At a Glance
- Tasks: Investigate and respond to advanced security threats while leading proactive threat hunting activities.
- Company: Join Thinkproject, a pioneering tech company transforming the construction software landscape.
- Benefits: Enjoy hybrid working, unlimited learning opportunities, and a vibrant company culture.
- Why this job: Make a real impact in cybersecurity and shape the future of our organisation.
- Qualifications: Strong background in cybersecurity, incident response, and technical skills in SIEM and EDR tools.
- Other info: Collaborative environment with opportunities for professional growth and mentorship.
The predicted salary is between 36000 - 60000 £ per year.
Introducing Thinkproject Platform Pioneering a new era and offering a cohesive alternative to the fragmented landscape of construction software, Thinkproject seamlessly integrates the most extensive portfolio of mature solutions with an innovative platform, providing unparalleled features, integrations, user experiences, and synergies. By combining information management expertise and in-depth knowledge of the building, infrastructure, and energy industries, Thinkproject empowers customers to efficiently deliver, operate, regenerate, and dispose of their built assets across their entire lifecycle through a Connected Data Ecosystem.
We are looking for a highly experienced and technically skilled Senior Security Operations Centre (SOC) Analyst to join our team and play a key role in identifying, investigating, and responding to advanced security threats, issues and vulnerabilities across our organization. This role requires deep expertise in monitoring and securing endpoints, networks, cloud platforms, applications, and infrastructure, with the ability to manage complex incidents independently and drive continuous improvement within the SOC function.
As a senior member of the team, you will lead investigations into sophisticated threats such as advanced persistent threats (APTs), malware outbreaks, and targeted attacks. You will perform hands-on analysis of security events, including forensic evidence collection and root cause analysis, and contribute to the development of detection capabilities across SIEM, EDR, and other monitoring tools.
You will actively engage in threat hunting, leveraging your deep understanding of application code, infrastructure and hosting architectures (cloud and on-premise), the software development lifecycle (SDLC), and CI/CD pipeline solutions to identify risks that span traditional and cloud-native environments. You will also play a key role in implementing and refining automation and playbooks utilising SOAR platforms to accelerate response efforts and reduce operational overhead.
The ideal candidate will have a strong technical foundation and a proactive mindset, with a passion for staying ahead of current and emerging threats. You will collaborate closely with IT, DevOps, and application teams to improve detection coverage, enhance SOC processes, and ensure security operations are aligned with industry best practices and compliance requirements.
This role encompasses reactive incident response, proactive detection engineering, threat hunting, and vulnerability management. You will also contribute to strategic initiatives including penetration testing coordination, security assessments, and audit preparation, while mentoring analysts, sharing threat intelligence insights, and maintaining SOC documentation and workflows.
This role sits within the Product Operations and Corporate IT branch, reporting to the Director of Cyber Security and Networking, and operates as part of the broader Cyber Security, Network, and Security Engineering teams.
Main responsibilities:
- Independently investigate and respond to security alerts and events from SIEM, EDR, and other security tools across endpoints, networks, cloud platforms, and applications.
- Lead proactive threat hunting activities, leveraging threat intelligence, application logs, and infrastructure telemetry to uncover indicators of compromise or stealthy threat activity.
- Perform in-depth analysis of logs, API configurations and traffic, container environments, network data, application and infrastructure architecture, as well as data center hosting environments to support threat detection, incident investigation, and root cause analysis.
- Manage complex cybersecurity incidents end-to-end, including containment, eradication, recovery, and post-incident analysis, while coordinating closely with cross-functional stakeholders.
- Deploy, operate, configure, and tune SIEM platforms and detection tools to enhance signal accuracy, reduce alert fatigue, and maintain effective detection coverage.
- Design, build, and maintain incident response playbooks and automation workflows to increase the efficiency, speed, and consistency of incident response processes.
- Simultaneously manage multiple active investigations and day-to-day SOC operations, effectively prioritising tasks and managing time under pressure.
- Conduct forensic analysis during investigations, including evidence preservation, malware analysis, memory examination, and root cause identification.
- Collaborate with DevOps, IT, and development teams to ensure timely containment, mitigation, and remediation of vulnerabilities and threats.
- Coordinate outputs from security assessment tools and penetration tests, ensuring clear ownership and timely closure of identified issues.
- Participate in and lead security testing exercises to evaluate and strengthen detection capabilities and response procedures.
- Drive continuous improvement of SOC operations by identifying logging gaps, proposing monitoring enhancements, and introducing new detection or response technologies.
- Maintain comprehensive documentation of investigations, incidents, tuning efforts, and threat intelligence to support reporting, knowledge sharing, and audit readiness.
- Stay current with evolving threat landscapes, adversary techniques, and emerging security tools and practices to strengthen SOC capabilities.
- Adapt SOC processes, solutions, and procedures to enhance the monitoring of the organization's IT network health.
- Ensure security operations and incident response practices are aligned with industry-recognized frameworks such as ISO 27001.
- Implement solutions within CI/CD pipelines to identify and block security issues reaching production environments.
- Support the development and refinement of SOC procedures, training materials, and operational standards to enhance maturity and consistency across the team.
What you need to fulfill the role
You Must Have:
- Language & Communication: Proficiency in spoken and written English, with the ability to communicate effectively across both technical and non-technical audiences. The ability to communicate difficult or sensitive information tactfully.
- Education & Experience: Bachelor’s degree in cyber security or a related field, or equivalent professional experience. Strong knowledge of cybersecurity principles, threat landscapes, and incident response procedures. Awareness of current and emerging cyber threats affecting SaaS organisations.
- Technical Skills: Hands-on experience with implementation, ongoing management and maturing of Security Information and Event Management (SIEM) tools, Endpoint Detection and Response (EDR) platforms, threat intelligence platforms, and vulnerability identification tools. Experience integrating custom-built applications into SIEM platforms. Experience with implementation of automation solutions, enhancing SOC efficiency and speeding incident response. Familiarity with Security Orchestration, Automation, and Response (SOAR) platforms, including developing and maintaining automated response playbooks. Experience with threat hunting focused on application code, application, infrastructure and hosting architecture, leveraging coding skills and a solid understanding of the software development lifecycle (SDLC) and infrastructure components. Experience managing security issues identified through internal tools and external assessments, ensuring remediation is completed in line with company policies and standards. Knowledge of common security frameworks and best practices. Experience implementing solutions to detect and block security risks in CI/CD pipelines to prevent vulnerable code from being deployed into production.
- SOC Operations: Experience in complex incident response and investigation, including forensic evidence handling and root cause analysis. Experience managing business-as-usual (BAU) security operations workload alongside project-based work, both independently and in coordination with other team members. Experience managing outputs from cybersecurity assessment tools, coordinating timely mitigation and remediation with key stakeholders. Experience coordinating outsourced penetration tests, ensuring smooth execution without service disruption. Experience conducting security assessment exercises to evaluate SOC operational effectiveness and the organization’s ability to respond to cybersecurity incidents. Experience in tuning detection rules and alerts to improve accuracy and reduce false positives in security monitoring.
- Technical Expertise: Experience with Azure, Azure AD, and AWS technologies and services. Experience conducting forensic analysis of cybersecurity incidents.
- Teamwork & Leadership: A positive, self-motivated attitude. The ability to work effectively in a team environment, collaborating with cross-functional teams to achieve shared objectives. Strong time management and prioritization skills, with the ability to manage your own workload. The ability to perform effectively under pressure, priorities tasks, and make sound decisions in high-stress or emergency situations. A proactive mindset with the ability to critically evaluate your own work, identify improvement opportunities, and automate, simplify, or standardize processes where appropriate.
It Would Be Good to Have:
- Language Skills: Proficiency in German (spoken and written).
- SOC Operations: Experience conducting red or purple team exercises to validate detection capabilities and improve response playbooks. Familiarity with security operations in containerized environments and microservices architectures (e.g., Kubernetes, Docker).
- Technical Skills: Understanding of advanced detection engineering techniques, such as creating custom correlation rules and behavioral analytics in SIEM platforms. Exposure to secure software development practices and security testing of APIs, containers, and cloud-native applications. Experience conducting both external and internal penetration testing of applications and infrastructure.
- Technical Expertise: Experience with Microsoft Sentinel SIEM Solutions. Experience working within a SaaS or software-driven organization, particularly in multi-tenant or cloud-native environments. Experience with AI technologies, including understanding the cybersecurity threats they pose to organizations and how they can be leveraged to enhance operational effectiveness.
What we offer: Lunch 'n' Learn Sessions, Women's Network, LGBTQIA+ Network, Coffee Chat Roulette, Free English Lessons, Thinkproject Academy, Social Events, Volunteering Activities, Open Forum with Leadership Team (Tp Café), Hybrid working, Unlimited learning.
We are a passionate bunch here. To join Thinkproject is to shape what our company becomes. We take feedback from our staff very seriously and give them the tools they need to help us create our fantastic culture of mutual respect. We believe that investing in our staff is crucial to the success of our business.
Your contact: Please submit your application, including salary expectations and potential date of entry, by submitting the form on the next page.
Senior Security Operations Center Analyst (f/m/d) employer: think project! GmbH
Contact Detail:
think project! GmbH Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Security Operations Center Analyst (f/m/d)
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at events. A friendly chat can lead to opportunities that aren’t even advertised yet.
✨Tip Number 2
Show off your skills! Create a portfolio or a GitHub repository showcasing your projects and achievements. This gives potential employers a taste of what you can do.
✨Tip Number 3
Prepare for interviews by practising common questions and scenarios related to security operations. The more you rehearse, the more confident you'll feel when it’s showtime!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are keen to join us directly!
We think you need these skills to ace Senior Security Operations Center Analyst (f/m/d)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior Security Operations Center Analyst role. Highlight relevant experience and skills that match the job description, especially in cybersecurity principles and incident response.
Craft a Compelling Cover Letter: Your cover letter should tell us why you're the perfect fit for this role. Share specific examples of your past experiences that demonstrate your expertise in threat hunting and managing complex incidents.
Showcase Your Technical Skills: Don’t forget to mention your hands-on experience with SIEM tools, EDR platforms, and any automation solutions you've implemented. We want to see how you can contribute to enhancing our SOC operations.
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It helps us keep track of your application and ensures you don’t miss out on any important updates!
How to prepare for a job interview at think project! GmbH
✨Know Your Stuff
Make sure you brush up on your cybersecurity principles and the latest threat landscapes. Be ready to discuss specific tools like SIEM and EDR platforms, as well as your hands-on experience with them. This shows you're not just familiar with the theory but can apply it in real-world scenarios.
✨Showcase Your Problem-Solving Skills
Prepare to share examples of complex incidents you've managed. Talk about how you approached containment, eradication, and recovery. Highlight your ability to work under pressure and prioritise tasks effectively, as this is crucial for a Senior SOC Analyst role.
✨Engage with the Team
Since collaboration is key in this role, be ready to discuss how you've worked with cross-functional teams in the past. Share experiences where you’ve improved detection coverage or enhanced SOC processes, showing that you can contribute to a team environment.
✨Stay Current
Demonstrate your passion for cybersecurity by discussing recent trends or emerging threats. Mention any relevant certifications or training you've pursued recently. This shows that you're proactive and committed to continuous improvement, which is essential for success in this field.