Managing and investigating escalated security incidents
Analysing alerts and assessing business impact
Applying threat intelligence and recommending appropriate response and escalation actions
Working closely with Level 1 analysts, senior incident responders, and resolver teams to ensure incidents are handled effectively and documented clearly
Requirements
Demonstrable experience working in a Security Operations Centre (SOC) or equivalent cyber security operations role
Demonstrable experience using Microsoft Sentinel and Microsoft Defender for Endpoint in a live SOC environment
Strong understanding of enterprise security concepts, including endpoint security, identity threats, malware behaviour, and lateral movement
Industry certifications such as: SC‑200 (Microsoft Security Operations Analyst)
Bsc Computing in Engineering or information systems
CompTIA Security+
CEH or equivalent
Strong Scripting or automation experience (e.g. KQL, PowerShell, Python ) to enhance investigation efficiency
Experience working in regulated or high‑security environments (e.g. government, critical national infrastructure)
Exposure to MITRE ATT&CK mapping , detection engineering, or purple‑team activities
Experience contributing to SOC reporting, dashboards, or executive summaries
Tech Stack
Cyber Security
Python
Benefits
23 days’ holiday , rising to 27 (pro rata) – plus the option to buy more after qualifying period
Paid volunteering day with a charity of your choice
Generous family leave policies – including 15 weeks’ fully paid maternity, adoption, and shared parental leave
Cycle2Work scheme , pension, life assurance, and more