At a Glance
- Tasks: Monitor security alerts, investigate incidents, and enhance detection workflows.
- Company: Join a people-first tech firm that values diversity and growth.
- Benefits: Competitive salary, flexible work options, and continuous learning opportunities.
- Why this job: Make a real impact in cyber security while developing your skills.
- Qualifications: 3+ years as a SOC Analyst with strong analytical and scripting skills.
- Other info: Collaborative environment with a focus on employee wellbeing and career progression.
The predicted salary is between 28800 - 48000 £ per year.
The Information and Cyber Security team are responsible for identifying and mitigating cyber security risks for the firm and ensure continued compliance against specific regulatory and best practice standards. We're recruiting for a skilled SOC Analyst to join our growing security operations team with 3+ years of experience. You'll play a key role in detecting, investigating, and responding to potential security incidents—helping us protect our infrastructure and data from evolving threats. It will be a hands-on position; candidates must have good experience of working as a SOC Analyst before and understand several security domains such as Incident Response, Intrusion methods, Attack Monitoring, Networks, Threat, and Vulnerability Management. The role requires good analytical skills, attention to detail, problem-solving, and communication skills.
Main Responsibilities
- Monitor and triage security alerts using SIEM platforms, applying advanced correlation rules and custom KQL queries to identify suspicious activity.
- Investigate and respond to security incidents, performing root cause analysis, impact assessment, and containment actions across endpoints, networks, and cloud environments.
- Develop and maintain detection rules and use cases, leveraging threat intelligence and MITRE ATT&CK mappings to improve detection fidelity.
- Automate repetitive tasks and enhance detection/response workflows using scripting languages such as Python, PowerShell, Logic app, workflow and KQL.
- Create and maintain incident response playbooks, ensuring alignment with evolving threat landscapes and operational requirements.
- Perform threat hunting activities, proactively searching for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) across the environment.
- Contribute to continuous improvement of SOC processes, including documentation updates, tuning of alert thresholds, and enrichment of log sources.
- Collaborate with infrastructure, cloud, and application teams to support remediation efforts and improve overall security posture.
- Participate in a 24/7 on-call rotation to provide out-of-hours support.
The Ideal Candidate
Our team is made up of talented professionals who combine technical excellence with a collaborative mindset and a passion for protecting our organisation. As a SOC Analyst, you'll bring a proactive, analytical approach and a strong foundation in cyber operations. You'll be able to demonstrate a similar supportive, flexible, and driven ethos, along with experience in:
- Operating, tuning, and configuring SIEM platforms (Sentinel, Defender for Endpoint, Defender for Cloud).
- Experienced in writing and optimising detection queries using KQL.
- Investigating and responding to security incidents across endpoints, networks, and cloud environments.
- Reviewing and analysing firewall logs and configurations.
- Scripting in Python and PowerShell to automate detection and response workflows.
- Managing and enhancing email and web filtering policies.
- Implementing and reviewing Data Loss Prevention (DLP) controls.
- Conducting threat hunting and leveraging threat intelligence to improve detection capabilities.
What Makes This Role Special
- People-first culture: We believe that when people feel seen, supported, and valued, they do their best work. We foster a culture of respect, empathy, and belonging - where your voice matters and your wellbeing come first.
- Inclusive environment: We welcome people of all backgrounds, identities, and experiences. Diversity isn't just a value - it's a strength.
- Growth-focused: We support learning, development, and career progression. Whether you're deepening your expertise or exploring new paths, we'll back you.
- Purpose-driven: Your work will help clients navigate legal challenges with confidence and clarity, making a real difference in their lives and businesses.
SOC Analyst employer: TLT LLP
Contact Detail:
TLT LLP Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst
✨Network Like a Pro
Get out there and connect with folks in the industry! Attend cyber security meetups, webinars, or conferences. You never know who might have a lead on your dream SOC Analyst role.
✨Show Off Your Skills
When you get the chance to chat with potential employers, don’t hold back! Share specific examples of how you've tackled security incidents or improved detection processes. Let them see your analytical skills in action!
✨Tailor Your Approach
Before any interview, do your homework on the company’s security posture and recent incidents. Tailor your responses to show how your experience aligns with their needs. It’ll make you stand out as a candidate who truly gets it.
✨Apply Through Us!
Don’t forget to check out our website for the latest SOC Analyst openings. Applying directly through us not only gives you a better shot but also keeps you in the loop about our people-first culture and growth opportunities!
We think you need these skills to ace SOC Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with SIEM platforms, KQL queries, and incident response. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cyber security and how your previous experiences have prepared you for this role. Let us know why you’re excited about joining our team at StudySmarter.
Showcase Your Technical Skills: Don’t forget to mention your technical skills! Whether it’s scripting in Python or PowerShell, or your experience with threat hunting, we want to see how you can contribute to our security operations team.
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It helps us keep track of your application and ensures you don’t miss any important updates from us!
How to prepare for a job interview at TLT LLP
✨Know Your Tools
Make sure you’re familiar with the SIEM platforms mentioned in the job description, like Sentinel and Defender. Brush up on how to operate, tune, and configure these tools, as well as writing KQL queries. Being able to discuss your hands-on experience with these technologies will show that you’re ready to hit the ground running.
✨Showcase Your Incident Response Skills
Prepare to talk about specific incidents you've handled in the past. Be ready to explain your approach to investigating security incidents, performing root cause analysis, and the steps you took for containment. This will demonstrate your analytical skills and problem-solving abilities, which are crucial for a SOC Analyst.
✨Highlight Your Automation Experience
Since automation is key in this role, be prepared to discuss any scripting you've done in Python or PowerShell. Share examples of how you’ve automated detection and response workflows, and how this has improved efficiency in your previous roles. This will show your proactive approach to enhancing security operations.
✨Emphasise Collaboration
The job requires working closely with various teams, so be ready to discuss your experience collaborating with infrastructure, cloud, and application teams. Highlight any successful projects where teamwork was essential, and how you contributed to improving the overall security posture. This will align with the company’s people-first culture.