Security Operations (SOC) AnalystRemote, UK37.5 hours per week, 24/7 coverage in an 8-hour rotating shift patternUp to £35k
Our client, a Microsoft Security Partner and leader in security solutions, delivers outsourced security event monitoring and incident response services to a diverse client base using a Microsoft-centric technology stack. They’re looking for an experienced SOC Analyst to join their growing team, providing critical security services for both internal and external clients.
This role is ideal for candidates currently in SOC or cybersecurity positions, particularly those with experience in Entra ID, Defender, Microsoft 365, and Intune, who are eager to expand their expertise in a Microsoft-focused security environment. The company prioritizes employee development, offering full support for earning Microsoft certifications, including the Security Operations Analyst (SC-200) and Security Administrator Associate credentials.
Key Responsibilities:
- Event Handling: Receive, categorize, and respond to events, incidents, and customer requests.
- Incident Management: Conduct initial triage, escalating or assigning incidents as appropriate.
- Alert Investigation: Investigate alerts and work with customers to confirm resolutions.
- Shift Pattern: Adhere to a 24/7 rotating shift schedule (details below).
Essential Experience:
- Minimum of 1-2 years in a SOC or cybersecurity role.
- Proven experience with Microsoft 365 suite, Entra ID, Intune, and Defender.
- Strong understanding of Information Security principles.
- Proficiency in SIEM tools like Azure Sentinel and Endpoint Detection and Response (EDR) tools.
- Relevant Microsoft certification (SC-200 preferred).
- Excellent communication skills.
Desirable:
- SC-200 Certification
- Would be able to take the SC-200 and pass within the first 1-2 months of employment.
If this sounds like the right fit, please apply—interviews are scheduled for next week w/c 11th November.