CrawlJobs Logo

SOC Cyber Analyst

outsource-uk.co.uk Logo

Outsource UK

Location Icon

Location:
United Kingdom , Hereford

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

55.90 GBP / Hour

Job Description:

BAE Systems are seeking a Level 1 SOC Cyber Analyst to join the TMCT security team within the FCAS DI function. This role will act as the first internal responder to cybersecurity alerts generated by our outsourced Security Operations Centre (SOC).

Job Responsibility:

  • Review and assess alerts escalated by the outsourced SOC, validating accuracy and determining potential impact
  • Perform first-line analysis using tools such as SIEM platforms, device logs and firewall logs
  • Work directly with end users and asset owners to gather additional information and guide immediate containment actions such as asset isolation or password resets
  • Escalate confirmed or high-severity incidents to Level 2 SOC analysts or internal response teams with clear and accurate documentation
  • Maintain detailed case notes, timelines and evidence within the case management system to support investigations and compliance requirements
  • Act as a key communication point between the internal security team and external SOC provider
  • Follow established triage and escalation procedures and suggest improvements where appropriate

Requirements:

  • 2–4 years’ experience in a SOC, IT operations or cybersecurity support role
  • Understanding of key cyber threats such as malware, phishing, lateral movement and privilege escalation
  • Working knowledge of network fundamentals, authentication systems and Windows/Linux system logs
  • Experience using SIEM platforms such as Microsoft Sentinel, Splunk, Elastic or QRadar
  • Experience using ticketing or case management systems such as Jira, ServiceNow or The Hive
  • Strong analytical and investigative skills with the ability to interpret alerts and security logs
  • Excellent written and verbal communication skills
  • Must be eligible for SC and DV clearance

Additional Information:

Job Posted:
March 21, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Cyber Analyst

AVP - SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Experience with Big Data Technologies, ETL Tools, Data Warehouse and Business Intelligence technologies is preferred
  • Experience with any scripting language and Splunk is a plus
  • Experience with vulnerability assessment as well as penetration testing or forensic analysis fields is a plus
  • Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, GWAPT and CFE]
  • 5-8 years of relevant experience in Cyber Fraud or SOC
Job Responsibility
Job Responsibility
  • The analyst performs monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms including Web Threat Detection, Real Time Fraud Risk Assessment, Big Data and Digital Application Monitoring tools (Splunk, SAS, Teradata, and enterprise real time fraud detection tools)
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

Cyber Security Soc Analyst

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detec...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
Job Responsibility
Job Responsibility
  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management
What we offer
What we offer
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

Digital Cyber Analyst

We are looking for a high-performing individual looking to advance their career ...
Location
Location
United Kingdom , Birmingham
Salary
Salary:
Not provided
bdo.co.uk Logo
BDO UK LLP
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in using SIEM, MDR, EDR, and SOAR technologies
  • Experience working as an analyst within a SOC
  • Familiarity with relevant coding languages, e.g. Python, SQL, Robin Script, KQL, Cypher, etc.
  • One or more relevant security certification e.g. Certified Ethical Hacker, Certified SOC Analyst, Microsoft SC-200, Security+, etc.
  • Bachelor's degree in Cyber/Information security
  • Resides in the UK
  • Fluent in English
Job Responsibility
Job Responsibility
  • Manage risk for our clients to make them stronger for the future
  • Help protect our global client base from cyber threats
What we offer
What we offer
  • Agile working
  • Programmes, resources, and frameworks that provide clarity and structure around career development
  • Informal success conversations to formal mentoring and coaching
  • State-of-the-art collaboration spaces in our offices
  • Multidisciplinary events and dedicated resources
Read More
Arrow Right

