SOC Analyst - Lv2 in London

SOC Analyst - Lv2 in London

London Full-Time 36000 - 60000 £ / year (est.) No home office possible
M

At a Glance

  • Tasks: Lead security incident investigations and improve detection processes using Microsoft technologies.
  • Company: Join a £100M+ IT Services Consultancy transforming the public sector in the UK.
  • Benefits: Enjoy flexible working, wellness support, and 25 days annual leave plus bank holidays.
  • Why this job: Make a real impact on society while developing your skills in a supportive environment.
  • Qualifications: 2+ years in SOC or security operations with strong Microsoft Sentinel experience.
  • Other info: Participate in exciting projects and enjoy social events like pizza Thursdays!

The predicted salary is between 36000 - 60000 £ per year.

Methods is a £100M+ IT Services Consultancy who has partnered with a range of central government departments and agencies to transform the way the public sector operates in the UK. Established over 30 years ago and UK-based, we apply our skills in transformation, delivery, and collaboration from across the Methods Group, to create end-to-end business and technical solutions that are people-centred, safe, and designed for the future.

Our human touch sets us apart from other consultancies, system integrators and software houses - with people, technology, and data at the heart of who we are, we believe in creating value and sustainability through everything we do for our clients, staff, communities, and the planet. We support our clients in the success of their projects while working collaboratively to share skill sets and solve problems. At Methods we have fun while working hard; we are not afraid of making mistakes and learning from them.

Predominantly focused on the public-sector, Methods is now building a significant private sector client portfolio. Methods was acquired by the Alten Group in early 2022. Alten is a global engineering firm with approximately 57,000 employees specializing in engineering and IT services.

Role summary

As a Level 2 SOC Analyst, you are the senior technical responder within the secure operations team, responsible for owning security incidents end-to-end using the Microsoft security platform. You will act as the escalation point for Level 1 analysts and as the technical lead during active incidents, conducting deep investigations across Microsoft Sentinel, Microsoft Defender XDR, and Entra ID to validate threats, contain attackers, and coordinate remediation.

Alongside incident response, you will drive continuous improvement of detection quality, playbooks, automation, and analyst capability to ensure the SOC operates at a consistently high standard. You also act as a senior technical leader within the SOC, contributing to the maturity, evolution, and operational effectiveness of SOC, MDR, and XDR services.

Key responsibilities

  • Incident investigation & response (primary focus)
  • Act as an escalation point for all security alerts raised by Level 1 analysts.
  • Validate incidents and determine severity, scope, root cause, and business impact.
  • Lead technical investigations using:
  • Microsoft Sentinel (KQL, analytics rules, workbooks, hunting)
  • Microsoft Defender XDR (Endpoint, Identity, Office 365, Cloud Apps)
  • Entra ID (Azure AD) sign-in and audit logs
  • Correlate identity, endpoint, email, and cloud activity to reconstruct attack chains and timelines.
  • Own incidents through:
    • Identification
    • Containment
    • Eradication coordination
    • Recovery validation
    • Post-incident review and documentation
  • Execute or coordinate containment actions including:
    • Device isolation via Defender for Endpoint
    • Account disablement and credential resets
    • Revocation of tokens and sessions
    • Blocking malicious indicators
    • Email purge/quarantine via Defender for Office 365
    • Conditional Access policy enforcement
  • Produce high-quality incident records including:
    • Evidence and KQL queries used
    • Actions taken
    • Root cause analysis
    • MITRE ATT&CK mapping
    • Lessons learned and improvement actions
  • SOC operations & stakeholder communication
    • Serve as technical incident lead during major security events.
    • Provide accurate, timely updates to IT, security leadership, and affected teams.
    • Maintain clear case management, documentation, and shift handovers within Sentinel/ITSM tooling.
    • Contribute to operational reporting:
    • Incident volumes
    • Time to detect / contain
    • Alert fidelity
    • Repeat incident drivers
  • Participate in a business-hours operating model with an on-call rotation for out-of-hours incidents.
  • Act as a trusted technical point of contact for SOC service discussions, supporting leadership in understanding risk, response options, and technical trade-offs during live incidents.
  • Detection engineering & continuous improvement (Microsoft-focused)
    • Tune Sentinel analytics rules to reduce false positives and missed threats.
    • Improve correlation logic, entity mapping, and severity scoring.
    • Develop and maintain:
    • Sentinel investigation playbooks
    • Incident response runbooks
    • Triage guides for Defender alerts
  • Build and refine SOAR workflows using Logic Apps / Sentinel automation rules.
  • Perform quality assurance on Level 1 investigations and provide structured coaching feedback.
  • Introduce threat-informed detection improvements based on real incidents and Microsoft threat intelligence.
  • Take ownership of defined components of the SOC, MDR, or XDR service, ensuring they are operationally effective, well documented, and aligned to current threat and platform capabilities.
  • Identify gaps in detection coverage, tooling, or process maturity and propose practical, Microsoft aligned improvements.
  • Support service innovation by evaluating and piloting new Microsoft security features, detection approaches, and automation capabilities, assessing their operational value before wider adoption.
  • Translate incident learnings into service improvements, updated playbooks, enhanced automation, and refined escalation models.
  • Leadership, Collaboration & Platform Maturity
    • Provide informal technical leadership to Level 1 analysts through mentoring, coaching, and example, raising investigation quality and analyst confidence.
    • Set and reinforce expectations for investigative rigour, documentation quality, and decision making within the SOC.
    • Work closely with:
    • Microsoft 365 administrators
    • Identity and access management teams
    • Endpoint engineering
    • Cloud platform teams
  • Support onboarding of new Microsoft data connectors and Defender features.
  • Advise on security telemetry requirements for new services or architectural changes.
  • What success looks like

