At a Glance
- Tasks: Monitor and respond to security threats in Microsoft environments while developing your skills.
- Company: Fast-growing cyber security provider with a collaborative team culture.
- Benefits: £40k salary, remote work, flexible hours, and fully funded training.
- Other info: Great career progression and regular team socials.
- Why this job: Join a dynamic team and make a real impact in cyber security.
- Qualifications: 1-2 years in SOC or similar role, experience with Microsoft Defender XDR.
The predicted salary is between 40000 - 40000 € per year.
Join a fast-growing, specialist cyber security provider delivering managed detection and response services to a range of customers. We’re looking for a SOC Analyst to join a collaborative team focused on identifying and responding to threats across modern Microsoft environments. This is a hands-on role where you’ll be actively monitoring, investigating, and responding to security activity while developing deeper expertise across the Microsoft security ecosystem. You’ll work closely with senior analysts and engineers, contributing to both operational response and continuous improvement of detection capabilities.
What You’ll Do
- Monitor and triage security alerts across Microsoft Defender XDR and Sentinel, separating genuine threats from noise
- Investigate alerts end-to-end, driving incidents through to resolution
- Proactively hunt for threats, misconfigurations, and suspicious activity across customer environments
- Escalate high-priority incidents with clear, structured technical handovers
- Support onboarding of new customers onto security platforms, ensuring smooth transitions
- Document investigations, findings, and remediation steps to a high standard
- Collaborate with engineering teams on automation, integrations, and detection improvements
- Participate in an on-call rota (with full compensation)
What We’re Looking For
- 1–2 years’ experience in a SOC or similar security operations role
- Must have hands-on experience with Microsoft Defender XDR and Microsoft Sentinel
- Strong working knowledge of Kusto Query Language (KQL)
- Ability to correlate data across multiple sources and build attack timelines (e.g. using MITRE ATT&CK)
- Clear communicator, able to present technical findings to both technical and non-technical audiences
- Comfortable working in a fast-paced, incident-driven environment
- Willingness to take part in an on-call rota
- Based within commuting distance of Manchester and eligible to work in the UK
- Willing to undergo BPSS clearance
Nice to Have
- Microsoft security certifications (e.g. SC-900, SC-200)
- Experience in a 24/7 or shift-based SOC environment
- Exposure to threat intelligence tooling or additional EDR platforms
- Scripting experience (PowerShell, Python) for automation
Benefits
- £40k
- Remote working with occasional trips to the Manchester office
- Flexible working hours
- 25 days annual leave + bank holidays
- Pension scheme
- Fully funded certifications and ongoing training (including cyber security and AI)
- Paid on-call rota
- Regular team socials
- Clear progression opportunities within a growing cyber security business
Security Operations Center Analyst employer: Langham Recruitment
Join a dynamic and rapidly expanding cyber security provider that prioritises employee growth and collaboration. With a strong focus on professional development, including fully funded certifications and ongoing training, you will thrive in a supportive work culture that values flexibility and work-life balance. Located in Manchester, with the option for remote work, this role offers a unique opportunity to engage in meaningful work while enjoying regular team socials and clear pathways for career advancement.
StudySmarter Expert Advice🤫
We think this is how you could land Security Operations Center Analyst
✨Tip Number 1
Network like a pro! Reach out to current SOC Analysts or professionals in the cyber security field on LinkedIn. Ask them about their experiences and any tips they might have for landing a role like this. You never know who might have a lead on an opportunity!
✨Tip Number 2
Get hands-on with Microsoft Defender XDR and Sentinel if you haven't already. Set up a lab environment to practice your skills. The more familiar you are with these tools, the better you'll be able to showcase your expertise during interviews.
✨Tip Number 3
Prepare for technical interviews by brushing up on Kusto Query Language (KQL). Practice writing queries that could help in real-world scenarios. Being able to demonstrate your problem-solving skills will definitely impress potential employers.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for passionate individuals to join our team. Plus, it’s a great way to ensure your application gets seen by the right people.
We think you need these skills to ace Security Operations Center Analyst
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with Microsoft Defender XDR and Sentinel, and don’t forget to mention any relevant certifications or skills that match what we’re looking for.
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you’re passionate about cyber security and how your background makes you a great fit for our team. Keep it concise but impactful!
Show Off Your Communication Skills:As a SOC Analyst, clear communication is key. In your application, demonstrate your ability to present technical findings in an understandable way. This will show us you can bridge the gap between tech and non-tech audiences.
Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy!
How to prepare for a job interview at Langham Recruitment
✨Know Your Tools
Make sure you’re familiar with Microsoft Defender XDR and Sentinel. Brush up on your Kusto Query Language (KQL) skills, as you'll likely be asked to demonstrate your ability to investigate alerts and correlate data during the interview.
✨Showcase Your Experience
Prepare specific examples from your previous roles where you monitored security alerts or responded to incidents. Highlight any hands-on experience in a SOC environment and how you contributed to resolving threats or improving detection capabilities.
✨Communicate Clearly
Practice explaining technical concepts in simple terms. You might need to present your findings to both technical and non-technical audiences, so being able to communicate effectively is key. Consider doing mock interviews with friends to refine this skill.
✨Be Ready for Scenario Questions
Expect scenario-based questions that test your problem-solving skills in a fast-paced environment. Think about how you would handle high-priority incidents or misconfigurations, and be prepared to discuss your thought process and decision-making.