Advanced Cyber Defense Analyst

The Advanced Cyber Defense (ACD) team is a group inside the Citi Security Operat...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-6 years working in the security & operations fields
  • Possessing strong fundamental knowledge of networks (TCP/IP) and operating systems (Windows/Linux)
  • Hands-on experience with cyber security solutions
  • SIEM, AV, NIDS, EDR etc.
  • Ability to investigate network traffic, read and interpret logs and packet captures, investigate email threats
  • Experience with cyber security incident response, web/shell programming as well as being familiar with malware and memory analysis techniques are advantageous
  • Fluency in English
  • Bachelor's Degree or higher preferred
Job Responsibility
Job Responsibility
  • Conduct research on new technology offerings and determine applicability in Citibank’s SOC
  • Evaluate and advise on the implementation and effectiveness of the cybersecurity safeguards to ensure that they provide the intended level of protection
  • Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
  • Perform risk assessments and threat modelling to identify gaps in SOC monitoring capabilities and devise strategies to minimize the risk
  • Conduct online research of the latest cyber threats and ensure those can be detected by existing in-house technologies
  • Identify redundant tasks and automate them to increase efficiency of the SOC team
  • Utilize SOAR to develop playbooks for automating complex use cases
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right

SOC Operations Manager

This is an exceptional opportunity to lead, shape, and elevate a Security Operat...
Location
Location
United Kingdom , Hemel Hempstead
Salary
Salary:
80000.00 - 90000.00 GBP / Year
thepeoplenetwork.co.uk Logo
Fynity
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience leading SOC operations in a 24×7 or multi-client environment
  • Strong background in incident management, threat detection, and escalation processes
  • Technical depth across SIEM/SOAR tooling, preferably Splunk or Microsoft Sentinel
  • A passion for developing teams — coaching analysts and building collaborative, high-performing cultures
  • Strong understanding of frameworks and standards such as NIST, MITRE ATT&CK, ISO 27001, CREST, and ITIL
  • Excellent communication skills, with the ability to translate technical risks into clear business impacts
  • Security Clearance – Willing and Able to go through the DV process
  • Have held budgetary responsibility
Job Responsibility
Job Responsibility
  • Lead and develop a skilled SOC team, inspiring a culture of continuous learning and technical excellence
  • Oversee the full lifecycle of security incidents — from detection through to resolution and review
  • Manage and optimise SIEM and SOAR platforms (Splunk, Sentinel, Elastic) to enhance detection and automation capabilities
  • Drive continuous improvement through ITIL-aligned processes and adherence to CREST standards
  • Oversee vulnerability management, threat intelligence, and incident response plans
  • Communicate security posture, risks, and incident outcomes clearly to senior stakeholders
  • Ensure operational readiness and contribute to maintaining industry accreditations
  • Fulltime
Read More
Arrow Right

Principal Cybersecurity Incident Response Analyst

Principal Cybersecurity Incident Response Analyst role at HPE's Cyber Defense Ce...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree (or equivalent work experience) required, preferably in computer science, engineering or related area of study
  • Typically 8+ years of relevant experience
  • SOC team/Incident response/Advanced threat analyst experience is required
  • Proven track record of leading complex cybersecurity initiatives and managing ambiguous incidents
  • Extensive understanding of adversary tactics, techniques, and procedures (TTPs)
  • Extensive Cyber and IT security knowledge
  • Extensive understanding of Cyber and IT security risks, best practices, threats and prevention measures
  • Extensive understanding of SQL and relevant scripting languages
  • Extensive data security system analysis skills
  • Extensive risk assessment and management skills
Job Responsibility
Job Responsibility
  • Lead and coordinate responses to the most severe and complex cybersecurity incidents
  • Guide cross-functional teams through containment, eradication, and recovery
  • Provide executive-level oversight and decision-making during critical incidents
  • Effectively analyze associated logs and respond to high severity incidents
  • Contribute to the company's security response methods
  • Mentor and provide technical guidance to less experienced cybersecurity professionals
  • Stay at the forefront of cybersecurity trends, threats, and technologies
  • Foster a culture of continuous improvement and innovation
  • Provide insight and guidance through after action reviews
What we offer
What we offer
  • Health & Wellbeing benefits
  • Personal & Professional Development programs
  • Unconditional Inclusion environment
  • Comprehensive benefits suite supporting physical, financial and emotional wellbeing
  • Fulltime
Read More
Arrow Right

