Senior SOC Analyst

Intaso United Kingdom
Remote
Apply
AI Summary

Join a global leader in Data Security and Insider Risk as a Senior SOC Analyst. This role involves leading incident response, threat hunting, and forensics analysis. The ideal candidate has 3+ years of experience in a dedicated SOC or Incident Response role.

Key Highlights
Lead incident response and threat hunting
Conduct deep-dive analysis into malicious files and user behavior
Provide clear briefings to technical and non-technical leadership
Key Responsibilities
Incident Response
Threat Hunting
Forensics & Analysis
Stakeholder Communication
Technical Skills Required
SIEM EDR Data Security Platforms File Integrity Monitoring TCP/IP Active Directory Windows/Linux internals AWS Azure M365
Benefits & Perks
Up to £65,000 base salary
Performance bonus
Benefits
Fully remote work
Nice to Have
GCIH
GCIA
SC-200

Job Description


Job Title: SOC Analyst (L2/L3)

Location: Fully Remote (UK Based)

Salary: Up to £65,000 + Performance Bonus + Benefits

Employment Type: Full-Time


The Opportunity

We are representing a global leader in Data Security and Insider Risk to find a high-calibre SOC Analyst to join their internal security operations. This isn't your typical "ticket-churning" MSP role. You will be part of a sophisticated, data-centric security team focused on protecting critical infrastructure and high-value data assets.

If you are a security professional who loves hunting through logs, identifying complex lateral movement, and automating responses rather than just staring at a dashboard—this is for you.


Key Responsibilities

  • Incident Response: Lead the detection, triage, and remediation of security events across cloud, on-prem, and hybrid environments.
  • Threat Hunting: Proactively search for undetected threats using SIEM, EDR, and specialized Data Security Platforms.
  • Alert Optimization: Work closely with the engineering team to tune detection logic, reducing "noise" and improving True Positive rates.
  • Forensics & Analysis: Conduct deep-dive analysis into malicious files, suspicious emails, and anomalous user behaviour.
  • Stakeholder Communication: Provide clear, concise briefings to technical and non-technical leadership during high-priority incidents.


Your Technical Profile

We are looking for a candidate who is "curious by nature" and possesses:

  • Experience: 3+ years in a dedicated SOC or Incident Response role.
  • The "Data" Mindset: Strong understanding of Data Security Platforms (DSPM) or File Integrity Monitoring (FIM) is highly desirable.
  • Technical Stack: Proficiency with modern SIEMs (e.g., Sentinel, Splunk) and EDR tools (e.g., CrowdStrike, SentinelOne).
  • Networking & OS: Deep knowledge of TCP/IP, Active Directory, and Windows/Linux internals.
  • Cloud Proficiency: Comfortable investigating incidents within AWS, Azure, or M365 environments.
  • Certifications (Bonus): GCIH, GCIA, SC-200, or equivalent industry-recognized credentials.


Why Join This Team?

  • Competitive Package: Up to £65k base plus a rewarding bonus structure.
  • Advanced Tooling: You will have access to enterprise-grade, cutting-edge security proprietary tools that most analysts only dream of using.
  • Growth Path: Clear progression into Senior SOC, Incident Response Lead, or Security Engineering.


Similar Jobs

Explore other opportunities that match your interests

Penetration Tester

Cyber Security
3h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Associate

dionach by nomios

United Kingdom

Information Security Specialist

Cyber Security
4h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

Vero HR

United Kingdom

Security Architect

Cyber Security
8h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Synapri

United Kingdom

Subscribe our newsletter

New Things Will Always Update Regularly