At a Glance
- Tasks: Triage security events, monitor SIEM, and manage incidents in a dynamic environment.
- Company: Join a leading MSSP with a focus on innovative security solutions.
- Benefits: Enjoy a competitive salary, 20% shift allowance, and hybrid working options.
- Other info: Flexible shifts after training, excellent career growth, and a supportive team culture.
- Why this job: Make a real impact in cybersecurity while developing your skills with cutting-edge technologies.
- Qualifications: Experience in SOC roles, Microsoft Sentinel knowledge, and strong tech skills required.
The predicted salary is between 40000 - 50000 £ per year.
Location: Hybrid - Birmingham (1 day every 2 weeks)
Shift hours: Standard hours for first 4 months, followed by 4 on, 4 off 12‑hour shifts (after 6 months), with a 20% shift allowance.
Security Clearance: Must hold or be able to acquire Security Clearance (SC) with 5 years UK address history. Must be willing to work shifts after 6 months, typically 4 x 12‑hour shifts (4 on, 4 off).
Must have worked in an MSSP (Managed Services Organisation) environment, managing or dealing with multiple clients. MUST HAVE Microsoft Sentinel.
We are looking for a candidate with previous experience working in a SOC Analyst role. Ideally you will have been exposed to a mixture of tools and technologies, including Microsoft Sentinel and Google SecOps. You will have gained knowledge and extensive experience in investigating alerts and incidents, containing and remediating potential security threats, and dealing with customer enquiries.
Key responsibilities:- Triage security events and incidents.
- Monitor the SIEM to identify anomalies and potential security threats.
- Monitor the health of the SIEM and other critical components within the infrastructure.
- Participate in evaluating the security of monitored infrastructure systems and take part in recommending additional security solutions where appropriate.
- Communicate with external teams for incident resolution.
- Participate in security incident management and vulnerability management processes.
- Communicate effectively with customers, teammates, and management.
- Follow & improve internal guidelines, playbooks and practices for management of incidents and changes.
- Document and maintain security procedures and processes.
- Build & deliver customer service reviews.
- Security monitoring experience with one or more SIEM technologies, ideally Microsoft Sentinel and/or Google SecOps.
- Strong understanding of Windows, Linux and cloud technologies.
- Good understanding of security solutions including SIEMs, Web Proxies, Anti‑Virus, Firewalls, VPN, authentication providers and mechanisms, encryption, IPS/IDS.
- Good understanding of security incident management, malware management and vulnerability management processes.
- Experience of working in a MSSP SOC environment.
- Attention to detail and quality.
- CREST Practitioner Intrusion Analyst (CPIA)
- Microsoft Security Operations Analyst (SC-200)
- Security Blue Team Level 1 (BTL1)
Senior SOC Analyst - (Sentinel) - plus 20% shift allowance (Standard Hours the first 4 months before in Birmingham employer: Resillion
Contact Detail:
Resillion Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior SOC Analyst - (Sentinel) - plus 20% shift allowance (Standard Hours the first 4 months before in Birmingham
✨Tip Number 1
Network like a pro! Reach out to your connections in the cybersecurity field, especially those who work in SOC environments. A friendly chat can lead to insider info about job openings or even a referral.
✨Tip Number 2
Show off your skills! Prepare a portfolio or a presentation that highlights your experience with Microsoft Sentinel and other tools. This can really set you apart during interviews and give you a chance to demonstrate your expertise.
✨Tip Number 3
Practice makes perfect! Conduct mock interviews with friends or use online platforms to get comfortable discussing your past experiences and how they relate to the role of a Senior SOC Analyst. Confidence is key!
✨Tip Number 4
Don’t forget to apply through our website! We love seeing applications directly from candidates who are genuinely interested in joining our team. Plus, it gives you a better chance to stand out in the crowd.
We think you need these skills to ace Senior SOC Analyst - (Sentinel) - plus 20% shift allowance (Standard Hours the first 4 months before in Birmingham
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior SOC Analyst role. Highlight your experience with Microsoft Sentinel and any relevant MSSP work. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're the perfect fit for our team. Mention specific experiences that relate to the job description, especially around security incident management and customer communication.
Show Off Your Skills: Don’t hold back on showcasing your technical skills! Make sure to mention your familiarity with SIEM technologies, cloud solutions, and any certifications you have. We love seeing candidates who are passionate about security!
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and we’ll be able to review your application quickly. Plus, it shows you’re serious about joining us at StudySmarter!
How to prepare for a job interview at Resillion
✨Know Your Tools Inside Out
Make sure you’re well-versed in Microsoft Sentinel and any other SIEM technologies mentioned in the job description. Brush up on your experience with security monitoring, incident management, and the specific tools you've used in previous roles. Being able to discuss your hands-on experience confidently will impress the interviewers.
✨Showcase Your Problem-Solving Skills
Prepare to discuss specific incidents where you triaged security events or resolved customer enquiries. Use the STAR method (Situation, Task, Action, Result) to structure your answers. This will help you demonstrate your analytical skills and how you handle real-world security challenges.
✨Understand the Company’s Environment
Research the company’s operations and their approach to security. Familiarise yourself with their client base and the types of threats they might face. This knowledge will allow you to tailor your responses and show that you’re genuinely interested in how you can contribute to their team.
✨Prepare for Shift Work Questions
Since the role involves shift work after six months, be ready to discuss your flexibility and willingness to adapt to a 4 on, 4 off schedule. Highlight any previous experience with shift work and how you manage work-life balance during those times. This shows you’re prepared for the demands of the role.