SOC Analyst Jobs

The eyes and ears of an organisation's cyber defences. SOC Analysts monitor, detect, and respond to security incidents in real-time.

Open roles
12
Salary range
£30k – £58k
Hiring companies
9

SOC Analysts are the front-line defenders in the world of cyber security. Working in Security Operations Centres (SOCs), they monitor and analyse security events to identify and respond to potential threats. These roles are critical for organisations of all sizes, from scaleups to large enterprises, ensuring that security incidents are detected and mitigated quickly. SOC Analysts often work in shifts, providing 24/7 coverage to maintain a constant watch over the organisation's digital assets.

What the role does

Inside the role of an SOC Analyst

A typical week for a SOC Analyst is a mix of monitoring, incident response, and reporting. They spend a significant amount of time analysing security alerts and collaborating with other teams.

  1. 01
    Monitor security dashboards and alerts for suspicious activity.
  2. 02
    Analyse and triage security incidents to determine their severity.
  3. 03
    Collaborate with incident response teams to mitigate threats.
  4. 04
    Document and report findings to management and other stakeholders.
  5. 05
    Stay updated on the latest security threats and best practices.
  6. 06
    Participate in regular team meetings and training sessions.
Salary on the board

£30k – £58k

Based on advertised midpoints across the 4 priced listings posted in the last 12 months. Base salary only.

By seniority
£k base
Junior
35
35
1 job
Mid
30
36
1 job
Senior
50
58
2 jobs
Skills & tools

What hiring managers ask for

% of 2 listings posted in the last 12 months that mention each skill, extracted from job descriptions.

SIEM
50%
Microsoft Sentinel
50%
Splunk
50%
MITRE ATT&CK
50%
TCP/IP
50%
DNS
50%
HTTP
50%
SMTP
50%
Firewalls
50%
AV
50%
VPNs
50%
IDS/IPS
50%
Career ladder

From Junior to Principal

A typical UK progression for soc analysts. Years are guidance — strong people move faster, and many senior folks sidestep into research, product or management.

  1. Level 1

    Junior SOC Analyst

    0–2 yrs

    Assists in monitoring security events and performs basic triage under supervision.

  2. Level 2

    SOC Analyst

    2–5 yrs

    Takes primary responsibility for incident detection and response, and contributes to the development of security policies.

  3. Level 3

    Senior SOC Analyst

    5–8 yrs

    Leads incident response efforts, mentors junior analysts, and advises on security strategy.

  4. Level 4

    Principal SOC Analyst

    8+ yrs

    Oversees the SOC's operations, drives strategic initiatives, and ensures compliance with regulatory requirements.

Pathway

How to become a SOC Analyst

There's no single route, but most people follow some version of these steps.

  1. 1

    Entry-Level Analyst

    Start with foundational roles, learning the basics of security monitoring and incident response.

  2. 2

    Specialisation

    Develop expertise in specific areas such as threat hunting, malware analysis, or forensic investigation.

  3. 3

    Advanced Incident Response

    Take on more complex incidents and lead response efforts, often working closely with other security teams.

  4. 4

    Leadership Role

    Move into a leadership position, managing a team of analysts and driving the SOC's strategic direction.

  5. 5

    Strategic Advisor

    Advise senior management on security policies and contribute to the organisation's overall security posture.

Live jobs

12 live roles

See all 12 roles
Langham Recruitment logo

SOC Analyst

As a SOC Analyst, you will actively monitor, investigate, and respond to security threats in a fast-paced environment, focusing on Microsoft Defender XDR and Sentinel. You'll work closely with senior analysts and engineers to improve detection capabilities, support customer onboarding, and participate in an on-call rota.

Langham Recruitment Manchester, United Kingdom £35,000 pa
Hybrid Permanent Clearance Required

SOC Analyst

SOC Analyst£75.48 p/hr (Inside IR35)Onsite Hereford12 monthsLevel 1 SOC Cyber Analyst to join the TMCT security team to serve as the first internal responder to alerts generated by our outsourced SOC provider. In this role the individual will perform initial...

JAM Recruitment Hereford, United Kingdom

SOC Analyst - 24/7 Secure Operations (Public Sector)

SOC Analyst - 24/7 Secure Operations (Public Sector)⚠️ IMPORTANT ELIGIBILITY REQUIREMENT You must be a UK National with a minimum of 5 years' continuous UK residency to be considered for this role.Rate: £250-£300 per shift (Inside IR35) Shift pattern: 4...

Hays Technology Winchester, Hampshire, United Kingdom £250 – £300 pd
On-site Contract Shift-work Clearance Required

SOC Analyst Farnborough

This Senior SOC Analyst role involves monitoring and responding to advanced cyber threats in high-stakes environments, supporting UK defence and national security programmes. Responsibilities include triaging security alerts, analysing threats using SIEM and network data, and enhancing detection rules. The role also involves producing incident reports and contributing to threat intelligence initiatives.

Fynity Farnborough, Hampshire, GU14 7JT, United Kingdom £50,000 – £58,000 pa
On-site Permanent Shift-work Clearance Required

Senior SOC Analyst Level 2

This role involves monitoring and responding to advanced cyber threats in a high-stakes environment, supporting UK defence and national security programmes. Responsibilities include triaging security alerts, analysing threats using SIEM tools, and enhancing detection rules. The team focuses on defending critical systems and countering sophisticated adversaries, including nation-state actors.

Fynity Hertfordshire, United Kingdom £50,000 – £58,000 pa
On-site Permanent Shift-work Clearance Required
Adecco logo

SOC / Cyber Threat Detection Analyst - SANS/GIAC

SOC / Cyber Threat Detection Analyst - SANS/GIACCyber Threat Detection AnalystLocation: Wokingham, Berkshire (On-site)Salary: Competitive (dependent on experience) + excellent benefits & trainingSecurity Clearance: Ideally SC Cleared or eligible for SCRole OverviewAs a Cyber Threat Detection Analyst, you will play...

Adecco Wokingham, Berkshire, United Kingdom
Darktrace logo

Senior Internal SOC Analyst

Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting nearly 10,000 organizations from unknown threats using its proprietary AI.The...

Darktrace Cambridge, CB2 3BJ, United Kingdom
Darktrace logo

Senior Internal SOC Analyst

Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting nearly 10,000 organizations from unknown threats using its proprietary AI.The...

Darktrace London, UB8 1LQ, United Kingdom
Hiring locations

Where this role is hiring

The locations with the most live listings for this role today.

FAQs

Common questions

  • A degree in a relevant field such as computer science or information security is beneficial. Certifications like CompTIA Security+, CEH, or CISSP can also enhance your credentials.

  • SOC Analysts often work in shifts to provide 24/7 coverage, which can include evenings, weekends, and holidays.

  • Gaining experience, specialising in areas like threat hunting or incident response, and obtaining relevant certifications can help you advance to senior and leadership roles.

  • Salaries can vary based on experience, location, and the size of the organisation. For more detailed salary information, refer to the salary section on this page.

Hiring soc analysts?

Post your role in 90 seconds and reach the specialist audience that already reads this page.