Senior SOC Analyst – (Sentinel) – plus 20% shift allowance (Standard Hours the first 4 months b[…]

{ “@context”: “http://schema.org”, “@type”: “JobPosting”, “title”: “Senior SOC Analyst – (Sentinel) – plus 20% shift allowance (Standard Hours the first 4 months b[…]”, “description”: “

Senior SOC Analyst

Location: Hybrid – Birmingham (1 day every 2 weeks)

Shift Allowance: 20% (Standard Hours first 4 months, then 4 on, 4 off 12‑hour shifts)

Due to the nature of the work, you must hold or be able to acquire Security Clearance (SC) with 5 years UK address history.

Must be willing to work shifts after 6 months (likely 4 x 12 hour shifts). Must have worked in an MSSP environment, managing or dealing with multiple clients. Must have Microsoft Sentinel knowledge.

Key Responsibilities

  • Triage security events and incidents.
  • Monitor the SIEM to identify anomalies and potential security threats.
  • Monitor the health of the SIEM and other critical components within the infrastructure.
  • Participate in evaluating the security of monitored infrastructure systems and recommending additional security solutions where appropriate.
  • Communicate with external teams for incident resolution.
  • Participate in security incident management and vulnerability management processes.
  • Communicate effectively with customers, teammates, and management.
  • Follow and improve internal guidelines, playbooks and practices for management of incidents and changes.
  • Document and maintain security procedures and processes.
  • Build and deliver customer service reviews.

Required Skills And Qualifications

  • Security monitoring experience with one or more SIEM technologies, ideally Microsoft Sentinel and/or Google SecOps.
  • Strong understanding of Windows, Linux and cloud technologies.
  • Good understanding of security solutions including SIEMs, Web proxies, anti‑virus, firewalls, VPN, authentication providers and mechanisms, encryption, IPS/IDS.
  • Good understanding of security incident management, malware management and vulnerability management processes.
  • Experience working in an MSSP SOC environment.
  • Attention to detail and quality.

Desirable Skills And Qualifications

  • CREST Practitioner Intrusion Analyst (CPIA)
  • Microsoft Security Operations Analyst (SC‑200)
  • Security Blue Team Level 1 (BTL1)

#J-18808-Ljbffr”, “datePosted”: “2026-05-15”, “hiringOrganization”: { “@type”: “Organization”, “name”: “Resillion”, “sameAs”: “https://uk.whatjobs.com/pub_api__cpl__432622782__4861?utm_campaign=publisher&utm_medium=api&utm_source=4861&geoID=835” }, “jobLocation”: { “@type”: “Place”, “address”: { “@type”: “PostalAddress”, “addressLocality”: “Birmingham” } } }
Company: Resillion
Apply for the Senior SOC Analyst – (Sentinel) – plus 20% shift allowance (Standard Hours the first 4 months b[…]
Location: Birmingham
Job Description:

Senior SOC Analyst

Location: Hybrid – Birmingham (1 day every 2 weeks)

Shift Allowance: 20% (Standard Hours first 4 months, then 4 on, 4 off 12‑hour shifts)

Due to the nature of the work, you must hold or be able to acquire Security Clearance (SC) with 5 years UK address history.

Must be willing to work shifts after 6 months (likely 4 x 12 hour shifts). Must have worked in an MSSP environment, managing or dealing with multiple clients. Must have Microsoft Sentinel knowledge.

Key Responsibilities

  • Triage security events and incidents.
  • Monitor the SIEM to identify anomalies and potential security threats.
  • Monitor the health of the SIEM and other critical components within the infrastructure.
  • Participate in evaluating the security of monitored infrastructure systems and recommending additional security solutions where appropriate.
  • Communicate with external teams for incident resolution.
  • Participate in security incident management and vulnerability management processes.
  • Communicate effectively with customers, teammates, and management.
  • Follow and improve internal guidelines, playbooks and practices for management of incidents and changes.
  • Document and maintain security procedures and processes.
  • Build and deliver customer service reviews.

Required Skills And Qualifications

  • Security monitoring experience with one or more SIEM technologies, ideally Microsoft Sentinel and/or Google SecOps.
  • Strong understanding of Windows, Linux and cloud technologies.
  • Good understanding of security solutions including SIEMs, Web proxies, anti‑virus, firewalls, VPN, authentication providers and mechanisms, encryption, IPS/IDS.
  • Good understanding of security incident management, malware management and vulnerability management processes.
  • Experience working in an MSSP SOC environment.
  • Attention to detail and quality.

Desirable Skills And Qualifications

  • CREST Practitioner Intrusion Analyst (CPIA)
  • Microsoft Security Operations Analyst (SC‑200)
  • Security Blue Team Level 1 (BTL1)

#J-18808-Ljbffr…

Posted: May 15th, 2026