Cyber Security SOC Incident Analyst
📍 Milton Keynes
💰 £40,000 + Benefits
Are you a driven Cyber Security professional looking to take the next step in your SOC career? Our client is looking for a proactive and detail-oriented SOC Incident Analyst to join a high-performing Cyber Security Operations team, supporting a diverse client base across multiple sectors.
🔐 The Opportunity
In this role, you’ll be at the frontline of cyber defence—monitoring, detecting, and responding to security threats in a fast-paced 24/7 Security Operations Centre. You’ll play a key role in protecting critical systems and data, working with cutting-edge technologies and collaborating with experienced security professionals.
This is an excellent opportunity for someone with SOC or strong infrastructure experience looking to deepen their expertise in modern security operations.
🛠️ Key Responsibilities
- Monitor, triage, and respond to security incidents using SIEM tools such as Microsoft Sentinel
- Investigate and resolve alerts, escalating where necessary
- Support a 24/7 SOC rota (including nights and weekends)
- Manage and maintain SOC tools, configurations, and updates
- Follow ITIL-based processes for incident, problem, and service management
- Produce regular reports and analytics on security incidents
- Contribute to continuous improvement of SOC processes and services
🎯 What We’re Looking For
- Experience in a SOC Analyst role or strong systems administration background with security exposure
- Hands-on experience with Microsoft Sentinel and Microsoft Defender technologies
- Good understanding of networking concepts (DNS, IP, routing, SSL, etc.)
- Familiarity with cloud environments (Azure preferred)
- Experience with Windows and/or Linux administration
- Strong analytical and problem-solving skills
- Ability to work independently and make sound decisions under pressure
✅ Certifications & Requirements
- SC-200 (Microsoft Security Operations Analyst) – required or willing to achieve during probation
- Other certifications such as Security+ are beneficial
- Ability to obtain Security Clearance (SC)
🌟 Desirable Skills
- Experience with SIEM tools such as Graylog
- Scripting or programming (PowerShell, Python, etc.)
- Knowledge of hybrid AD / Entra ID environments
- Exposure to Cloudflare or similar technologies
- ITIL Foundation certification
💡 What’s in It for You?
- Exposure to a wide range of technologies and industries
- Supportive team environment with strong development focus
- Clear progression opportunities within Cyber Security
If you're passionate about cyber security and want to make a real impact in a growing SOC environment, we’d love to hear from you.