At a Glance
- Tasks: Monitor and analyse security alerts to protect critical national infrastructure.
- Company: Join a secure and diverse SOC environment in the South of England.
- Benefits: Shift-based schedule, relocation support, and opportunities for career growth.
- Why this job: Make a real impact in cyber defence with cutting-edge tools and a collaborative team.
- Qualifications: Experience in SOC roles, strong skills in Microsoft Sentinel and Splunk required.
- Other info: Open to British citizens and relocators; must be eligible for DV clearance.
The predicted salary is between 36000 - 60000 £ per year.
Step into a mission-critical cyber defence environment where every alert, action, and analysis helps protect critical national infrastructure. We are looking for experienced SOC Analysts to support one of the UK's most secure and diverse SOC environments.
This is a real hands-on role - not just clicking dashboards. You will be working with Microsoft Sentinel, Splunk, and a range of security tools to identify and respond to advanced threats in a highly trusted, maturing SOC environment.
What You'll Be Doing:
- Monitoring and triaging security alerts across host and network infrastructure
- Conducting threat analysis using SIEM tools, log data, and threat intel feeds
- Supporting incident response from escalation through containment and recovery
- Improving detection rules and playbooks with a threat-informed approach
- Contributing to a collaborative, experienced team where your input drives maturity
What You'll Need:
- Multiple years in a SOC or cyber defence role ideally in a high-threat, enterprise or defence setting
- Strong experience with Microsoft Sentinel and Splunk
- Comfortable with MITRE ATT&CK, threat modelling, and security event triage
- Confident in networking fundamentals (TCP/IP, VPNs, proxies, DNS) and security tooling
- British Citizenship is essential (must meet criteria for secure site access)
- Eligible for SC / DV clearance
- Open to Relocators
Based elsewhere in the UK? No problem. We are open to cleared candidates looking to relocate to join a purpose-driven team in a secure location. Relocation support can be discussed post-screening.
Why This Team?
- Be part of a team that's building real capability, not just chasing SLA metrics
- Operate in a tool-rich, well-funded SOC that values your voice
- Work on high-value systems and incidents that genuinely matter
- Shift-based schedule designed for work-life rhythm
- Long-term programme stability with scope for clearance upgrades and career growth
Apply now for a confidential conversation.
SOC Analyst in Letchworth Garden City employer: TECHTRACE PARTNERS
Contact Detail:
TECHTRACE PARTNERS Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst in Letchworth Garden City
✨Tip Number 1
Network like a pro! Reach out to current SOC Analysts or professionals in the cyber defence field on LinkedIn. Ask them about their experiences and any tips they might have for landing a role like this. You never know who might have a lead on an opportunity!
✨Tip Number 2
Get hands-on with the tools mentioned in the job description. If you haven't already, dive into Microsoft Sentinel and Splunk through online labs or tutorials. Showing that you can hit the ground running will make you stand out during interviews.
✨Tip Number 3
Prepare for scenario-based questions! Think about how you would respond to specific security incidents or alerts. Practising these scenarios will help you articulate your thought process and demonstrate your problem-solving skills during interviews.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining our team and contributing to our mission.
We think you need these skills to ace SOC Analyst in Letchworth Garden City
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with Microsoft Sentinel and Splunk, and don’t forget to mention any relevant certifications or training. We want to see how your skills match what we’re looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cyber defence and how your background makes you a great fit for our team. Keep it concise but impactful – we love a good story!
Showcase Your Problem-Solving Skills: In your application, give examples of how you've tackled complex security issues in the past. We’re looking for hands-on experience, so share specific instances where you’ve made a difference in a SOC environment.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy – just follow the prompts and you’ll be on your way!
How to prepare for a job interview at TECHTRACE PARTNERS
✨Know Your Tools
Make sure you brush up on your experience with Microsoft Sentinel and Splunk. Be ready to discuss specific instances where you've used these tools to monitor or respond to security alerts. This will show that you're not just familiar with the software, but that you can leverage it effectively in a real-world scenario.
✨Understand Threat Modelling
Familiarise yourself with MITRE ATT&CK and how it applies to threat modelling. Prepare to explain how you've used threat intel feeds and log data in past roles to conduct threat analysis. This demonstrates your analytical skills and your proactive approach to cyber defence.
✨Showcase Your Incident Response Skills
Be ready to share examples of how you've supported incident response efforts, from escalation to recovery. Highlight any specific incidents where your actions made a significant impact. This will illustrate your hands-on experience and ability to work under pressure.
✨Emphasise Team Collaboration
Since this role involves contributing to a collaborative team, think of examples where you've worked effectively with others in a SOC environment. Discuss how your input has driven improvements or maturity within the team. This will show that you value teamwork and are ready to contribute positively to their culture.