Security Operations Center Analyst
Security Operations Center Analyst

Security Operations Center Analyst

Colchester Full-Time 35000 - 41000 £ / year (est.) No home office possible
Go Premium
Undisclosed

At a Glance

  • Tasks: Monitor security incidents and respond to threats using advanced SIEM tools.
  • Company: Join a global consultancy with a strong focus on technology and career growth.
  • Benefits: Enjoy competitive salary, health cover, flexible working, and generous holiday allowance.
  • Why this job: Make a real difference in cybersecurity while developing your skills in a dynamic environment.
  • Qualifications: Must have SC Clearance or be eligible, plus experience with SIEM technologies.
  • Other info: Be part of a rapidly growing team with excellent training and development opportunities.

The predicted salary is between 35000 - 41000 £ per year.

ROLE TITLE: SOC Analyst

LOCATION: flexible (can be mostly remote, must be based in UK)

CLEARANCE: SC cleared, or eligible for SC clearance

Salary: £35k – £41k

The ideal candidate will have active SC Clearance or be eligible to undergo SC Clearance.

We are actively looking to secure an SOC Analyst to join Experis.

Experis Consultancy is a Global entity with a well-established team with over 1000 consultants on assignment across 20 clients globally. Our UK operation is growing and has very aggressive plans for expansion over the coming years. We form part of the Manpower group of companies that turn over $20 billion a year collectively.

Experis UK have partnerships with major clients across the UK spanning multiple industries; our approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development.

Key accountabilities of the role

  • A SOC Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers.
  • They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement
  • The role involves working alongside other team members including SOC engineers and Service Managers.

Skills required:

  • Microsoft Certified: Security Operations Analyst Associate Certification (SC200) is a mandatory requirement for role fulfilment
  • Experience working with SIEM technologies and security tooling
  • An understanding of IT Infrastructure and Networking An understanding of vulnerability and threat management
  • An understanding of the incident response lifecycle T
  • he ability to work in a close team and independently
  • The ability to be adaptable to a high pace changeable workload
  • An interest in security and threat management

Benefits Include:

  • Contributory pension scheme
  • Employee Assistance Program
  • Medical and Dental cover
  • 22 days holiday + bank holidays
  • Maternity Pay/Shared Parental leave and paternity leave
  • Sick pay

Suitable Candidates should submit CVs in the first instance.

Security Operations Center Analyst employer: Undisclosed

Experis is an exceptional employer, offering a flexible working environment that allows SOC Analysts to thrive, whether remotely or in the office. With a strong commitment to employee development and a culture that prioritises personal connections, we provide extensive training opportunities and a supportive atmosphere, ensuring that our team members can grow their careers while contributing to meaningful projects across various industries in the UK.
Undisclosed

Contact Detail:

Undisclosed Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Security Operations Center Analyst

✨Tip Number 1

Network like a pro! Reach out to current SOC Analysts or professionals in the field on LinkedIn. Ask them about their experiences and any tips they might have for landing a role like this.

✨Tip Number 2

Get your hands dirty with some practical experience. Set up a home lab to play around with SIEM tools like Qradar or Sentinel. The more you know, the better you'll stand out in interviews!

✨Tip Number 3

Prepare for those tricky interview questions! Brush up on your knowledge of incident response and threat management. We recommend practising with a friend or using mock interview platforms.

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!

We think you need these skills to ace Security Operations Center Analyst

SC Clearance
SIEM Tools (Qradar, Sentinel, LogRhythm)
Security Analytics
Incident Investigation
Threat Monitoring and Response
Trend Reporting
Rule Tuning
Microsoft Certified: Security Operations Analyst Associate Certification (SC200)
IT Infrastructure Understanding
Networking Understanding
Vulnerability Management
Incident Response Lifecycle Understanding
Team Collaboration
Adaptability to Change

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience with SIEM tools and any relevant certifications like the Microsoft Certified: Security Operations Analyst Associate. We want to see how your skills match what we're looking for!

Showcase Your Skills: In your application, don’t just list your skills—show us how you've used them in real situations. Talk about your experience with incident investigation or threat monitoring. We love seeing practical examples that demonstrate your expertise!

Keep It Clear and Concise: When writing your application, keep it clear and to the point. Use bullet points where possible to make it easy for us to read. We appreciate a well-structured application that gets straight to the important bits!

Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy and ensures your application goes directly to us. Don’t miss out on this opportunity—hit that apply button!

How to prepare for a job interview at Undisclosed

✨Know Your SIEM Tools

Make sure you brush up on your knowledge of SIEM tools like Qradar, Sentinel, and LogRhythm. Be ready to discuss how you've used these technologies in past roles or projects, as this will show your practical experience and understanding of the tools.

✨Understand the Incident Response Lifecycle

Familiarise yourself with the incident response lifecycle. Be prepared to explain how you would handle different types of security incidents, from detection to recovery. This shows that you not only understand the theory but can also apply it in real-world scenarios.

✨Show Your Team Spirit

Since the role involves working closely with SOC engineers and Service Managers, highlight your teamwork skills. Share examples of how you've collaborated with others in high-pressure situations, demonstrating your ability to adapt and thrive in a dynamic environment.

✨Express Your Passion for Security

Let your enthusiasm for security and threat management shine through. Talk about any relevant certifications, training, or personal projects that showcase your commitment to staying updated in the field. This passion can set you apart from other candidates.

Security Operations Center Analyst
Undisclosed
Location: Colchester
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>