SOC Analyst
Franklin Fitch Limited
Manchester, United Kingdom
2 days ago
Role details
Contract type
Permanent contract Employment type
Full-time (> 32 hours) Working hours
Regular working hours Languages
English Experience level
Junior Compensation
£ 50KJob location
Manchester, United Kingdom
Tech stack
Microsoft Windows
Apple Mac Systems
JIRA
Linux
DNS
Issue Tracking Systems
Lightweight Directory Access Protocols (LDAP)
Salesforce
Web Application Security
Security Information and Event Management
Mitre Att&ck
Cyber Threat Analysis
ServiceNow
Job description
Our client is looking for a Security Operations Centre (SOC) Analyst to join a modern, continuously evolving SOC environment. You'll work hands-on with real-world threats, monitoring and investigating security events across multiple customer environments while developing your skills alongside experienced analysts. This role is ideal for someone who enjoys investigation, thrives in fast-paced environments, and wants clear progression within cybersecurity. What you'll be doing Detect & Investigate
- Monitor and triage alerts across SIEM, EDR/XDR, email and web security platforms
- Investigate suspicious activity and determine impact and severity
- Build clear timelines and maintain high-quality investigation notes
- Escalate complex cases with clear technical context
- Review vulnerability outputs and provide basic prioritisation insight
Hunt & Improve
- Participate in threat hunting activities
- Contribute ideas to improve detections, dashboards and runbooks
- Support testing of new detection logic and use cases
Collaborate & Communicate
- Provide clear written updates to customers and internal stakeholders
- Take part in shift handovers to ensure continuity
- Work closely with senior analysts to grow technical depth, * A technical, analyst-first SOC that values quality investigations
- Structured training, cyber ranges and real incident exposure
- Clear career paths into Threat Intelligence, SOC Engineering, Incident Response and senior SOC roles
- Collaborative, agile team culture that values curiosity and continuous improvement
- Supportive environment with regular knowledge sharing and team events
Requirements
- 1+ year experience in a SOC, or
- 3+ years in infrastructure or networking with strong security exposure
- Experience triaging and investigating security alerts
- Understanding of attacker behaviour, TTPs and common attack chains
- Ability to identify indicators of compromise across endpoints, networks and logs
- Hands-on experience with at least one SIEM, EDR or XDR platform
- Familiarity with ticketing systems (e.g. ServiceNow, JIRA, Salesforce)
- Knowledge of Windows, macOS and Linux environments
- Understanding of DNS, HTTP, SMB and LDAP
- Awareness of MITRE ATT&CK and distinguishing legitimate vs suspicious activity