Job Title: SOC Analyst L3
Work Location: Manchester
Mode of Working: Hybrid (Minimum 3 days in the office per week)
The Role
As a SOC Level 3 SME you will be part of a dynamic multi-disciplinary team to identify triage recover and resolve critical security incidents.
Your Responsibilities
-
Lead investigations and response efforts for high-severity security incidents.
-
Conduct proactive threat hunting using Microsoft Sentinel and Defender suite.
-
Develop and fine-tune analytic rules workbooks and automation playbooks in Sentinel.
-
Perform deep-dive analysis of malware phishing and lateral movement techniques.
-
Correlate and analyze security events across diverse data sources.
-
Collaborate with engineering teams to optimize Microsoft security tool integrations.
-
Mentor junior SOC analysts and contribute to training initiatives.
-
Maintain and improve incident response procedures and documentation.
-
Deliver reports and dashboards on SOC performance and threat trends.
Your Profile
Essential Skills / Knowledge / Experience:
-
5 years in cybersecurity including 2 years in a SOC Level 3 or equivalent role.
-
Expert-level knowledge of Microsoft Sentinel (KQL custom rules automation).
-
Hands-on experience with Microsoft Defender for Endpoint Identity and Office 365.
-
Strong understanding of MITRE ATT&CK threat intelligence and TTPs.
-
Proficient in Windows Linux and network security fundamentals.
-
Skilled in incident response digital forensics and threat hunting.
-
Experience with SOAR platforms and automated workflows.
-
Excellent communication analytical and documentation skills.
Desirable Skills / Knowledge / Experience: