SOC Analyst

SOC Analyst

Full-Time 28800 - 48000 £ / year (est.) No home office possible
T

At a Glance

  • Tasks: Monitor security alerts, investigate incidents, and enhance detection workflows.
  • Company: Join a people-first tech firm that values diversity and growth.
  • Benefits: Competitive salary, flexible work options, and continuous learning opportunities.
  • Why this job: Make a real impact in cyber security while developing your skills.
  • Qualifications: 3+ years as a SOC Analyst with strong analytical and scripting skills.
  • Other info: Collaborative environment with a focus on employee wellbeing and career progression.

The predicted salary is between 28800 - 48000 £ per year.

The Information and Cyber Security team are responsible for identifying and mitigating cyber security risks for the firm and ensure continued compliance against specific regulatory and best practice standards. We're recruiting for a skilled SOC Analyst to join our growing security operations team with 3+ years of experience. You'll play a key role in detecting, investigating, and responding to potential security incidents—helping us protect our infrastructure and data from evolving threats. It will be a hands-on position; candidates must have good experience of working as a SOC Analyst before and understand several security domains such as Incident Response, Intrusion methods, Attack Monitoring, Networks, Threat, and Vulnerability Management. The role requires good analytical skills, attention to detail, problem-solving, and communication skills.

Main Responsibilities

  • Monitor and triage security alerts using SIEM platforms, applying advanced correlation rules and custom KQL queries to identify suspicious activity.
  • Investigate and respond to security incidents, performing root cause analysis, impact assessment, and containment actions across endpoints, networks, and cloud environments.
  • Develop and maintain detection rules and use cases, leveraging threat intelligence and MITRE ATT&CK mappings to improve detection fidelity.
  • Automate repetitive tasks and enhance detection/response workflows using scripting languages such as Python, PowerShell, Logic app, workflow and KQL.
  • Create and maintain incident response playbooks, ensuring alignment with evolving threat landscapes and operational requirements.
  • Perform threat hunting activities, proactively searching for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) across the environment.
  • Contribute to continuous improvement of SOC processes, including documentation updates, tuning of alert thresholds, and enrichment of log sources.
  • Collaborate with infrastructure, cloud, and application teams to support remediation efforts and improve overall security posture.
  • Participate in a 24/7 on-call rotation to provide out-of-hours support.

The Ideal Candidate

Our team is made up of talented professionals who combine technical excellence with a collaborative mindset and a passion for protecting our organisation. As a SOC Analyst, you'll bring a proactive, analytical approach and a strong foundation in cyber operations. You'll be able to demonstrate a similar supportive, flexible, and driven ethos, along with experience in:

  • Operating, tuning, and configuring SIEM platforms (Sentinel, Defender for Endpoint, Defender for Cloud).
  • Experienced in writing and optimising detection queries using KQL.
  • Investigating and responding to security incidents across endpoints, networks, and cloud environments.
  • Reviewing and analysing firewall logs and configurations.
  • Scripting in Python and PowerShell to automate detection and response workflows.
  • Managing and enhancing email and web filtering policies.
  • Implementing and reviewing Data Loss Prevention (DLP) controls.
  • Conducting threat hunting and leveraging threat intelligence to improve detection capabilities.

What Makes This Role Special

  • People-first culture: We believe that when people feel seen, supported, and valued, they do their best work. We foster a culture of respect, empathy, and belonging - where your voice matters and your wellbeing come first.
  • Inclusive environment: We welcome people of all backgrounds, identities, and experiences. Diversity isn't just a value - it's a strength.
  • Growth-focused: We support learning, development, and career progression. Whether you're deepening your expertise or exploring new paths, we'll back you.
  • Purpose-driven: Your work will help clients navigate legal challenges with confidence and clarity, making a real difference in their lives and businesses.

SOC Analyst employer: TLT LLP

As a SOC Analyst at our firm, you'll join a people-first culture that prioritises your wellbeing and professional growth. We offer a collaborative and inclusive environment where diverse perspectives are valued, alongside opportunities for continuous learning and career advancement. Your role will not only enhance our security posture but also contribute to meaningful outcomes for our clients, making this an exceptional place to build your career in cyber security.
T

Contact Detail:

TLT LLP Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC Analyst

✨Network Like a Pro

Get out there and connect with folks in the industry! Attend cyber security meetups, webinars, or conferences. You never know who might have a lead on your dream SOC Analyst role.

✨Show Off Your Skills

When you get the chance to chat with potential employers, don’t hold back! Share specific examples of how you've tackled security incidents or improved detection processes. Let them see your analytical skills in action!

✨Tailor Your Approach

Before any interview, do your homework on the company’s security posture and recent incidents. Tailor your responses to show how your experience aligns with their needs. It’ll make you stand out as a candidate who truly gets it.

✨Apply Through Us!

Don’t forget to check out our website for the latest SOC Analyst openings. Applying directly through us not only gives you a better shot but also keeps you in the loop about our people-first culture and growth opportunities!

We think you need these skills to ace SOC Analyst

SIEM Platforms (Sentinel, Defender for Endpoint, Defender for Cloud)
KQL (Kusto Query Language)
Incident Response
Intrusion Detection
Threat and Vulnerability Management
Root Cause Analysis
Impact Assessment
Scripting (Python, PowerShell)
Threat Hunting
Data Loss Prevention (DLP)
Firewall Log Analysis
Collaboration with Infrastructure and Cloud Teams
Analytical Skills
Attention to Detail
Problem-Solving Skills

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with SIEM platforms, KQL queries, and incident response. We want to see how your skills match what we're looking for!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cyber security and how your previous experiences have prepared you for this role. Let us know why you’re excited about joining our team at StudySmarter.

Showcase Your Technical Skills: Don’t forget to mention your technical skills! Whether it’s scripting in Python or PowerShell, or your experience with threat hunting, we want to see how you can contribute to our security operations team.

Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It helps us keep track of your application and ensures you don’t miss any important updates from us!

How to prepare for a job interview at TLT LLP

✨Know Your Tools

Make sure you’re familiar with the SIEM platforms mentioned in the job description, like Sentinel and Defender. Brush up on how to operate, tune, and configure these tools, as well as writing KQL queries. Being able to discuss your hands-on experience with these technologies will show that you’re ready to hit the ground running.

✨Showcase Your Incident Response Skills

Prepare to talk about specific incidents you've handled in the past. Be ready to explain your approach to investigating security incidents, performing root cause analysis, and the steps you took for containment. This will demonstrate your analytical skills and problem-solving abilities, which are crucial for a SOC Analyst.

✨Highlight Your Automation Experience

Since automation is key in this role, be prepared to discuss any scripting you've done in Python or PowerShell. Share examples of how you’ve automated detection and response workflows, and how this has improved efficiency in your previous roles. This will show your proactive approach to enhancing security operations.

✨Emphasise Collaboration

The job requires working closely with various teams, so be ready to discuss your experience collaborating with infrastructure, cloud, and application teams. Highlight any successful projects where teamwork was essential, and how you contributed to improving the overall security posture. This will align with the company’s people-first culture.

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

T
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>