L3 SOC Analyst - 6 months - Inside IR35 - Hybrid
L3 SOC Analyst - 6 months - Inside IR35 - Hybrid
We are working with a large enterprise organisation that is looking to engage an experienced Level 3 SOC Analyst on an initial 6-month rolling contract. This is a key role within a mature Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing security function.
Responsibilities:
- Lead investigations and response efforts for high-severity security incidents.
- Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite.
- Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel.
- Perform deep-dive analysis of malware, phishing, and lateral movement techniques.
- Collaborate with engineering teams to optimise Microsoft security tool integrations.
- Maintain and enhance incident response procedures and documentation.
- Hands on with Log onboarding and KQL
What you will Ideally Bring:
- Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role.
- Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation.
- Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365.
- Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs.
- Solid understanding of Windows, Linux, and core network security principles.
- Skilled in incident response, digital forensics, and proactive threat hunting.
- Experience working with SOAR platforms and building automated workflows.
Contract Details:
- Duration: 6 months
- Location: 3x Per Week Manchester/Remote
- Daily Rate: Up to £550 Per Day (Inside IR35)
L3 SOC Analyst - 6 months - Inside IR35 - Hybrid
Reference: 2966452212
L3 SOC Analyst - 6 months - Inside IR35 - Hybrid

Posted on Jun 17, 2025 by Hamilton Barnes
L3 SOC Analyst - 6 months - Inside IR35 - Hybrid
We are working with a large enterprise organisation that is looking to engage an experienced Level 3 SOC Analyst on an initial 6-month rolling contract. This is a key role within a mature Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing security function.
Responsibilities:
- Lead investigations and response efforts for high-severity security incidents.
- Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite.
- Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel.
- Perform deep-dive analysis of malware, phishing, and lateral movement techniques.
- Collaborate with engineering teams to optimise Microsoft security tool integrations.
- Maintain and enhance incident response procedures and documentation.
- Hands on with Log onboarding and KQL
What you will Ideally Bring:
- Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role.
- Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation.
- Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365.
- Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs.
- Solid understanding of Windows, Linux, and core network security principles.
- Skilled in incident response, digital forensics, and proactive threat hunting.
- Experience working with SOAR platforms and building automated workflows.
Contract Details:
- Duration: 6 months
- Location: 3x Per Week Manchester/Remote
- Daily Rate: Up to £550 Per Day (Inside IR35)
L3 SOC Analyst - 6 months - Inside IR35 - Hybrid
Reference: 2966452212

Alert me to jobs like this:
Amplify your job search:
Expert career advice
Increase interview chances with our downloads and specialist services.
Visit Blog