×
Register Here to Apply for Jobs or Post Jobs. X

SOC Analyst

Job in City Of London, Central London, Greater London, England, UK
Listing for: Experis
Contract position
Listed on 2025-12-21
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Network Security
Job Description & How to Apply Below
Location: City Of London

Job Title: SOC Analyst (x3 Roles)

Location: On‑site, London moving to hybrid 3 days on‑site after 2‑week induction
Start Date: Immediate

Contract length: 31/03/26 further extensions expected
Clearance Required: BPSS (must be obtained prior to onboarding)
Day rate: 400 – 500

Overview

Our client is seeking three hands‑on SOC Analysts to join a security operations team in London. These roles are focused on real‑time monitoring, investigation, and incident response across a modern enterprise security environment. Collectively, the team must cover a broad set of security technologies, and candidates who bring strong, recent experience in at least two of the listed tools will be prioritised.

Key Responsibilities
  • Monitor, triage, and respond to security alerts across multiple platforms, including Microsoft and endpoint security tools.
  • Conduct in‑depth investigations of security events, escalating and containing incidents as required.
  • Optimise and tune detection rules, policies, and alerting mechanisms to improve SOC efficiency.
  • Collaborate with internal teams to support security operations, threat analysis, and incident recovery.
  • Produce clear incident documentation, reports, and recommendations for continuous improvement.
  • Contribute to maintaining and enhancing SOC processes, runbooks, and operational workflows.
Required Technical Expertise

Across the three hires, the team must collectively cover the following skill sets;
individual candidates should possess strong expertise in at least two
:

Microsoft Security Stack
  • Experience triaging and managing Microsoft security alerts from the Microsoft Security Center / Microsoft Defender portal
  • Microsoft Defender for Endpoint (MDE): advanced or enterprise‑level operational expertise, including investigations, threat hunting, and response
Trellix (ePO)
  • Hands‑on experience with configuration, policy management, agent deployment, and alert handling
Sentinel One
  • SOC operations experience including tuning, alert triage, threat investigation, and incident response
General Requirements
  • Proven experience in a hands‑on SOC Analyst role within an enterprise environment
  • Strong understanding of security operations, threat detection, and incident response workflows
  • Excellent communication skills and the ability to work effectively within a collaborative SOC team
Desirable Skills
  • Experience with incident documentation and reporting
  • Familiarity with security frameworks (MITRE ATT&CK, NIST, ISO 27001)
  • Ability to adapt quickly to new tools, threats, and operational priorities
  • Any relevant certifications (e.g., Security+, CySA+, Microsoft SC‑series, GIAC)
#J-18808-Ljbffr
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary