SOC Analyst

Posted 17 October 2025
Salary Competitive
LocationLondon
Job type Contract
Discipline Cyber Security
Reference75241
Remote working Hybrid/Flexible

Job description

SOC Analyst

Location: Reading (Hybrid – 3 days onsite per week)
Contract Type: Contract (Inside IR35)
Duration: 6 Months
Day Rate: £382.50 per day Inside IR35


The Role

We are seeking an experienced SOC Level 2 Analyst to join our Security Operations Center, supporting threat detection, investigation, and response across enterprise systems. You’ll work with leading security technologies, responding to advanced threats and guiding L1 analysts in a fast-paced, collaborative environment.


Key Responsibilities

  • Investigate and remediate complex security incidents including malware, ransomware, and APTs.

  • Handle escalations from Tier 1 analysts and provide technical mentoring.

  • Analyze and correlate alerts using SIEM and EDR tools such as Splunk and Microsoft Defender.

  • Perform forensic analysis to identify root causes and recommend containment and recovery actions.

  • Develop detection use cases, improve processes, and maintain accurate incident documentation.

  • Collaborate with IT and security teams to strengthen overall detection and response capability.


Essential Skills & Experience

  • 6–8 years in cybersecurity, with strong SOC or incident response experience.

  • Proficient in SIEM (Splunk, ArcSight) and EDR (Defender, CrowdStrike, Carbon Black).

  • Strong knowledge of digital forensics, malware analysis, and threat hunting.

  • Skilled across Windows, Linux, and cloud environments.

  • Familiar with frameworks such as MITRE ATT&CK, NIST, and ISO 27001.

  • Scripting experience (Python, PowerShell) beneficial.


Preferred Certifications

  • SOC-related (CySA+, Blue Team L1, GCIH, GCIA, GCFA).

  • CISSP or equivalent desirable.


Additional Information

  • Fast-paced environment; occasional out-of-hours work may be required.