At a Glance
- Tasks: Monitor and respond to security threats in a dynamic cyber environment.
- Company: Fast-growing cyber security provider with a collaborative team culture.
- Benefits: £40k salary, remote work, flexible hours, and 25 days annual leave.
- Other info: Opportunities for certifications, training, and career progression in a thriving industry.
- Why this job: Join a team making a real impact in cyber security while developing your skills.
- Qualifications: 1-2 years in SOC, hands-on with Microsoft Defender XDR, and strong KQL knowledge.
The predicted salary is between 40000 - 40000 £ per year.
Join a fast-growing, specialist cyber security provider delivering managed detection and response services to a range of customers. We’re looking for a SOC Analyst to join a collaborative team focused on identifying and responding to threats across modern Microsoft environments. This is a hands-on role where you’ll be actively monitoring, investigating, and responding to security activity while developing deeper expertise across the Microsoft security ecosystem. You’ll work closely with senior analysts and engineers, contributing to both operational response and continuous improvement of detection capabilities.
What You’ll Do
- Monitor and triage security alerts across Microsoft Defender XDR and Sentinel, separating genuine threats from noise
- Investigate alerts end-to-end, driving incidents through to resolution
- Proactively hunt for threats, misconfigurations, and suspicious activity across customer environments
- Escalate high-priority incidents with clear, structured technical handovers
- Support onboarding of new customers onto security platforms, ensuring smooth transitions
- Document investigations, findings, and remediation steps to a high standard
- Collaborate with engineering teams on automation, integrations, and detection improvements
- Participate in an on-call rota (with full compensation)
What We’re Looking For
- 1–2 years’ experience in a SOC or similar security operations role
- Must have hands-on experience with Microsoft Defender XDR and Microsoft Sentinel
- Strong working knowledge of Kusto Query Language (KQL)
- Ability to correlate data across multiple sources and build attack timelines (e.g. using MITRE ATT&CK)
- Clear communicator, able to present technical findings to both technical and non-technical audiences
- Comfortable working in a fast-paced, incident-driven environment
- Willingness to take part in an on-call rota
- Based within commuting distance of Manchester and eligible to work in the UK
- Willing to undergo BPSS clearance
Nice to Have
- Microsoft security certifications (e.g. SC-900, SC-200)
- Experience in a 24/7 or shift-based SOC environment
- Exposure to threat intelligence tooling or additional EDR platforms
- Scripting experience (PowerShell, Python) for automation
Benefits
- £40k
- Remote working with occasional trips to the Manchester office
- Flexible working hours
- 25 days annual leave + bank holidays
- Pension scheme
- Fully funded certifications and ongoing training (including cyber security and AI)
- Paid on-call rota
- Regular team socials
- Clear progression opportunities within a growing cyber security business
Security Operations Center Analyst in Manchester employer: Langham Recruitment
Contact Detail:
Langham Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Center Analyst in Manchester
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field, especially those working as SOC Analysts. Use platforms like LinkedIn to connect and engage with them. You never know who might have the inside scoop on job openings or can refer you directly!
✨Tip Number 2
Get your hands dirty with practical experience. If you haven't already, try setting up a home lab to play around with Microsoft Defender XDR and Sentinel. This will not only boost your skills but also give you some solid talking points during interviews.
✨Tip Number 3
Prepare for those technical interviews! Brush up on Kusto Query Language (KQL) and be ready to demonstrate your ability to correlate data and build attack timelines. Practising common interview questions can really help you stand out.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for passionate SOC Analysts. Plus, applying directly shows your enthusiasm and commitment to joining our team. Let’s get you on board!
We think you need these skills to ace Security Operations Center Analyst in Manchester
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with Microsoft Defender XDR and Sentinel, and don’t forget to mention any relevant certifications or skills that match what we’re looking for.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cyber security and how your background makes you a great fit for our team. Keep it concise but impactful!
Showcase Your Technical Skills: We want to see your technical prowess! Include specific examples of how you've used Kusto Query Language (KQL) or tackled security incidents in previous roles. This will help us understand your hands-on experience.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. We can’t wait to see what you bring to the table!
How to prepare for a job interview at Langham Recruitment
✨Know Your Tools
Make sure you’re familiar with Microsoft Defender XDR and Sentinel. Brush up on how they work, their features, and any recent updates. Being able to discuss your hands-on experience with these tools will show that you’re ready to hit the ground running.
✨Master KQL
Since Kusto Query Language (KQL) is a key part of the role, practice writing queries ahead of time. Prepare some examples of how you've used KQL in past roles to investigate alerts or correlate data. This will demonstrate your technical skills and problem-solving abilities.
✨Communicate Clearly
You’ll need to present technical findings to both technical and non-technical audiences. Practice explaining complex concepts in simple terms. Think about how you can convey your past experiences in a way that’s easy to understand for everyone.
✨Show Your Proactivity
Be ready to discuss times when you’ve proactively hunted for threats or improved detection capabilities. Share specific examples of how you’ve contributed to incident resolution or enhanced security measures in previous roles. This will highlight your initiative and commitment to continuous improvement.