Location:
City of London Job Type: Contract Industry: Cyber Security Job reference: BBBH428499_1764192799 Posted: 3 days ago Job Title: SOC Analyst (x3 Roles)Location: On-site, London moving to hybrid 3 days on-site after 2-week induction
Start Date: ImmediateContract length: 31/03/26 further extensions expected
Clearance Required: BPSS (must be obtained prior to onboarding)
Day rate: £400 - £500 OverviewOur client is seeking three hands-on SOC Analysts to join a security operations team in London. These roles are focused on real-time monitoring, investigation, and incident response across a modern enterprise security environment. Collectively, the team must cover a broad set of security technologies, and candidates who bring strong, recent experience in at least two of the listed tools will be prioritised.Key ResponsibilitiesMonitor, triage, and respond to security alerts across multiple platforms, including Microsoft and endpoint security tools.Conduct in-depth investigations of security events, escalating and containing incidents as required.Optimise and tune detection rules, policies, and alerting mechanisms to improve SOC efficiency.Collaborate with internal teams to support security operations, threat analysis, and incident recovery.Produce clear incident documentation, reports, and recommendations for continuous improvement.Contribute to maintaining and enhancing SOC processes, runbooks, and operational workflows.Required Technical ExpertiseAcross the three hires, the team must collectively cover the following skill sets; individual candidates should possess strong expertise in at least two:Microsoft Security StackExperience triaging and managing Microsoft security alerts from the Microsoft Security Center / Microsoft Defender portalMicrosoft Defender for Endpoint (MDE): advanced or enterprise-level operational expertise, including investigations, threat hunting, and responseTrellix (ePO)Hands-on experience with configuration, policy management, agent deployment, and alert handlingSentinelOneSOC operations experience including tuning, alert triage, threat investigation, and incident responseGeneral RequirementsProven experience in a hands-on SOC Analyst role within an enterprise environmentStrong understanding of security operations, threat detection, and incident response workflowsExcellent communication skills and the ability to work effectively within a collaborative SOC teamDesirable SkillsExperience with incident documentation and reportingFamiliarity with security frameworks (MITRE ATT&CK, NIST, ISO 27001)Ability to adapt quickly to new tools, threats, and operational prioritiesAny relevant certifications (e.g., Security+, CySA+, Microsoft SC-series, GIAC)
Read Less