Apprentice SOC Analyst

FSP CONSULTING SERVICES LIMITED

Reading (RG6 1RB)

Closes in 30 days (Thursday 2 April 2026)

Posted on 2 March 2026


Summary

You will gain a nationally recognised qualification while developing hands-on experience in a real SOC function. You will work alongside experienced Cyber Analysts who will train, support, and mentor you as you develop the skills needed to protect organisations from modern cyber threats. 

Wage

Competitive

Competitive wage offered

Check minimum wage rates (opens in new tab)

Training course
Cyber security technologist (2021) (level 4)
Hours
Monday - Friday.

37 hours 30 minutes a week

Start date

Tuesday 1 September 2026

Duration

1 year 9 months

Positions available

1

Work

Most of your apprenticeship is spent working. You’ll learn on the job by getting hands-on experience.

What you'll do at work

We have an exciting opportunity for an Apprentice SOC Analyst to join our growing Cyber Security practice at FSP. This role is ideal for someone who is passionate about cybersecurity, eager to learn, and excited by the idea of working in a fast-paced security environment. This is a fantastic opportunity to start a career in cybersecurity, contributing to safeguarding our clients while gaining technical, analytical, and operational experience.

Responsibilities 

As an Apprentice SOC Analyst, you will support the team to: 

  • Monitor and triage security alerts across our customers’ environments under the guidance of senior analysts.
  • Assist in initial investigation of incidents, gathering evidence and documenting activity.
  • Learn how to detect and analyse common cyber threats, risks and vulnerabilities.
  • Develop skills in security tooling, with a focus on Microsoft security technologies.
  • Support improvements to SOC playbooks, documentation and reporting.
  • Help maintain accurate records of incidents to ensure high-quality service delivery.
  • Contribute to team discussions, knowledge sharing, and continuous improvement.
  • Stay informed about new security threats, technologies and best practices as part of your apprenticeship learning. 
     

About you 

  • You’ll have A levels (or equivalent) and must hold GCSEs at Level 2 or above in both English and Maths.
  • Your genuinely interested in starting a career in cyber security
  • Curious and analytical, with a desire to understand how technology and systems work
  • Detail‑focused, with a methodical approach to investigating issues
  • Comfortable working through problems in a structured and logical way
  • Well organised and dependable, with the ability to manage tasks and learning effectively.
  • Motivated to build both technical knowledge and practical workplace skills over time.
     

What we look for in our people 

  • Strong alignment with FSP values and ethos
  • Commitment to teamwork, quality and mutual success
  • Proactivity with an ability to operate with pace and energy
  • Strong communication and interpersonal skills
  • Dedication to excellence and quality 

Where you'll work

The Now Building
Thames Valley Park Drive
Reading
RG6 1RB

Training

Apprenticeships include time away from working for specialist training. You’ll study to gain professional knowledge and skills.

Training provider

TECHNICAL PROFESSIONALS LIMITED

Training course

Cyber security technologist (2021) (level 4)

Understanding apprenticeship levels (opens in new tab)

What you'll learn

Course contents
  • Discover vulnerabilities in a system by using a mix of research and practical exploration.
  • Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards.
  • Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source).
  • Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
  • Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
  • Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification.
  • Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
  • Configure, deploy and use computer, digital network and cyber security technology.
  • Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
  • Write program code or scripts to meet a given design requirement in accordance with employers' coding standards.
  • Identify cyber security threats relevant to a defined context.
  • Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.
  • Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, to a given design requirement without supervision. Provide evidence that the system meets the design requirement.
  • Analyse security requirements given (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.) for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade-offs.
  • Design and build, systems in accordance with a security case within broad but generally well-defined parameters. This should include selection and configuration of typical security hardware and software components. Provide evidence that the system has properly implemented the security controls required by the security case.
  • Design systems employing encryption to meet defined security objectives. Develop and implement a plan for managing the associated encryption keys for the given scenario or system.
  • Use tools, techniques and processes to actively prevent breaches to digital system security.
  • Configure digital system monitoring and analysis tools (e.g. SIEM tools), taking account of threat & vulnerability intelligence, indicators of compromise.
  • Conduct cyber-risk assessments against an externally (market) recognised cyber security standard using a recognised risk assessment methodology.
  • Develop information security policies or processes to address a set of identified risks, for example from security audit recommendations.
  • Develop information security policies within a defined scope to take account of legislation and regulation relevant to cyber security.
  • Take an active part in a security audits against recognised cyber security standards, undertake gap analysis and make recommendations for remediation.
  • Develop plans for local business continuity for approval within defined governance arrangements for business continuity.
  • Assess security culture using a recognised approach.
  • Design and implement a simple ‘security awareness’ campaign to address a specific aspect of a security culture.
  • Develop plans for incident response for approval within defined governance arrangements for incident response.
  • Integrate and correlate information from various sources (including log files from different sources, digital system monitoring tools, Secure Information and Event Management (SIEM) tools, access control systems, physical security systems) and compare to known threat and vulnerability data to form a judgement based on evidence with reasoning that the anomaly represents a digital system security breach.
  • Recognise anomalies in observed digital system data structures (including by inspection of network packet data structures) and digital system behaviours (including by inspection of protocol behaviours) and by inspection of log files and by investigation of alerts raised by automated tools including SIEM tools.
  • Undertake root cause analysis of events and make recommendations to reduce false positives and false negatives.
  • Manage local response to non-major incidents in accordance with a defined procedure.
  • Discover vulnerabilities in a system by using a mix of research and practical exploration.
  • Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards.
  • Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source).
  • Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
  • Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
  • Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification.
  • Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
  • Configure, deploy and use computer, digital network and cyber security technology.
  • Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
  • Write program code or scripts to meet a given design requirement in accordance with employers' coding standards.
  • Identify cyber security threats relevant to a defined context.
  • Accurately, objectively and concisely record and report the appropriate cyber security information, including in written reports within a structure or template provided.

