At a Glance
- Tasks: Investigate security alerts and incidents, using Microsoft Sentinel and KQL for analysis.
- Company: Join a rapidly growing MSSP in Manchester, focused on enhancing cybersecurity.
- Benefits: Enjoy hybrid working, clear progression opportunities, and investment in training.
- Why this job: Be part of a supportive SOC team making a real impact in cybersecurity.
- Qualifications: Experience with Microsoft Sentinel and KQL is essential; familiarity with attack techniques is a plus.
- Other info: Interviews are happening soon, so apply quickly to secure your chance!
The predicted salary is between 21600 - 36000 £ per year.
Threat Analyst / SOC / Microsoft Sentinel / KQL / SIEM
Threat Analyst / SOC / Microsoft Sentinel / KQL / SIEM
Threat Analyst – Manchester/Hybrid – £30K
Maxwell Bond have engaged with an MSSP in the Manchester area that’re looking for a Threat Analyst to join their team. We’re looking for somebody that has recent experience with Microsoft Sentinel (1-2 years) and KQL skills. The company are growing and hiring at a quick rate, really exciting time to join them as they expand.
You will be in the Manchester based office ideally once per week, sometimes maybe once every two weeks.
What you’ll be doing:
- Investigating and responding to security alerts and incidents escalated by the L1 team
- Using Microsoft Sentinel as your primary SIEM platform, leveraging KQL to hunt, analyse, and improve detection
- Tuning Sentinel rules, creating workbooks and queries to enhance visibility and reduce false positives
- Working with clients across different sectors, helping them understand threats and improve their security posture
- Collaborating with Threat Intelligence and Engineering teams to strengthen detection and response capabilities
What we’re looking for:
- Solid experience working with Microsoft Sentinel in a live SOC environment
- Strong knowledge and hands-on ability with KQL (Kusto Query Language)
- Understanding of attack techniques (MITRE ATT&CK, etc.) and incident response workflows
- Comfortable working across different client environments and adapting to varied threat landscapes
- Previous experience in an MSSP or managed services environment is an advantage
Job details:
- Salary up to £30,000
- Hybrid working – 3 days a week in the Manchester office
- Clear progression opportunities and exposure to a wide range of threat landscapes
- Work as part of a supportive, growing SOC team with real investment in tooling and training
- If you\’re ready to take the next step in your threat analysis career and want to be part of a team that makes a real difference, apply now.
We’re expecting a large amount of interest in this role with interviews taking place towards the end of the week, please apply now to be considered or alternatively contact Dan Rowland at Maxwell Bond on 0161 840 1021 or
Threat Analyst / SOC / Microsoft Sentinel / KQL / SIEM
Threat Analyst / SOC / Microsoft Sentinel / KQL / SIEM
#J-18808-Ljbffr
Threat Analyst employer: Maxwell Bond
Contact Detail:
Maxwell Bond Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Threat Analyst
✨Tip Number 1
Familiarise yourself with Microsoft Sentinel and KQL by exploring online resources or tutorials. This will not only boost your confidence but also demonstrate your proactive approach to learning during interviews.
✨Tip Number 2
Engage with the cybersecurity community through forums or social media platforms. Networking can provide insights into the latest trends and challenges in threat analysis, which you can discuss in your interviews.
✨Tip Number 3
Prepare to discuss real-world scenarios where you've used Microsoft Sentinel or KQL. Having specific examples ready will show your practical experience and problem-solving skills to potential employers.
✨Tip Number 4
Research the company’s recent projects or initiatives related to threat analysis. Being knowledgeable about their work will help you tailor your responses and show genuine interest during the interview process.
We think you need these skills to ace Threat Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with Microsoft Sentinel and KQL. Include specific examples of how you've used these tools in a live SOC environment, as this is crucial for the role.
Craft a Compelling Cover Letter: In your cover letter, express your enthusiasm for the position and the company. Mention your understanding of attack techniques and incident response workflows, and how you can contribute to their team.
Showcase Relevant Skills: Clearly outline your skills related to threat analysis, including your ability to tune Sentinel rules and create workbooks. Use bullet points for clarity and impact.
Research the Company: Familiarise yourself with the MSSP's operations and their approach to security. This will help you tailor your application and prepare for potential interview questions about their clients and threat landscapes.
How to prepare for a job interview at Maxwell Bond
✨Showcase Your Microsoft Sentinel Experience
Make sure to highlight your hands-on experience with Microsoft Sentinel during the interview. Be prepared to discuss specific instances where you've used it in a live SOC environment, as this will demonstrate your practical knowledge and ability to contribute from day one.
✨Demonstrate KQL Proficiency
Since strong KQL skills are essential for this role, be ready to explain how you've utilised Kusto Query Language in your previous work. You might even want to prepare a few examples of queries you've written or challenges you've overcome using KQL.
✨Understand Threat Landscapes
Familiarise yourself with various attack techniques, especially those outlined in the MITRE ATT&CK framework. Being able to discuss these techniques and how they relate to incident response workflows will show that you have a solid understanding of the threats you'll be facing.
✨Prepare for Client Interaction Scenarios
As the role involves working with clients across different sectors, think about how you would communicate complex security concepts to non-technical stakeholders. Prepare examples of how you've successfully collaborated with clients in the past to enhance their security posture.