    • Incidents are accurately classified and contained quickly.
    • Sentinel alert quality continuously improves.
    • Stakeholders trust SOC technical judgement and communication.
    • Level 1 analysts steadily increase investigation quality and independence.
    • Playbooks and automation remain current and operationally useful.
    • The service is viewed as proactive, technically credible, and continuously improving.

    Required experience & skills

    • 2+ years' experience in a SOC or security operations role with ownership of complex investigations.
    • Strong hands-on experience with:
    • Microsoft Sentinel (KQL querying, investigations, analytics rules)
    • Microsoft Defender for Endpoint
    • Defender for Office 365
    • Defender for Identity
    • Defender for Cloud Apps
    • Entra ID (Azure AD) logs and Conditional Access
  • Solid understanding of:
    • Windows internals and endpoint telemetry
    • Identity-based attacks and token abuse
    • Email threat techniques
    • Common attacker TTPs and kill chains
  • Confident writing technical incident reports and stakeholder updates.
  • Demonstrated ability to influence service quality and operational maturity without formal line management responsibility.
  • Certifications (desirable)

    • Microsoft SC-200 (Security Operations Analyst)
    • Microsoft SC-100 / SC-300
    • CompTIA CySA+ / Security+
    • GIAC certifications (GCIH, GCIA, GMON)
    • Security Blue Team Level 2

    Working pattern

    • Monday to Friday, business hours
    • Participation in a rotating on-call schedule for evenings/weekends to support major security incidents.

    Methods is passionate about its people; we want our colleagues to develop the things they are good at and enjoy.

    By joining us you can expect:

    • Autonomy to develop and grow your skills and experience
    • Be part of exciting project work that is making a difference in society
    • Strong, inspiring and thought-provoking leadership
    • A supportive and collaborative environment
    • Development – access to LinkedIn Learning, a management development programme, and training
    • Wellness – 24/7 confidential employee assistance programme
    • Flexible Working – including home working and part time
    • Social – office parties, breakfast Tuesdays, monthly pizza Thursdays, Thirsty Thursdays, and commitment to charitable causes
    • Time Off – 25 days of annual leave a year, plus bank holidays, with the option to buy 5 extra days each year
    • Volunteering – 2 paid days per year to volunteer in our local communities or within a charity organisation
    • Pension – Salary Exchange Scheme with 4% employer contribution and 5% employee contribution
    • Life Assurance – of 4 times base salary
    • Private Medical Insurance – which is non-contributory (spouse and dependants included)
    • Worldwide Travel Insurance – which is non-contributory (spouse and dependants included)
    • Enhanced Maternity and Paternity Pay
    • Travel – season ticket loan, cycle to work scheme

