Security Operations Engineer - SOC
Security Operations Engineer - SOC

Security Operations Engineer - SOC

Reading Full-Time 36000 - 60000 ÂŁ / year (est.) No home office possible
M

At a Glance

  • Tasks: Join us as a Security Operations Engineer to tackle complex security incidents and enhance our cybersecurity services.
  • Company: Be part of Microsoft, a leader in AI and supercomputing, shaping the future of technology.
  • Benefits: Enjoy remote work flexibility, industry-leading healthcare, educational resources, and generous time off.
  • Why this job: Make a real impact on global security while growing your skills in a collaborative and innovative environment.
  • Qualifications: Bachelor's degree or relevant experience in cybersecurity; certifications like GCIH or CSA are a plus.
  • Other info: This role can be performed remotely from anywhere in the UK.

The predicted salary is between 36000 - 60000 ÂŁ per year.

Our team sits at the heart of Microsoft’s AI & High Performance Computing business – shaping and delivering the next generation of supercomputing. As a Security Operations Engineer – SOC Analyst, you will help develop, operate, and maintain security services supporting the evolving needs of one of our largest and most significant customers.

As a Security Operations Engineer – SOC Tier 2 Analyst you support a managed security service for Microsoft working on a long-term cloud integration program. The Security Operations Engineer is responsible for executing a managed cyber security service and will make sure this meets customer contractual requirements and is targeting “goal” zero for all cybersecurity incidents. As a Tier 2 Analyst you will play a critical role in identifying, analysing, and mitigating complex security incidents and breaches within the organizations network and systems. You will work with a wide range of teams to ensure the overall safety and security of the environment and work closely with key stakeholders.

This role will allow you to develop your security and technical skills. You will have the opportunity to impact both Microsoft’s strategy and the world-wide mission of one of the largest and most forward-leaning customers. The customer’s scenarios will be lighthouses for their markets and present an opportunity for Azure and Microsoft to learn and grow, create transformative technology offerings, and advance competitive advantages. Our team values collaboration, craftsmanship, and continuous learning. As a member of the team, you will be able to shape and grow a positive and productive engineering culture.

Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.

Qualifications

Required Qualifications:

  • Bachelor’s Degree in Statistics, Mathematics, Computer Science or related field
    • OR Experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology.
  • Relevant certifications such as Certified Incident Handler (GCIH), Certified SOC Analyst (CSA), Certified Threat Intelligence Analyst (CTIA)
  • Relevant Microsoft certifications such as Azure Security Engineer Associate (AZ-500), Security Administrator Associate (MS-500), Identity and Access Administrator Associate (SC-300).
  • Proven experience in a SOC environment, preferably with a focus on Microsoft Defender suite and Microsoft Sentinel.

Other Qualifications:

  • Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:
    • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud Background Check upon hire/transfer and every two years thereafter.

Preferred Qualifications:

  • Master’s Degree in Statistics, Mathematics, Computer Science
    • OR related field
    • OR Experience in software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
    • CISSP CISA CISM SANS GCIA GCIH OSCP Security+
  • Experience reading and/or writing code (e.g., sample documentation, product demos).
  • In-depth knowledge of security operations center concepts, processes, technologies, tools (technical skills and hands-on experience with various security solutions such as SIEMs (e.g., IBM QRadar), SOARs (e.g., Microsoft Sentinel, Defender suite), XDRs (e.g., CrowdStrike Falcon), threat intelligence platforms (e.g., Recorded Future), vulnerability scanners (e.g., Qualys)), frameworks, standards, and regulations AND OR proficiency in Kusto Query Language (KQL).
  • Understanding of advanced cybersecurity concepts, threat landscape, and attack methodologies AND OR experience with the creation, configuration and use of Playbooks, Notebooks and Workbooks.
  • Demonstrated experience in conducting in-depth incident analysis, threat hunting, and forensic investigations.

Responsibilities

  • Incident Triage: Investigate and triage security alerts escalated from Tier 1 SOC analysts, determine severity and potential impact of the incident, and follow the triage process until closure.
  • Threat Analysis: Conduct in-depth analysis of security events to identify malicious activities, tactics, techniques, and procedures used by threat actors.
  • Security Incident Handling: Assisting with the containment, eradication, and recovery process in response to security incidents.
  • Vulnerability Assessment: Participating in vulnerability assessment and management activities to identify and remediate security weaknesses.
  • Security Tool Management: Managing and configuring security tools, specifically Microsoft Sentinel and the Microsoft Defender suite including Defender for Cloud and Microsoft 365 Defender.
  • Threat Intelligence: Utilizing threat intelligence feeds and sources to stay up-to-date with the latest threats and vulnerabilities.
  • Collaboration: Collaborating with other members of the SOC team, as well as external and internal stakeholders.
  • Continuous Improvement: Contributing to the improvement of SOC processes, procedures, and documentation, including the creation and upkeep of Analytics Rules, Playbooks/Notebooks/Workbooks within Microsoft Sentinel.
  • Leadership: Mentor SOC Tier 1 Analysts to improve detection/analytical capabilities within the SOC and monitor SOC Tier 1 Analyst performance.

NB this role can be performed remotely and from anywhere in the UK.

#J-18808-Ljbffr

Security Operations Engineer - SOC employer: Microsoft Corporation

At Microsoft, we pride ourselves on being an exceptional employer, especially for the Security Operations Engineer - SOC role. Our inclusive work culture fosters collaboration and continuous learning, empowering employees to grow their technical skills while contributing to meaningful projects that shape the future of supercomputing. With industry-leading benefits, opportunities for professional development, and a commitment to employee well-being, working remotely from anywhere in the UK allows you to balance your career with your personal life seamlessly.
M

Contact Detail:

Microsoft Corporation Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Security Operations Engineer - SOC

✨Tip Number 1

Familiarize yourself with Microsoft Defender and Sentinel. Since the role emphasizes managing these tools, having hands-on experience or even personal projects showcasing your skills can set you apart.

✨Tip Number 2

Stay updated on the latest cybersecurity threats and trends. Being knowledgeable about current attack methodologies will not only help in interviews but also demonstrate your commitment to continuous learning.

✨Tip Number 3

Network with professionals in the cybersecurity field, especially those who work in SOC environments. Engaging with others can provide insights into the role and may lead to referrals.

✨Tip Number 4

Consider obtaining relevant certifications like GCIH or CSA if you haven't already. These credentials can enhance your profile and show your dedication to the field.

We think you need these skills to ace Security Operations Engineer - SOC

Incident Triage
Threat Analysis
Security Incident Handling
Vulnerability Assessment
Security Tool Management
Threat Intelligence
Collaboration
Continuous Improvement
Mentoring
Cybersecurity Concepts
Anomaly Detection
SIEM Proficiency
Microsoft Defender Suite
Microsoft Sentinel
Kusto Query Language (KQL)
Technical Writing
Problem-Solving Skills
Attention to Detail
Analytical Skills

Some tips for your application 🫡

Tailor Your CV: Make sure to customize your CV to highlight relevant experience in security operations, particularly focusing on your skills with Microsoft Defender and Sentinel. Emphasize any certifications you hold that are mentioned in the job description.

Craft a Strong Cover Letter: Write a cover letter that reflects your understanding of the role and the company’s mission. Discuss how your background in cybersecurity aligns with their needs and how you can contribute to their goals of achieving 'goal' zero for cybersecurity incidents.

Highlight Relevant Experience: In your application, clearly outline your experience in a SOC environment, including specific examples of incident handling, threat analysis, and collaboration with teams. Use metrics or outcomes where possible to demonstrate your impact.

Showcase Continuous Learning: Mention any ongoing education or training you are pursuing related to cybersecurity, such as additional certifications or courses. This aligns with the company's value of continuous learning and shows your commitment to professional growth.

How to prepare for a job interview at Microsoft Corporation

✨Understand the Role and Responsibilities

Make sure you have a clear understanding of the Security Operations Engineer role, especially the responsibilities related to incident triage, threat analysis, and security incident handling. Familiarize yourself with Microsoft Sentinel and the Defender suite, as these tools will be central to your work.

✨Showcase Your Technical Skills

Be prepared to discuss your experience with security operations center concepts, SIEMs, and threat intelligence platforms. Highlight any relevant certifications you hold, such as GCIH or CSA, and be ready to explain how you've applied your technical skills in real-world scenarios.

✨Demonstrate Collaboration and Communication Skills

Since this role involves working closely with various teams and stakeholders, emphasize your ability to collaborate effectively. Share examples of how you've worked in teams to resolve security incidents or improve processes, showcasing your communication skills.

✨Prepare for Behavioral Questions

Expect questions that assess your problem-solving abilities and how you handle stressful situations. Use the STAR method (Situation, Task, Action, Result) to structure your responses, particularly when discussing past experiences in incident response or vulnerability management.

Security Operations Engineer - SOC
Microsoft Corporation
M
  • Security Operations Engineer - SOC

    Reading
    Full-Time
    36000 - 60000 ÂŁ / year (est.)

    Application deadline: 2027-03-13

  • M

    Microsoft Corporation

Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>