Training schedule

During the programme, you will: 

  • Work towards a nationally recognised cybersecurity qualification delivered by LearnTech.
  • Receive structured learning, coaching and mentoring from FSP’s Cyber team.
  • Develop experience across real security operations, clients, environments and SIEM technologies.
  • Gain exposure to industry frameworks such as MITRE ATT&CK and NIST.
  • Build foundational knowledge across:  
  • Threat detection & incident response 
  • SOC processes and tooling 
  • Log analysis 
  • Microsoft security technologies (including Sentinel, Defender, Entra ID) 
  • Automation and scripting fundamentals 

Requirements

Essential qualifications

GCSE in:

  • English (grade 4/C)
  • Maths (grade 4/C)

Share if you have other relevant qualifications and industry experience. The apprenticeship can be adjusted to reflect what you already know.

Skills

  • Communication skills
  • IT skills
  • Customer care skills
  • Team working
  • Initiative

Other requirements

FSP is an equal opportunity employer and we welcome applications from all suitable candidates. We consider all applicants for employment regardless of age, disability, sexual orientation, gender identity, family or parental status, race, colour, nationality, ethnic or national origin, religion or belief. 

Research suggests that applicants from underrepresented groups are less likely to apply for roles if they do not precisely meet requirements, or if they feel there are clear barriers as to who should apply. If you are excited about a potential role with us but are concerned that you may not be a perfect fit, please do apply, as you may be the ideal candidate for this role or for a different vacancy within FSP. 

We endeavour to always provide a fair opportunity for applicants to showcase themselves in the best way possible during any interviews or meetings. If you require any adjustments for a call or in-person meeting, please let us know.

About this employer

FSP is a leading consultancy specialising in Digital, Security and AI solutions. Our success is enabled by our unwavering commitment to excellence, our people centric culture alongside best-in-class operations, ensuring impactful and sustainable outcomes for our clients. 

As a long standing and highly accredited Microsoft Partner, with extensive solution designations, we partner with clients across a range of commercial sectors, enabling digital transformation, innovation and robust cyber security.  

We navigate the complexities of data sensitivity, confidentiality, governance and compliance. We blend strategic insight, depth of technical expertise, delivery and operational excellence to meet the specific requirements outlined.  

We take a collaborative, one team approach with our clients to drive sustainable change, providing outstanding client experience and delivering exceptional results that are aligned with business priorities.  

Our commitment to security and quality is reinforced by our ISO27001 and ISO9001 certifications (UKAS), as well as our CREST approved penetration testing and SOC capabilities. Additionally, we are an IASME Cyber Essentials Certification Body and Cyber Essentials Plus certified. 

Find out more about our accolades here: https://fsp.co/about-fsp/  

 

 

Why work for FSP? 

At FSP, we are committed to providing: 

  • A collaborative and supportive environment in which you can grow and develop your career 
  • The tools and opportunity to do work you can be proud of
  • A chance to work alongside some of the best people in the industry, who always seek to share their knowledge and experience
  • Hybrid working – we empower you to make smart choices about when and where to work to achieve great results
  • Industry leading coaching and mentoring 
  • Competitive salary and an excellent benefits package 

After this apprenticeship

The successful applicant will have gained a Level 4 qualification as a Cyber Security Technologist.

Ask a question

The contact for this apprenticeship is:

TECHNICAL PROFESSIONALS LIMITED

The reference code for this apprenticeship is VAC2000017777.

Apply now

Closes in 30 days (Thursday 2 April 2026)

After signing in, you’ll apply for this apprenticeship on the company's website.