×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Security SOC Analyst

Job in Batley, West Yorkshire, WF17, England, UK
Listing for: Wavenet
Full Time position
Listed on 2025-12-30
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below

Company Description

Wavenet is a managed services provider offering cybersecurity, communications, and connectivity that grows with our customers' businesses - no matter what the future holds.

Since 2000, we've been keeping businesses connected.

At Wavenet, we don't just provide solutions for today but for tomorrow, too. We're always thinking ahead of the technology curve, so our customers feel confident that when they work with us, we're striving to make their business future-proof.

Customer success is our success. We go the extra mile in providing superior service quality and unparalleled customer experience, becoming an extension of your business, and always delivering on our promise to make their business brilliant.

Job Description Join the Front Line of Cyber Defence

We're seeking a driven and detail-oriented Level 1 SOC Analyst to become part of our expanding Security Operations Center. This is a fantastic opportunity for individuals with foundational knowledge in cybersecurity or IT support who are eager to advance their careers in threat detection, incident response, and real-time security monitoring.

In this dynamic, client-facing role, you'll monitor, investigate, and respond to security alerts using cutting-edge tools such as Microsoft Sentinel, Microsoft Defender for Endpoint, Microsoft Defender XDR, Crowd Strike Falcon, and Rapid
7. You'll collaborate closely with experienced analysts, benefit from mentorship, and gain valuable exposure to a wide range of cyber threats and diverse client environments.

Key Responsibilities
  • Monitor and triage security alerts across multiple platforms and technologies (SIEM, EDR, XDR, etc.).
  • Investigate potential security incidents and elevate according to established protocols.
  • Collaborate with senior analysts and threat response teams to resolve incidents effectively.
  • Maintain comprehensive documentation of investigations, incidents, and actions taken.
  • Provide essential guidance and support to clients regarding incident handling and threat mitigation.
  • Assist in the development and fine-tuning of detection rules, threat-hunting queries, and analytics.
  • Stay informed about emerging threats, tactics, and technologies to enhance your expertise continually.

This role is perfect for those ready to contribute to our mission of safeguarding our clients' digital assets while developing their own skills in a fast-paced, supportive environment.

Qualifications Technical Skills SIEM & Log Analysis
  • Experience with SIEM platforms, such as Microsoft Sentinel or Rapid
    7.
  • Proficient in querying and analyzing log data; familiarity with Kusto Query Language (KQL) is a plus.
  • Knowledge of alert tuning, correlation rules, and threat hunting methodologies.
Endpoint Security (EDR)
  • Hands-on experience with EDR tools, such as Crowd Strike Falcon, Microsoft Defender for Endpoint, or Carbon Black.
  • Ability to interpret endpoint logs and identify signs of compromise.
Malware Analysis (Basic)
  • Understanding of malware behaviour, Indicators of Compromise (IoCs), and basic sandboxing or analysis techniques.
Network Security
  • Knowledge of key protocols (TCP/IP, HTTP/S, DNS, SMB, RDP) and concepts such as IDS/IPS, VPNs, firewalls, and network-based threat detection.
Cloud Security
  • Familiarity with security monitoring in cloud environments, especially Microsoft Azure.
  • Basic understanding of cloud-native security tools and logging (e.g., Azure Security Center).
Other Qualifications
  • Bachelor's degree in Cybersecurity, Information Technology, or a related field-or equivalent hands‑on experience.
  • Strong attention to detail and ability to follow structured processes and documentation.
  • Excellent communication skills – both written and verbal – for effective client interaction and team collaboration.
  • A security-focused, ethical mindset with a passion for continuous learning.
  • Comfortable working in a collaborative, 24/7 shift-based SOC environment.
Desirable Certifications (Not Mandatory)

While not required, the following certifications are a plus:

  • CompTIA Security+ – A foundational certification in cybersecurity.
  • Microsoft SC-200 – Security Operations Analyst (focused on Microsoft Defender and Sentinel).
  • BTL1 – Blue Team Level 1,…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary