SOC Analyst

Franklin Fitch Limited
Manchester, United Kingdom
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Junior
Compensation
£ 50K

Job location

Manchester, United Kingdom

Tech stack

Microsoft Windows
Apple Mac Systems
JIRA
Linux
DNS
Issue Tracking Systems
Lightweight Directory Access Protocols (LDAP)
Salesforce
Web Application Security
Security Information and Event Management
Mitre Att&ck
Cyber Threat Analysis
ServiceNow

Job description

Our client is looking for a Security Operations Centre (SOC) Analyst to join a modern, continuously evolving SOC environment. You'll work hands-on with real-world threats, monitoring and investigating security events across multiple customer environments while developing your skills alongside experienced analysts. This role is ideal for someone who enjoys investigation, thrives in fast-paced environments, and wants clear progression within cybersecurity. What you'll be doing Detect & Investigate

  • Monitor and triage alerts across SIEM, EDR/XDR, email and web security platforms
  • Investigate suspicious activity and determine impact and severity
  • Build clear timelines and maintain high-quality investigation notes
  • Escalate complex cases with clear technical context
  • Review vulnerability outputs and provide basic prioritisation insight

Hunt & Improve

  • Participate in threat hunting activities
  • Contribute ideas to improve detections, dashboards and runbooks
  • Support testing of new detection logic and use cases

Collaborate & Communicate

  • Provide clear written updates to customers and internal stakeholders
  • Take part in shift handovers to ensure continuity
  • Work closely with senior analysts to grow technical depth, * A technical, analyst-first SOC that values quality investigations
  • Structured training, cyber ranges and real incident exposure
  • Clear career paths into Threat Intelligence, SOC Engineering, Incident Response and senior SOC roles
  • Collaborative, agile team culture that values curiosity and continuous improvement
  • Supportive environment with regular knowledge sharing and team events

Requirements

  • 1+ year experience in a SOC, or
  • 3+ years in infrastructure or networking with strong security exposure
  • Experience triaging and investigating security alerts
  • Understanding of attacker behaviour, TTPs and common attack chains
  • Ability to identify indicators of compromise across endpoints, networks and logs
  • Hands-on experience with at least one SIEM, EDR or XDR platform
  • Familiarity with ticketing systems (e.g. ServiceNow, JIRA, Salesforce)
  • Knowledge of Windows, macOS and Linux environments
  • Understanding of DNS, HTTP, SMB and LDAP
  • Awareness of MITRE ATT&CK and distinguishing legitimate vs suspicious activity

Apply for this position