Managed Cloud Detection and Response Analyst

Wiz is looking for a Managed Cloud Detection and Response Analyst to join our ne...
Location
Location
Israel , Tel Aviv
Salary
Salary:
Not provided
wiz.io Logo
Wiz
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years of experience in a Security Operations Center or Managed Detection and Response, specifically involving cloud environments
  • Solid knowledge in Cloud Security, with familiarity in cloud services, Kubernetes, cloud architecture, and major providers (AWS, GCP, Azure)
  • Strong analytical skills with a detail-oriented mindset, capable of assessing complex security incidents, separating false positives from true compromise, and providing actionable insights
  • Passion for continuous learning and improvement, staying up-to-date on the latest trends, threats, and best practices in cloud security
  • Excellent communication skills verbal and written both in Hebrew and English
Job Responsibility
Job Responsibility
  • Continuously monitor customers’ cloud environments and workloads for security alerts and analyze potential cyber threats to identify and prioritize cyber security incidents
  • Triage prioritized cyber incidents and coordinate appropriate response actions to mitigate risks effectively
  • Work closely with customer teams to guide and assist with investigation and remediation of incidents
  • Create and deliver incident reports that document findings and response actions taken for customers
  • Write and implement custom detection rules and fine-tune alerts to enhance threat detection capabilities for the customer’s specific cloud environment
  • Develop and maintain cyber incident response playbooks to standardize procedures and enhance the internal methodology of the team
  • Stay up to date with the latest threats, vulnerabilities, and trends in cloud security to update response strategies and improve detection methods
Read More
Arrow Right

Lead Cyber Security Analyst

e2e-assure is recruiting a Lead Cyber Security Analyst to work in our lively Oxf...
Location
Location
United Kingdom , Oxfordshire
Salary
Salary:
Not provided
e2e-assure.com Logo
e2e-assure
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Prior experience working in a cyber security-focused role, ideally SOC or Incident Response experience
  • Significant experience with log monitoring tools and SIEM platforms such as Splunk or Microsoft Sentinel
  • Experience with leading major incident investigations
  • Ability to train, coach, and mentor technical teams to help them achieve their potential
  • Advanced knowledge of cybersecurity and insight into recent and trends
  • Familiar with host and network based forensics and concepts
  • Experience of vulnerability management process
  • Experience with Log analysis / Log forensics (including PCAP analysis)
  • Endpoint artifact analysis (investigation packages etc)
  • Relevant computing or cyber university degree or Security certifications such as CompTIA Advanced Security Practitioner (CASP+), GIAC Certified Forensic Analyst, GIAC Cyber Threat Intelligence (GCTI), GIAC Open Source Intelligence (GOSI), GIAC Defending Advanced Threats (GDAT), GIAC Security Expert (GSE)
Job Responsibility
Job Responsibility
  • Improving the quality of detections and response/analysis routines and playbooks
  • Improving the quality of our threat intelligence platform, threat indicators and assist in optimisation of threat data
  • Supporting the SOC with wider cyber security expertise – advising, mentoring and coaching. Focusing on improving SOC efficiency by working across the business to bring down alert volume and collaborate on improvements, train SOC staff on investigations and rule tuning
  • Supporting the SOC team to achieve agreed SLAs and deliver high quality alerts, tickets, and incidents
  • Collating incident statistics and driving quality improvements
  • Lead and train the SOC on threat hunting, using this to drive improvements to detection capability
  • Lead the SOC to produce threat briefs for significant cyber events where customers need to take action
  • Proactively share knowledge within the team and the wider company, through training and mentoring sessions
  • Escalation point for the SOC for technical analysis
  • Incident Management Lead for the SOC
What we offer
What we offer
  • Contributory pension scheme
  • 25 days annual leave + Bank holidays (with additional for continued service)
  • private health insurance
  • enhanced maternity/ paternity/ sick pay
  • Cycle to Work scheme
  • Home and Tech purchase scheme
  • Employee assistance program
  • Fulltime
Read More
Arrow Right