UK.JobDiagnosis logo
  • Login
  • Lost Login?
  • Join Today
Job title, industry, keywords, etc.
City, State or Postcode

Security Operations Center Analyst Level 3

Queen Square Recruitment - Manchester, England

Apply Now

Job Description

Job DescriptionOur client, a leading global organisation, is partnering with a prestigious end client based in Manchester. We are excited to offer a fantastic opportunity for a talented SOC Analyst L3to join a dynamic and agile development team on an initial 6-month contract, with the potential for extension. If you are interested and have the relevant skills and experience, please apply promptly to discuss further.Job Title: SOC Analyst Level 3Location: Manchester, UK (Hybrid minimum 3 days on-site per week)Contract Type: Contract (6 months)Day Rate: Inside IR35 (Flexible)About the RoleA leading organisation is seeking an experienced SOC Analyst (Level 3) to join its cybersecurity operations team. This senior role is ideal for professionals who excel in high-stakes environments and possess a strong engineering background, particularly within the Microsoft and Azure security ecosystem. The ideal candidate will be instrumental in driving SOC maturity, optimizing license consumption, and enhancing security visibility across the enterprise.Key ResponsibilitiesLead the investigation and resolution of high-severity security incidentsConduct proactive threat hunting using Microsoft Sentinel and the Defender suiteDevelop and fine-tune analytic rules, detection use-cases, and SOAR playbooksMonitor and optimise license consumption across Microsoft security toolsManage log onboarding/offboarding processes across varied sources and environmentsDrive SOC maturity initiatives, identifying and implementing process improvementsPerform deep-dive analysis on malware, phishing, and lateral movement threatsCorrelate events across diverse log sources, including cloud and on-prem infrastructureCollaborate with engineering teams to enhance integration and performance of Microsoft security toolsMentor junior SOC analysts and contribute to internal capability developmentMaintain and enhance incident response playbooks, processes, and documentationProduce regular performance metrics and threat intelligence summariesRequired Skills & Experience5+ years in cybersecurity, with at least 2+ years at SOC Level 3 or senior analyst levelStrong expertise in Microsoft Azure, including security monitoring and engineeringDeep experience with Microsoft Sentinel (KQL, custom rules, automation, dashboards)Hands-on proficiency with Microsoft Defender for Endpoint, Identity, and Office 365Strong understanding of log management (onboarding, parsing, retention strategies)Demonstrated ability to build and manage detection use cases aligned with evolving threatsFamiliarity with the MITRE ATT&CK framework and threat modelingSolid understanding of Windows, Linux, networking, and endpoint securitySkilled in threat intelligence, digital forensics, and advanced incident handlingExperience with SOAR platforms and security automationExcellent written and verbal communication skillsNice to HaveExperience in the retail or FMCG sector supporting large-scale SOC environmentsBackground in major incident response and operational recoveryEsther UrtechoSenior Delivery ConsultantLondon | Bristol | Amsterdam

Created: 2025-06-27

➤
Home | Contact Us | Privacy Policy | Terms & Conditions | Unsubscribe | Popular Job Searches
Use of our Website constitutes acceptance of our Terms & Conditions and Privacy Policies.
Copyright © 2005 to 2025 [VHMnetwork LLC] All rights reserved. Design, Develop and Maintained by NextGen TechEdge Solutions Pvt. Ltd.