×
Register Here to Apply for Jobs or Post Jobs. X

SOC Analyst

Job in Glasgow, Glasgow City Area, G1, Scotland, UK
Listing for: Areti Group | B Corp
Full Time position
Listed on 2025-12-31
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Network Security
Salary/Wage Range or Industry Benchmark: 55000 GBP Yearly GBP 55000.00 YEAR
Job Description & How to Apply Below
Position: 24 / 7 SOC Analyst

SOC Analyst – 24 / 7 Security Operations

  • Remote (UK) with occasional travel to the Reading office (once per month).
  • Travel costs supported, with breakfast and lunch provided when on-site.
  • Up to £55,000 per annum, plus a comprehensive benefits package.
  • Fully funded training and professional development, including industry certifications.
  • 24 / 7 Security Operations Centre, operating on a structured shift‑based rota.

Areti are delighted to be supporting a rapidly growing cyber security services provider in their search for an SOC Analyst to join their expanding 24 / 7 UK Security Operations Centre.

This organisation supports a wide range of enterprise customers across Europe, helping them secure and connect complex digital environments. As part of continued investment in round‑the‑clock security operations, they are looking for an analyst with strong technical foundations who is keen to develop their investigation capability within a modern, continuously evolving SOC.

This role is well suited to someone early in their SOC career, or an infrastructure / networking professional looking to transition into cyber security operations.

The Role

As an SOC Analyst, you’ll be working on the frontline of a 24 / 7 Security Operations Centre, monitoring, investigating, and escalating security events across diverse customer environments.

You’ll work closely with Senior and Lead Analysts, gaining hands‑on experience investigating real‑world incidents and understanding attacker behaviour. You’ll use industry‑leading platforms including Microsoft Sentinel, Google Sec Ops, Defender XDR, Crowd Strike Falcon, Sentinel One, and Cortex XSOAR / XSIAM to determine what has happened, how activity progressed, and what actions are required.

You’ll be supported through structured training, cyber ranges, and continuous exposure to modern SOC technologies, enabling you to grow quickly in a supportive, technically driven environment.

This SOC places a strong emphasis on development, with clear progression pathways into Threat Intelligence, SOC Engineering, Professional Services, Senior SOC roles, and Incident Response.

Key Responsibilities Detect & Investigate
  • Monitor and triage alerts across SIEM, EDR / XDR, email, and web security platforms.
  • Investigate suspicious activity and assess escalation requirements.
  • Follow SOC runbooks and structured investigation workflows.
  • Build clear timelines of activity and maintain accurate investigation notes.
  • Escalate complex cases to Senior and Lead Analysts with appropriate context.
  • Review vulnerability management outputs and provide basic prioritisation insight.
Hunt & Improve
  • Participate in directed threat hunting activities.
  • Suggest improvements to detections, dashboards, and SOC runbooks.
  • Support testing and validation of new detection logic and use cases.
Collaborate & Communicate
  • Provide clear written updates to customers and internal stakeholders.
  • Participate in structured shift handovers to ensure continuity within a 24 / 7 SOC.
  • Work closely with senior analysts to build technical depth and capability.
About You

You’ll be a motivated, analytical individual with a strong interest in cyber security operations. You enjoy problem‑solving, thrive in fast‑paced environments, and work well as part of a collaborative team.

Required experience
  • Minimum 1 year in a Security Operations Centre, or 3+ years in infrastructure or networking roles with demonstrable security exposure.
  • Experience triaging and investigating security alerts.
  • Understanding of attacker behaviours, TTPs, and common attack chains.
  • Ability to recognise indicators of compromise (processes, network activity, logons, file changes).
  • Hands‑on experience with at least one SIEM, EDR, or XDR platform.
  • Familiarity with ticketing tools such as Service Now, JIRA, or Salesforce.
  • Experience reviewing Windows authentication / event logs and basic process trees.
  • Understanding of core network protocols (DNS, HTTP, SMB, LDAP).
  • Operational knowledge of Windows, macOS, and Linux.
  • Awareness of MITRE ATT&CK and the ability to distinguish legitimate vs suspicious activity.
Desirable experience
  • Exposure to Microsoft Sentinel, Google Sec Ops, or other SIEM platforms.
  • Experience with…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary