At a Glance
- Tasks: Lead investigations and coordinate security incidents in a dynamic 24x7 team.
- Company: Award-winning managed service provider with a focus on security excellence.
- Benefits: Competitive salary, mentorship opportunities, and a collaborative work environment.
- Other info: Office-based role in Stoke on Trent with flexible shift patterns.
- Why this job: Make a real impact in cybersecurity while advancing your skills and career.
- Qualifications: Experience in security operations and familiarity with SIEM or EDR tools.
The predicted salary is between 40000 - 50000 £ per year.
SOC Analyst to join an award winning managed service provider 24x7 security team. As a Tier 2 Analyst, you will lead the investigation, containment, and coordination of security incidents, working closely with Tier 1 analysts, internal IT teams, and external stakeholders. Taking ownership of complex alerts, support threat hunting and intelligence efforts, and contribute to the refinement of detection rules, playbooks, and response procedures.
You will be involved in:
- Incident Detection & Response
- Threat Intelligence and Analysis
- Security Monitoring and Detection Engineering
- Compliance, Reporting and Documentation
- Vulnerability Management
- Collaboration and knowledge sharing
This would suit an experienced security analyst who has proven experience working in a busy security department, working in security operations. Strong alert triage, incident response, security monitoring, and threat analysis. Experience handling real-world security incidents and working with SIEM, EDR, or vulnerability management tools. Ideally have a strong bachelor’s degree in computer science, Information Security, Cyber Security or related field with any SIEM-specific certification or vendor-specific training. Relevant cybersecurity certifications such as Certified Cloud Security Professional (CCSP) or other relevant security certifications, Security+ (CompTIA), CEH (Certified Ethical Hacker), CISSP, BTL1, BTL2 or others are highly desirable but not essential.
Office based in Stoke on Trent, shifts, rota basis of 4 days on working - early's, late's and nights. This is an excellent opportunity for an experienced security analyst ready to take the next step — with a chance to mentor junior analysts, deepen your technical expertise, and help shape our evolving security posture in a collaborative, hands-on environment.
Security Analyst, SOC, Tier 2 in Stafford employer: OCC Group
Contact Detail:
OCC Group Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Analyst, SOC, Tier 2 in Stafford
✨Tip Number 1
Network like a pro! Reach out to current employees on LinkedIn or at industry events. A friendly chat can give you insider info and maybe even a referral, which can really boost your chances.
✨Tip Number 2
Prepare for the interview by brushing up on your incident response scenarios. We want you to showcase your experience with real-world security incidents and how you handled them. Practice makes perfect!
✨Tip Number 3
Show off your skills! If you’ve got any projects or contributions to open-source security tools, bring them up during your discussions. It’s a great way to demonstrate your hands-on experience and passion for cybersecurity.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search.
We think you need these skills to ace Security Analyst, SOC, Tier 2 in Stafford
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in security operations and incident response. We want to see how you've handled real-world security incidents and your familiarity with tools like SIEM and EDR.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cybersecurity and explain why you're the perfect fit for our Tier 2 SOC Analyst role. Don't forget to mention any relevant certifications you hold!
Showcase Your Skills: In your application, be sure to emphasise your alert triage and threat analysis skills. We’re looking for someone who can take ownership of complex alerts and contribute to our detection rules and playbooks.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates from our team!
How to prepare for a job interview at OCC Group
✨Know Your Stuff
Make sure you brush up on your knowledge of incident detection and response, as well as threat intelligence. Be ready to discuss specific tools you've used, like SIEM or EDR, and any real-world incidents you've handled. This will show that you’re not just familiar with the theory but have practical experience too.
✨Showcase Your Collaboration Skills
Since this role involves working closely with Tier 1 analysts and other teams, be prepared to share examples of how you've successfully collaborated in the past. Highlight any experiences where you mentored others or contributed to team efforts, as this will demonstrate your ability to work in a team-oriented environment.
✨Prepare for Scenario Questions
Expect to face scenario-based questions that test your problem-solving skills in real-time. Think about how you would handle complex alerts or security incidents. Practising these scenarios can help you articulate your thought process clearly during the interview.
✨Certifications Matter
While not essential, having relevant certifications can give you an edge. If you have any cybersecurity certifications, be sure to mention them and explain how they’ve helped you in your career. If you’re currently pursuing any, let them know that too—it shows your commitment to continuous learning!