At a Glance
- Tasks: Monitor security alerts, investigate incidents, and automate detection workflows.
- Company: Forward-thinking company investing in IT Security with a collaborative culture.
- Benefits: Competitive salary, strong benefits, flexible hybrid working, and career development opportunities.
- Why this job: Join a dynamic team and make a real impact on security operations.
- Qualifications: Experience with Microsoft security tools, SIEM, and scripting languages like Python.
- Other info: Great work-life balance and only monthly office attendance required.
The predicted salary is between 36000 - 60000 £ per year.
I’m working with a company that’s continuing to invest in and grow their IT Security function and is now looking to bring in a skilled SOC Analyst. This is a great opportunity to join a forward-thinking security operations team, where you’ll have hands-on ownership across threat detection, incident response, and overall security posture, alongside a competitive salary, strong benefits, and clear long-term development opportunities. The role offers flexible, hybrid working with only monthly office attendance, and they’re open to candidates from general SOC or InfoSec backgrounds; sector experience is a bonus, not a requirement.
What you’ll be doing:
- Operate, tune and configure SIEM tools
- Monitor and triage security alerts, applying custom queries (e.g. KQL) and correlation rules to detect suspicious activity.
- Investigate security incidents across endpoints, networks, and cloud environments; perform root-cause analysis, impact assessment and containment actions.
- Develop and maintain detection rules, use cases, threat-intelligence processes, and incident response playbooks.
- Automate detection and response workflows, using scripting tools (e.g. Python, PowerShell).
- Perform threat-hunting, log-analysis (including firewall, web/email filters), implement or review DLP controls, and collaborate with infrastructure/cloud/application teams on remediation and security posture improvements.
What we’re looking for:
- Strong working knowledge of Microsoft security stack (e.g. Sentinel, Defender) and hands-on experience with SIEM tooling, alerts triage, detection logic, and security incident workflows.
- Ability to write and optimise detection queries (e.g. in KQL), review firewall and security logs, manage email/web filtering policies, and implement/review Data Loss Prevention (DLP) controls.
- Experience with automation or scripting (e.g. Python, PowerShell) to streamline detection/response and improve SOC efficiency.
- Threat-hunting and analytical mindset; proactive and collaborative approach; good communication skills and ability to work across teams.
If you’re looking to join an established team that will aid career growth, whilst offering an excellent work-life balance.
Security Operations Center Analyst employer: TRIA
Contact Detail:
TRIA Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Center Analyst
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. We all know that sometimes it’s not just what you know, but who you know that can help you land that SOC Analyst role.
✨Tip Number 2
Get your hands dirty with practical skills! Dive into some online labs or simulations related to SIEM tools and threat detection. We believe that showing off your practical experience can really set you apart during interviews.
✨Tip Number 3
Prepare for those tricky interview questions! Brush up on your knowledge of Microsoft security stack and be ready to discuss your experience with KQL and incident response. We want you to feel confident and ready to impress!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. We’re here to support you every step of the way in landing that dream job!
We think you need these skills to ace Security Operations Center Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with SIEM tools and any relevant security incidents you've handled. We want to see how your skills align with the SOC Analyst role, so don’t be shy about showcasing your achievements!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about IT security and how your background makes you a great fit for our team. We love seeing enthusiasm and a proactive mindset!
Show Off Your Technical Skills: When filling out your application, be sure to mention your experience with scripting languages like Python or PowerShell. We’re keen on candidates who can automate processes and improve SOC efficiency, so let us know what you’ve done!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for this exciting opportunity. Plus, it’s super easy!
How to prepare for a job interview at TRIA
✨Know Your Tools
Familiarise yourself with the Microsoft security stack, especially Sentinel and Defender. Be ready to discuss your hands-on experience with SIEM tools and how you've used them in past roles.
✨Showcase Your Scripting Skills
Prepare examples of how you've used scripting languages like Python or PowerShell to automate detection and response workflows. Highlight any specific projects where your automation made a significant impact.
✨Demonstrate Your Analytical Mindset
Be prepared to discuss your approach to threat-hunting and incident investigation. Share specific instances where you performed root-cause analysis and how you collaborated with teams to improve security posture.
✨Communicate Effectively
Practice articulating complex security concepts in simple terms. Good communication is key, so think about how you can explain your technical skills and experiences to non-technical stakeholders.