SOC Analyst

  • TRIA
  • Dec 08, 2025
Full time Legal

Job Description

SOC Analyst: IT Security Team

Location: Bristol

Remote: 1 day onsite per month
Salary: Up to 45,000 + generous benefits package, yearly salary review and personal development / business success bonus
Contract: Permanent, full-time (35 hours per week); core hours 09:00-17:00 (incl. 1 hour lunch)

I'm working with a company that's looking to bring a skilled SOC Analyst into their IT Security team as part of continued growth within the function. They're keen to move quickly for the right person.



What you'll be doing

As SOC Analyst, you will:

  • Operate, tune and configure SIEM tools

  • Monitor and triage security alerts, applying custom queries (e.g. KQL) and correlation rules to detect suspicious activity.

  • Investigate security incidents across endpoints, networks, and cloud environments; perform root-cause analysis, impact assessment and containment actions.

  • Develop and maintain detection rules, use cases, threat-intelligence processes, and incident response playbooks.

  • Automate detection and response workflows, using scripting tools (e.g. Python, PowerShell).

  • Perform threat-hunting, log-analysis (including firewall, web/email filters), implement or review DLP controls, and collaborate with infrastructure/cloud/application teams on remediation and security posture improvements.

  • Contribute to continuous improvement of SOC processes (alert tuning, log-source enrichment, documentation), and take part in an on-call rotation to support out-of-hours coverage if needed.



What we're looking for

  • Solid experience, ideally 3+ years working in a SOC or security operations/incident-response role.

  • Strong working knowledge of Microsoft security stack (e.g. Sentinel, Defender) and hands-on experience with SIEM tooling, alerts triage, detection logic, and security incident workflows.

  • Ability to write and optimise detection queries (e.g. in KQL), review firewall and security logs, manage email/web filtering policies, and implement / review Data Loss Prevention (DLP) controls.

  • Experience with automation or scripting (e.g. Python, PowerShell) to streamline detection/response and improve SOC efficiency.

  • Threat-hunting and analytical mindset; proactive and collaborative approach; good communication skills and ability to work across teams.



Why consider this opportunity

  • You'll join a growing, forward-thinking security operations function, gaining hands-on responsibility for threat detection, incident response and overall security posture.

  • Competitive salary and benefits, plus opportunities for professional development and long-term career growth.

  • Flexible, hybrid working with monthly in-office requirement, suitable if you value work/life balance.

  • Great entry point for someone experienced in general SOC/InfoSec backgrounds, no need to have previous experience in the legal or financial sector (though that kind of background is welcome).

If you're looking to join an established team that will aid career growth, whilst offering an excellent work-life balance.

Apply NOW