Security Operations Center Analyst in Newport
Security Operations Center Analyst

Security Operations Center Analyst in Newport

Newport Full-Time 32400 - 54000 £ / year (est.) Home office (partial)
Go Premium
TRIA

At a Glance

  • Tasks: Monitor security alerts, investigate incidents, and automate detection workflows.
  • Company: Forward-thinking IT security company based in Bristol.
  • Benefits: Competitive salary, strong benefits, and flexible hybrid working.
  • Why this job: Join a dynamic team and make a real impact on security operations.
  • Qualifications: Experience with SIEM tools, Microsoft security stack, and scripting skills.
  • Other info: Great career growth opportunities and excellent work-life balance.

The predicted salary is between 32400 - 54000 £ per year.

Location: Bristol

Hybrid: 2 days onsite

Salary: $45,000

Permanent (Must have Internal/ In-house SOC Experience)

I'm working with a company that's continuing to invest in and grow their IT Security function and is now looking to bring in a skilled SOC Analyst. This is a great opportunity to join a forward-thinking security operations team, where you'll have hands-on ownership across threat detection, incident response, and overall security posture, alongside a competitive salary, strong benefits, and clear long-term development opportunities. The role offers flexible, hybrid working with only monthly office attendance, and they're open to candidates from general SOC or InfoSec backgrounds; sector experience is a bonus, not a requirement.

What you'll be doing:

  • Operate, tune and configure SIEM tools
  • Monitor and triage security alerts, applying custom queries (e.g. KQL) and correlation rules to detect suspicious activity.
  • Investigate security incidents across endpoints, networks, and cloud environments; perform root-cause analysis, impact assessment and containment actions.
  • Develop and maintain detection rules, use cases, threat-intelligence processes, and incident response playbooks.
  • Automate detection and response workflows, using scripting tools (e.g. Python, PowerShell).
  • Perform threat-hunting, log-analysis (including firewall, web/email filters), implement or review DLP controls, and collaborate with infrastructure/cloud/application teams on remediation and security posture improvements.

What we're looking for:

  • Strong working knowledge of Microsoft security stack (e.g. Sentinel, Defender) and hands-on experience with SIEM tooling, alerts triage, detection logic, and security incident workflows.
  • Ability to write and optimise detection queries (e.g. in KQL), review firewall and security logs, manage email/web filtering policies, and implement/review Data Loss Prevention (DLP) controls.
  • Experience with automation or scripting (e.g. Python, PowerShell) to streamline detection/response and improve SOC efficiency.
  • Threat-hunting and analytical mindset; proactive and collaborative approach; good communication skills and ability to work across teams.

If you're looking to join an established team that will aid career growth, whilst offering an excellent work-life balance. Apply NOW.

Security Operations Center Analyst in Newport employer: TRIA

Join a dynamic and innovative IT Security team in Bristol, where your expertise as a SOC Analyst will be valued and nurtured. With a strong focus on employee development, flexible hybrid working arrangements, and a commitment to enhancing security operations, this company offers a supportive work culture that prioritises work-life balance and career progression. Enjoy competitive salaries and comprehensive benefits while contributing to a forward-thinking environment that encourages collaboration and continuous learning.
TRIA

Contact Detail:

TRIA Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Security Operations Center Analyst in Newport

✨Tip Number 1

Network like a pro! Reach out to current SOC Analysts or IT Security professionals on LinkedIn. Ask them about their experiences and any tips they might have for landing a role in a security operations team.

✨Tip Number 2

Show off your skills! If you’ve got experience with SIEM tools or scripting, create a small project or write a blog post about it. This not only showcases your expertise but also gives you something to discuss during interviews.

✨Tip Number 3

Prepare for the interview by brushing up on common SOC scenarios. Think about how you would handle specific incidents or alerts. Practising these responses can really help you stand out as a candidate.

✨Tip Number 4

Don’t forget to apply through our website! We’re always looking for talented individuals to join our team. Plus, applying directly can sometimes give you an edge over other candidates.

We think you need these skills to ace Security Operations Center Analyst in Newport

SIEM Tools
KQL
Incident Response
Root-Cause Analysis
Threat Detection
Automation
Scripting (Python, PowerShell)
Threat-Hunting
Log Analysis
Data Loss Prevention (DLP)
Microsoft Security Stack (Sentinel, Defender)
Communication Skills
Collaboration
Analytical Mindset

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your SOC experience and relevant skills. We want to see how your background aligns with the role, so don’t be shy about showcasing your hands-on experience with SIEM tools and incident response.

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about IT security and how you can contribute to our team. We love seeing enthusiasm and a proactive mindset!

Show Off Your Technical Skills: When filling out your application, be specific about your technical skills, especially with Microsoft security stack and scripting languages like Python or PowerShell. We’re keen to know how you’ve used these in past roles.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for this exciting opportunity. Don’t miss out!

How to prepare for a job interview at TRIA

✨Know Your Tools Inside Out

Make sure you’re well-versed in the Microsoft security stack and SIEM tools mentioned in the job description. Brush up on your skills with KQL for writing detection queries, and be ready to discuss how you've used these tools in past roles.

✨Show Off Your Incident Response Skills

Prepare to talk about specific incidents you've handled in the past. Highlight your approach to root-cause analysis and how you’ve managed containment actions. Real-life examples will demonstrate your hands-on experience and problem-solving abilities.

✨Demonstrate Your Automation Know-How

Since automation is key in this role, be ready to discuss any scripting you've done with Python or PowerShell. Share examples of how you’ve automated detection and response workflows to improve SOC efficiency.

✨Be Proactive and Collaborative

This role requires a proactive mindset and good communication skills. Prepare to discuss how you’ve collaborated with other teams in the past to enhance security posture. Show that you can work well across different departments and are eager to contribute to a team environment.

Security Operations Center Analyst in Newport
TRIA
Location: Newport
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>