Question
Full-time
2-5

SOC Analyst - (Sentinel) - £30K - £45K base plus 20% shift allowance (Standard Hours the first 6 months before moving to 4 on, 4 off shift x 12 hours)

4/1/2026

The SOC Analyst will triage security events and incidents, monitor the SIEM for anomalies, and participate in security incident management. They will also communicate with external teams for incident resolution and document security procedures.

Salary

30000 - 45000 GBP

Working Hours

36 hours/week

Company Size

501-1,000 employees

Language

English

Visa Sponsorship

No

About The Company
At Resillion, we're more than just a global leader in quality engineering, testing, and cyber security – we're your dedicated partner from the start of your project to its successful launch. With 700+ experts and offices across North America, Europe, and Asia, we offer end-to-end digital testing services, covering quality engineering, media content, cyber security, and data protection. Our commitment to success, cutting-edge technology, and quality makes us a strategic partner for leading brands. Independently audited to global standards, Resillion holds NCSC Assured Service Provider status, CREST STAR, CREST SOC, and features an ISO17025 certified Digital Forensics and Cyber Incident Response lab.
About the Role

Company Description

Help us to achieve our goal to be the global leader in total quality services.

With your help we will achieve this by delivering Total Quality 360, a comprehensive suite of cutting-edge services which combine quality engineering, cyber security, conformance & interoperability and content quality to deliver end-to-end total quality solutions.

Here at Resillion, our culture is based on an ‘if you see something, say something’ attitude where we take responsibility. It’s one where we expect to adapt and embrace change as the company grows. It’s based on recognising the individual worth of every one of our employees and developing their skills to keep us all at the forefront of our industry.

Above all, it’s a culture where we’re passionate about what we do, and we’re committed to the greater good of the company.

If you would like to be part of our journey, then this role may be the one for you.

Job Description

Job Description

SOC Analyst - £30K - £40K base plus 20% shift allowance (Standard Hours the first 6 months before moving to 4 on, 4 off shift x 12 hours)

Location: Hybrid - Birmingham (1 day every 2 weeks)

*** Due to the nature of the work, must hold or be able to acquire Security Clearance (SC) - 5 years UK Address History *** 

Must be willing to work shifts after 6 months which are likely to be 4 x 12 hour shifts (4 on, 4 off) 

Must have worked in an MSSP (Managed Services Organisation) environment, managing or dealing with multiple clients. 

MUST HAVE Microsoft Sentinel

We are looking for a candidate with previous experience working in a SOC Analyst role. Ideally you will have been exposed to a mixture of tools and technologies, including Microsoft Sentinel and Google SecOps. You will have gained knowledge and extensive experience in investigating alerts and incidents, containing and remediating potential security threats and dealing with customer enquiries.

Key responsibilities

  1. Triage security events and incidents.
  2. Monitor the SIEM to identify anomalies and potential security threats.
  3. Monitor the health of the SIEM and other critical components within the infrastructure.
  4. Participate in evaluating the security of monitored infrastructure systems and take part in recommending additional security solutions where appropriate.
  5. Communicate with external teams for incident resolution.
  6. Participate in security incident management and vulnerability management processes.
  7. Communicate effectively with customers, teammates, and management.
  8. Follow & improve internal guidelines, playbooks and practices for management of incidents and changes.
  9. Document and maintain security procedures and processes.
  10. Build & deliver customer service reviews.

Required skills and qualifications

  1. Security monitoring experience with one or more SIEM technologies, ideally Microsoft Sentinel and/or Google SecOps.
  2. Strong understanding of Windows, Linux and cloud technologies.
  3. Good understanding of security solutions including SIEMs, Web Proxies, Anti-Virus, Firewalls, VPN, authentication providers and mechanisms, encryption, IPS/IDS.
  4. Good understanding of security incident management, malware management and vulnerability management processes.
  5. Experience of working in a MSSP SOC environment. 
  6. Attention to detail and quality.

Desirable skills and qualifications

  1. CREST Practitioner Intrusion Analyst (CPIA)
  2. Microsoft Security Operations Analyst (SC-200)
  3. Security Blue Team Level 1 (BTL1)
  • Full Time / Part Time: Full Time
  • Key Skills
    Microsoft SentinelGoogle SecOpsSecurity MonitoringWindowsLinuxCloud TechnologiesSIEMWeb ProxiesAnti-VirusFirewallsVPNAuthentication ProvidersEncryptionIPS/IDSMalware ManagementVulnerability Management
    Categories
    TechnologySecurity & Safety
    Apply Now

    Please let Resillion know you found this job on InterviewPal. This helps us grow!

    Apply Now
    Prepare for Your Interview

    We scan and aggregate real interview questions reported by candidates across thousands of companies. This role already has a tailored question set waiting for you.

    Elevate your application

    Generate a resume, cover letter, or prepare with our AI mock interviewer tailored to this job's requirements.