At a Glance
- Tasks: Monitor and analyse security alerts to protect critical national infrastructure.
- Company: Join a secure and diverse SOC environment in the South of England.
- Benefits: Shift-based schedule, relocation support, and opportunities for career growth.
- Why this job: Make a real impact in cyber defence with cutting-edge tools and a collaborative team.
- Qualifications: Experience in SOC roles, strong knowledge of Microsoft Sentinel and Splunk.
- Other info: British citizenship required; open to relocators across the UK.
The predicted salary is between 36000 - 60000 £ per year.
Step into a mission-critical cyber defence environment where every alert, action, and analysis helps protect critical national infrastructure. We’re looking for experienced SOC Analysts to join support one of the UKs most secure & diverse SOC environments. This is a real hands-on role - not just clicking dashboards. You’ll be working with Microsoft Sentinel, Splunk, and a range of security tools to identify and respond to advanced threats in a highly trusted, maturing SOC environment.
What You’ll Be Doing
- Monitoring and triaging security alerts across host and network infrastructure
- Conducting threat analysis using SIEM tools, log data, and threat intel feeds
- Supporting incident response from escalation through containment and recovery
- Improving detection rules and playbooks with a threat-informed approach
- Contributing to a collaborative, experienced team where your input drives maturity
What You’ll Need
- Multiple years in a SOC or cyber defence role ideally in a high-threat, enterprise or defence setting
- Strong experience with Microsoft Sentinel and Splunk
- Comfortable with MITRE ATT&CK, threat modelling, and security event triage
- Confident in networking fundamentals (TCP/IP, VPNs, proxies, DNS) and security tooling
- British Citizenship is essential (must meet criteria for secure site access)
- Eligible for SC / DV clearance
Open to Relocators
Based elsewhere in the UK? No problem. We’re open to cleared candidates looking to relocate to join a purpose-driven team in a secure location. Relocation support can be discussed post-screening.
Why This Team?
- Be part of a team that’s building real capability, not just chasing SLA metrics
- Operate in a tool-rich, well-funded SOC that values your voice
- Work on high-value systems and incidents that genuinely matter
- Shift-based schedule designed for work-life rhythm
- Long-term programme stability with scope for clearance upgrades and career growth
Apply now for a confidential conversation.
SOC Analyst in Letchworth employer: TECHTRACE PARTNERS
Contact Detail:
TECHTRACE PARTNERS Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst in Letchworth
✨Tip Number 1
Network like a pro! Reach out to current SOC Analysts or professionals in the cyber defence field on LinkedIn. Ask them about their experiences and any tips they might have for landing a role like this. You never know who might have a lead on an opportunity!
✨Tip Number 2
Get hands-on with the tools! If you’re familiar with Microsoft Sentinel and Splunk, great! If not, take some time to explore online resources or labs that can help you get comfortable with these platforms. Showing that you can hit the ground running will make you stand out.
✨Tip Number 3
Prepare for the interview by brushing up on your knowledge of MITRE ATT&CK and threat modelling. Be ready to discuss how you’ve used these concepts in past roles. We want to see your thought process and how you approach security challenges.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining our team. Let’s get you on board!
We think you need these skills to ace SOC Analyst in Letchworth
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with Microsoft Sentinel and Splunk, and don’t forget to mention any relevant certifications or training. We want to see how your skills match what we’re looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cyber defence and how your background makes you a great fit for our team. Keep it concise but impactful – we love a good story!
Showcase Your Problem-Solving Skills: In your application, give examples of how you've tackled complex security issues in the past. We’re looking for hands-on experience, so share specific instances where you’ve made a difference in a SOC environment.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, you’ll find all the details you need about the role and our team!
How to prepare for a job interview at TECHTRACE PARTNERS
✨Know Your Tools
Familiarise yourself with Microsoft Sentinel and Splunk before the interview. Be ready to discuss your hands-on experience with these tools, as well as any specific incidents where you used them to identify or respond to threats.
✨Understand the Threat Landscape
Brush up on MITRE ATT&CK and threat modelling concepts. Prepare to explain how you've applied these frameworks in past roles, especially in high-threat environments. This shows you’re not just familiar with theory but can apply it practically.
✨Showcase Your Incident Response Skills
Be prepared to walk through a real incident you’ve handled. Discuss your role in the escalation, containment, and recovery processes. Highlight how your actions contributed to improving detection rules or playbooks.
✨Emphasise Team Collaboration
This role values collaboration, so think of examples where you’ve worked effectively within a team. Share how your input has driven maturity in previous SOC environments, demonstrating that you’re a team player who can contribute to their mission.