certifications, training, and career progression.
- Why this job: Join a collaborative team and enhance your skills in Microsoft security.
- Qualifications: 1-2 years in SOC, experience with Microsoft Defender XDR and KQL.
The predicted salary is between 40000 - 40000 £ per year.
Join a fast-growing, specialist cyber security provider delivering managed detection and response services to a range of customers. We’re looking for a SOC Analyst to join a collaborative team focused on identifying and responding to threats across modern Microsoft environments.
This is a hands-on role where you’ll be actively monitoring, investigating, and responding to security activity while developing deeper expertise across the Microsoft security ecosystem. You’ll work closely with senior analysts and engineers, contributing to both operational response and continuous improvement of detection capabilities.
What You’ll Do
- Monitor and triage security alerts across Microsoft Defender XDR and Sentinel, separating genuine threats from noise
- Investigate alerts end-to-end, driving incidents through to resolution
- Proactively hunt for threats, misconfigurations, and suspicious activity across customer environments
- Escalate high-priority incidents with clear, structured technical handovers
- Support onboarding of new customers onto security platforms, ensuring smooth transitions
- Document investigations, findings, and remediation steps to a high standard
- Collaborate with engineering teams on automation, integrations, and detection improvements
- Participate in an on-call rota (with full compensation)
What We’re Looking For
- 1-2 years’ experience in a SOC or similar security operations role
- Must have hands-on experience with Microsoft Defender XDR and Microsoft Sentinel
- Strong working knowledge of Kusto Query Language (KQL)
- Ability to correlate data across multiple sources and build attack timelines (e.g. using MITRE ATT&CK)
- Clear communicator, able to present technical findings to both technical and non-technical audiences
- Comfortable working in a fast-paced, incident-driven environment
- Willingness to take part in an on-call rota
- Based within commuting distance of Manchester and eligible to work in the UK
- Willing to undergo BPSS clearance
Nice to Have
- Microsoft security certifications (e.g. SC-900, SC-200)
- Experience in a 24/7 or shift-based SOC environment
- Exposure to threat intelligence tooling or additional EDR platforms
- Scripting experience (PowerShell, Python) for automation
Benefits
- £40k
- Remote working with occasional trips to the Manchester office
- Flexible working hours
- 25 days annual leave + bank holidays
- Pension scheme
- Fully funded certifications and ongoing training (including cyber security and AI)
- Paid on-call rota
- Regular team socials
- Clear progression opportunities within a growing cyber security business
Security Operations Analyst I in Manchester employer: Langham Recruitment
Contact Detail:
Langham Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Analyst I in Manchester
✨Tip Number 1
Network like a pro! Reach out to current SOC Analysts or professionals in the cyber security field on LinkedIn. Ask them about their experiences and any tips they might have for landing a role like this. You never know who might have a lead on an opportunity!
✨Tip Number 2
Get hands-on with Microsoft Defender XDR and Sentinel if you haven't already. Set up a lab environment to practice your skills. The more familiar you are with these tools, the better you'll be able to showcase your expertise during interviews.
✨Tip Number 3
Prepare for technical interviews by brushing up on Kusto Query Language (KQL). Practice writing queries that could help in real-world scenarios. Being able to demonstrate your problem-solving skills with KQL will definitely impress potential employers.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for passionate individuals ready to join our team. Plus, it’s a great way to ensure your application gets the attention it deserves!
We think you need these skills to ace Security Operations Analyst I in Manchester
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience, especially with Microsoft Defender XDR and Sentinel. We want to see how your skills match what we're looking for, so don’t be shy about showcasing your SOC experience!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how you can contribute to our team. Keep it concise but engaging – we love a good story!
Show Off Your Technical Skills: Don’t forget to mention your hands-on experience with Kusto Query Language (KQL) and any scripting skills you have. We’re keen on candidates who can dive into the technical details, so let us know what you can do!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates. Plus, we love seeing applications come in through our own channels!
How to prepare for a job interview at Langham Recruitment
✨Know Your Tools
Make sure you’re familiar with Microsoft Defender XDR and Sentinel. Brush up on your Kusto Query Language (KQL) skills, as you'll likely be asked to demonstrate your ability to investigate alerts and correlate data during the interview.
✨Showcase Your Experience
Prepare specific examples from your previous roles where you monitored security alerts or responded to incidents. Highlight any hands-on experience in a SOC environment and how you’ve contributed to improving detection capabilities.
✨Communicate Clearly
Practice explaining technical concepts in simple terms. You might need to present your findings to both technical and non-technical audiences, so being able to communicate effectively is key. Consider doing mock interviews with friends to refine this skill.
✨Demonstrate Proactivity
Be ready to discuss how you've proactively hunted for threats or misconfigurations in past roles. Employers love candidates who take initiative, so share any experiences where you went above and beyond to ensure security.