Threat Analyst

Threat Analyst

Manchester Full-Time 21600 - 36000 £ / year (est.) No home office possible
M

At a Glance

  • Tasks: Investigate security alerts and incidents, using Microsoft Sentinel and KQL for analysis.
  • Company: Join a rapidly growing MSSP in Manchester, focused on enhancing cybersecurity.
  • Benefits: Enjoy hybrid working, clear progression opportunities, and investment in training.
  • Why this job: Be part of a supportive SOC team making a real impact in cybersecurity.
  • Qualifications: Experience with Microsoft Sentinel and KQL is essential; familiarity with attack techniques is a plus.
  • Other info: Interviews are happening soon, so apply quickly to secure your chance!

The predicted salary is between 21600 - 36000 £ per year.

Threat Analyst / SOC / Microsoft Sentinel / KQL / SIEM
Threat Analyst / SOC / Microsoft Sentinel / KQL / SIEM
Threat Analyst – Manchester/Hybrid – £30K
Maxwell Bond have engaged with an MSSP in the Manchester area that’re looking for a Threat Analyst to join their team. We’re looking for somebody that has recent experience with Microsoft Sentinel (1-2 years) and KQL skills. The company are growing and hiring at a quick rate, really exciting time to join them as they expand.
You will be in the Manchester based office ideally once per week, sometimes maybe once every two weeks.
What you’ll be doing:

  • Investigating and responding to security alerts and incidents escalated by the L1 team
  • Using Microsoft Sentinel as your primary SIEM platform, leveraging KQL to hunt, analyse, and improve detection
  • Tuning Sentinel rules, creating workbooks and queries to enhance visibility and reduce false positives
  • Working with clients across different sectors, helping them understand threats and improve their security posture
  • Collaborating with Threat Intelligence and Engineering teams to strengthen detection and response capabilities

What we’re looking for:

  • Solid experience working with Microsoft Sentinel in a live SOC environment
  • Strong knowledge and hands-on ability with KQL (Kusto Query Language)
  • Understanding of attack techniques (MITRE ATT&CK, etc.) and incident response workflows
  • Comfortable working across different client environments and adapting to varied threat landscapes
  • Previous experience in an MSSP or managed services environment is an advantage

Job details:

  • Salary up to £30,000
  • Hybrid working – 3 days a week in the Manchester office
  • Clear progression opportunities and exposure to a wide range of threat landscapes
  • Work as part of a supportive, growing SOC team with real investment in tooling and training
  • If you\’re ready to take the next step in your threat analysis career and want to be part of a team that makes a real difference, apply now.

We’re expecting a large amount of interest in this role with interviews taking place towards the end of the week, please apply now to be considered or alternatively contact Dan Rowland at Maxwell Bond on 0161 840 1021 or
Threat Analyst / SOC / Microsoft Sentinel / KQL / SIEM
Threat Analyst / SOC / Microsoft Sentinel / KQL / SIEM
#J-18808-Ljbffr

Threat Analyst employer: Maxwell Bond

Join a dynamic MSSP in Manchester as a Threat Analyst, where you'll be part of a supportive and rapidly growing SOC team. With a strong emphasis on employee development, you will have clear progression opportunities and the chance to work with cutting-edge tools in a hybrid environment. This is an exciting opportunity to make a real impact while collaborating with diverse clients to enhance their security posture.
M

Contact Detail:

Maxwell Bond Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Threat Analyst

✨Tip Number 1

Familiarise yourself with Microsoft Sentinel and KQL by exploring online resources or tutorials. This will not only boost your confidence but also demonstrate your proactive approach to learning during interviews.

✨Tip Number 2

Engage with the cybersecurity community through forums or social media platforms. Networking can provide insights into the latest trends and challenges in threat analysis, which you can discuss in your interviews.

✨Tip Number 3

Prepare to discuss real-world scenarios where you've used Microsoft Sentinel or KQL. Having specific examples ready will show your practical experience and problem-solving skills to potential employers.

✨Tip Number 4

Research the company’s recent projects or initiatives related to threat analysis. Being knowledgeable about their work will help you tailor your responses and show genuine interest during the interview process.

We think you need these skills to ace Threat Analyst

Experience with Microsoft Sentinel
Proficiency in KQL (Kusto Query Language)
Knowledge of SIEM technologies
Understanding of MITRE ATT&CK framework
Incident response workflows
Ability to investigate and respond to security alerts
Experience in a live SOC environment
Client-facing communication skills
Adaptability to varied threat landscapes
Collaboration with Threat Intelligence teams
Analytical thinking
Problem-solving skills
Attention to detail
Ability to tune detection rules and create workbooks

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your experience with Microsoft Sentinel and KQL. Include specific examples of how you've used these tools in a live SOC environment, as this is crucial for the role.

Craft a Compelling Cover Letter: In your cover letter, express your enthusiasm for the position and the company. Mention your understanding of attack techniques and incident response workflows, and how you can contribute to their team.

Showcase Relevant Skills: Clearly outline your skills related to threat analysis, including your ability to tune Sentinel rules and create workbooks. Use bullet points for clarity and impact.

Research the Company: Familiarise yourself with the MSSP's operations and their approach to security. This will help you tailor your application and prepare for potential interview questions about their clients and threat landscapes.

How to prepare for a job interview at Maxwell Bond

✨Showcase Your Microsoft Sentinel Experience

Make sure to highlight your hands-on experience with Microsoft Sentinel during the interview. Be prepared to discuss specific instances where you've used it in a live SOC environment, as this will demonstrate your practical knowledge and ability to contribute from day one.

✨Demonstrate KQL Proficiency

Since strong KQL skills are essential for this role, be ready to explain how you've utilised Kusto Query Language in your previous work. You might even want to prepare a few examples of queries you've written or challenges you've overcome using KQL.

✨Understand Threat Landscapes

Familiarise yourself with various attack techniques, especially those outlined in the MITRE ATT&CK framework. Being able to discuss these techniques and how they relate to incident response workflows will show that you have a solid understanding of the threats you'll be facing.

✨Prepare for Client Interaction Scenarios

As the role involves working with clients across different sectors, think about how you would communicate complex security concepts to non-technical stakeholders. Prepare examples of how you've successfully collaborated with clients in the past to enhance their security posture.

M
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>