    For a full list of benefits please visit our website www.methods.co.uk/careers/benefits

    SOC Analyst - Lv2 in London employer: Methods Business and Digital Technology

    Methods is an exceptional employer, offering a vibrant work culture that prioritises collaboration, innovation, and personal growth. As a Level 2 SOC Analyst, you will enjoy the autonomy to enhance your skills while contributing to meaningful projects that positively impact society. With a strong commitment to employee wellness, flexible working arrangements, and a comprehensive benefits package, Methods fosters an environment where you can thrive both professionally and personally.
    M

    Contact Detail:

    Methods Business and Digital Technology Recruiting Team

    StudySmarter Expert Advice 🤫

    We think this is how you could land SOC Analyst - Lv2 in London

    ✨Tip Number 1

    Network like a pro! Reach out to folks in the industry, attend meetups, and connect with current employees at Methods. A friendly chat can sometimes lead to job opportunities that aren't even advertised!

    ✨Tip Number 2

    Show off your skills! If you’ve got experience with Microsoft Sentinel or Defender, consider creating a mini-project or case study to demonstrate your expertise. Share it on LinkedIn or during interviews to really stand out.

    ✨Tip Number 3

    Prepare for the interview like it’s a mission! Research Methods, understand their values, and be ready to discuss how your skills align with their goals. Don’t forget to have questions ready to show your interest!

    ✨Tip Number 4

    Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining the Methods team. Let’s get you that SOC Analyst role!

    We think you need these skills to ace SOC Analyst - Lv2 in London

    Microsoft Sentinel
    KQL querying
    Microsoft Defender for Endpoint
    Defender for Office 365
    Defender for Identity
    Defender for Cloud Apps
    Entra ID (Azure AD) logs
    Conditional Access
    Incident investigation and response
    Root cause analysis
    Technical incident reporting
    Mentoring and coaching
    Threat detection and response
    Operational maturity assessment
    Collaboration with IT and security teams

    Some tips for your application 🫡

    Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with Microsoft Sentinel and Defender, and don’t forget to mention any relevant certifications. We want to see how your skills align with what we’re looking for!

    Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about security operations and how you can contribute to our team. Keep it concise but impactful – we love a good story!

    Showcase Your Problem-Solving Skills: In your application, give examples of how you've tackled complex security incidents in the past. We’re all about collaboration and learning from mistakes, so share how you’ve turned challenges into opportunities for improvement.

    Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets the attention it deserves. Plus, you’ll find all the info you need about the role and our company culture there!

    How to prepare for a job interview at Methods Business and Digital Technology

    ✨Know Your Tools Inside Out

    Make sure you’re well-versed in Microsoft Sentinel, Defender, and Entra ID. Brush up on KQL querying and be ready to discuss how you've used these tools in past incidents. Being able to demonstrate your hands-on experience will show that you're not just familiar with the tech, but you can also leverage it effectively.

    ✨Prepare for Scenario-Based Questions

    Expect to face scenario-based questions that test your incident response skills. Think of specific incidents you've handled before and be ready to walk through your thought process, actions taken, and the outcomes. This will help interviewers see your problem-solving abilities in action.

    ✨Showcase Your Continuous Improvement Mindset

    Methods values continuous improvement, so come prepared with examples of how you've contributed to enhancing detection quality or operational processes in previous roles. Discuss any playbooks or automation you’ve developed and how they improved efficiency or reduced false positives.

    ✨Communicate Clearly and Confidently

    As a SOC Analyst, clear communication is key, especially when updating stakeholders during incidents. Practice articulating complex technical concepts in a straightforward manner. This will not only help you in the interview but also in your future role at Methods.

    SOC Analyst - Lv2 in London
    Methods Business and Digital Technology
    Location: London

    Land your dream job quicker with Premium

    You’re marked as a top applicant with our partner companies
    Individual CV and cover letter feedback including tailoring to specific job roles
    Be among the first applications for new jobs with our AI application
    1:1 support and career advice from our career coaches
    Go Premium

    Money-back if you don't land a job in 6-months

    M
    Similar positions in other companies
    UK’s top job board for Gen Z
    discover-jobs-cta
    Discover now
    >