Senior Internal SOC Analyst

Darktrace
2 LocationsPosted 3 April 2026

Tech Stack

Job Description

Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting nearly 10,000 organizations from unknown threats using its proprietary AI. The Darktrace Active AI Security Platform™ delivers a proactive approach to cyber resilience to secure the business across the entire digital estate – from network to cloud to email. Breakthrough innovations from our R&D teams have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world. To learn more, visit http://www.darktrace.com . 

 Job D escription : As a Senior Internal SOC Analyst, you will play a pivotal role in safeguarding our organisation by leveraging Darktrace’s proprietary security technologies across network, cloud, email, endpoint, and zero‑trust environments. You will lead the triage, investigation, and response to security events generated from our security stack, while acting as an escalation point for complex internal security queries raised across the business. This is a hybrid position working 2 days a week from either our London or Cambridge office. Working across a broad range of security domains, you will contribute directly to incident response decision‑making, help shape processes and playbooks, and support the continued maturity of our SOC. This role offers the opportunity to refine your expertise, mentor junior analysts, and influence best practices in a rapidly evolving threat landscape. What Will I Do? Lead the triage and investigation of security alerts across multiple environments using Darktrace and other security tooling. Perform advanced incident analysis and coordinate remediation actions with internal stakeholders. Act as an escalation point for complex security tickets raised within the business. Drive continuous improvement of SOC processes, playbooks, and detection capabilities. Monitor emerging threats and contribute to updating detection and response strategies. Provide training, guidance, and knowledge‑sharing for junior analysts. What Will I Need? Bachelor’s degree in Computer Science, Cybersecurity, or a related field — or equivalent practical experience. 1–3 years of experience in a SOC, cybersecurity operations, or similar technical security function. Strong analytical, problem‑solving, and time‑management skills, with the ability to prioritise effectively in a dynamic environment. Excellent written and verbal communication skills, including confident presentation ability. Ability to work independently with minimal supervision, while collaborating effectively within a team. 

 Benefits: 23 days’ holiday all public holidays, rising to 25 days after 2 years of service, Additional day off for your birthday, Private medical insurance which covers you, your cohabiting partner and children, Life insurance of 4 times your base salary, Salary sacrifice pension scheme, Enhanced family leave, Confidential Employee Assistance Program, Cycle to work scheme.
Apply Now

Direct link to company career page

AI Resume Fit Check

See exactly which skills you match and which are missing before you apply. Free, instant, no spam.

Check my resume fit

Free · No credit card

Share