Security Operations Centre (SOC) Analyst:
FourNet is recruiting for a SOC Analyst to join our busy, 24/7 SOC team. We’re looking for someone to work on a night shift pattern, 5 shifts per week, including weekends.
The SOC Analyst is responsible for the continuous monitoring, triage and response to security alerts across multiple client and internal environments. This role ensures timely detection, analysis, and escalation of threats in accordance with defined SLAs.
The SOC Analyst will work with a wide range of security technologies, including LevelBlue SIEM, FortiSIEM, FortiEDR, FortiEMS, Cisco Secure Endpoint (CSE) Umbrella, Firepower, Secure Cloud Analytics, CrowdStrike, and SentinelOne, Tenable and Nessus. The ideal candidate will have a strong technical background in endpoint protection, network defence, and incident response.
I’m interested, tell me more…
If you’re comfortable with working night shifts and you have some familiarity with the tech detailed above, then this role could be right for you. Here are some other things you need to know about this SOC Analyst opportunity…
- Your main workload will involve monitoring and analysing alerts across multiple platforms, including LevelBlue SIEM, FortiSIEM, FortiEDR, FortiEMS, Cisco Secure Endpoint (AMP), Umbrella, Firepower, Secure Cloud Analytics, CrowdStrike, and SentinelOne, Tenable, Nessus.
- You’ll need to investigate and triage incidents according to established SLAs, escalating where appropriate.
- You’ll be required to pull and analyse files from Cisco Secure Endpoint or similar systems and conduct sandbox testing to assess malicious behaviour.
- You’ll also need to build and manage virtual machines for controlled malware analysis and testing.
- You’ll be asked to produce daily, weekly, and monthly SOC reports summarising activity, incidents, trends, and improvements.
- There will be an element of being customer facing, so we need you to advise and communicate security vulnerabilities to clients and attend service reviews to support the ongoing development of security posture.
- During quieter periods, you’ll spend time studying or contributing to internal improvement tasks, documentation updates, or training.
A full job description will be provided on request.
Am I right for the role?
You’re right for this role if you have…
- Strong working knowledge of SIEM, EDR, and XDR technologies, with hands-on experience in threat detection and incident response.
- Ability to analyse malware safely using virtual environments and sandbox tools.
- Full understanding of the MITRE attack chain with the related TTPs.
- Proficiency in log analysis, event correlation, and identifying indicators of compromise and indications of access.
- Excellent communication skills, with experience producing clear technical and executive-level reports.
- Demonstrated ability to prioritise, multitask, and work effectively under pressure.
- Awareness of emerging threats, vulnerabilities, and global cybersecurity trends.
- Experience within a SOC or cyber operations environment (this is highly desirable but not essential).
- Industry certifications (these are advantageous but also not essential).
- Ability to work with multiple stakeholders across organisations.
- A thirst for knowledge and continual professional development.
We also look for successful applicants to demonstrate the FourNet traits and behaviours, namely…
- Focus on customers - committed to providing the best service to our customers in all that they do
- Working Together - Working co-operatively with colleagues, customers, partners, and suppliers. Gains support from others. Relationship driven and 'human.'
- Can Do Attitude - Takes personal responsibility for getting things done
- Growth - Proactively seeks ways to improve and grow the business
To apply for this role, please send your CV to eupton@fournet.co.uk.
Application Form