Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Anson Mccade
Scotland - United Kingdom Type: Permanent Senior SOC Engineer A leading organisation is seeking a Senior SOC Engineer to strengthen its security operations capability and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will … play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design … and implement incidentresponse playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations More ❯
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
Anson Mccade
Scotland - United Kingdom Type: Permanent Senior SOC Engineer A leading organisation is seeking a Senior SOC Engineer to strengthen its security operations capability and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will … play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design … and implement incidentresponse playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Anson Mccade
Scotland - United Kingdom Type: Permanent Senior SOC Engineer A leading organisation is seeking a Senior SOC Engineer to strengthen its security operations capability and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will … play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design … and implement incidentresponse playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations More ❯
Chester, Cheshire, United Kingdom Hybrid / WFH Options
Anson Mccade
Scotland - United Kingdom Type: Permanent Senior SOC Engineer A leading organisation is seeking a Senior SOC Engineer to strengthen its security operations capability and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will … play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats. Key Responsibilities SIEM Engineering & Management Deploy, configure, and maintain the QRadar SIEM platform. Onboard and normalise log sources across on-premises and cloud environments. Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis. Playbook Development & Automation Design … and implement incidentresponse playbooks for scenarios such as phishing, lateral movement, and data exfiltration. Integrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to streamline triage and automate response. Refine playbooks based on threat intelligence and incident insights. Threat Detection & Response Monitor and analyse security alerts and events to identify potential threats. Conduct investigations More ❯
IT security strategy. Key Responsibilities Monitor, triage, and investigate alerts generated by SIEM and security monitoring platforms. Conduct log analysis and threat hunting to proactively identify suspicious activity. Support incidentresponse efforts including containment, investigation, and remediation. Ensure security processes align with Cyber Essentials and other best practice frameworks. Optimise SIEM tooling for enhanced visibility and detection capability. … in a security operations role. Strong hands-on knowledge of SIEM platforms (e.g., Splunk, Sentinel, QRadar, or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incidentresponse, intrusion detection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working … depending on experience) Benefits: Competitive package including pension, healthcare, and training opportunities Onsite role within a collaborative SOC environment Exposure to advanced security tooling and real-world incidentresponse 👉 If you’re passionate about cyber defence and want to advance your career as part of a dedicated SOC team in Manchester , we’d love to hear from you. More ❯
warrington, cheshire, north west england, united kingdom
Explore Group
IT security strategy. Key Responsibilities Monitor, triage, and investigate alerts generated by SIEM and security monitoring platforms. Conduct log analysis and threat hunting to proactively identify suspicious activity. Support incidentresponse efforts including containment, investigation, and remediation. Ensure security processes align with Cyber Essentials and other best practice frameworks. Optimise SIEM tooling for enhanced visibility and detection capability. … in a security operations role. Strong hands-on knowledge of SIEM platforms (e.g., Splunk, Sentinel, QRadar, or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incidentresponse, intrusion detection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working … depending on experience) Benefits: Competitive package including pension, healthcare, and training opportunities Onsite role within a collaborative SOC environment Exposure to advanced security tooling and real-world incidentresponse 👉 If you’re passionate about cyber defence and want to advance your career as part of a dedicated SOC team in Manchester , we’d love to hear from you. More ❯
bolton, greater manchester, north west england, united kingdom
Explore Group
IT security strategy. Key Responsibilities Monitor, triage, and investigate alerts generated by SIEM and security monitoring platforms. Conduct log analysis and threat hunting to proactively identify suspicious activity. Support incidentresponse efforts including containment, investigation, and remediation. Ensure security processes align with Cyber Essentials and other best practice frameworks. Optimise SIEM tooling for enhanced visibility and detection capability. … in a security operations role. Strong hands-on knowledge of SIEM platforms (e.g., Splunk, Sentinel, QRadar, or similar). Understanding of Cyber Essentials and broader security standards. Knowledge of incidentresponse, intrusion detection, and threat analysis. Familiarity with endpoint security, IDS/IPS, firewalls, and vulnerability management. Strong problem-solving skills and a proactive, analytical mindset. Comfortable working … depending on experience) Benefits: Competitive package including pension, healthcare, and training opportunities Onsite role within a collaborative SOC environment Exposure to advanced security tooling and real-world incidentresponse 👉 If you’re passionate about cyber defence and want to advance your career as part of a dedicated SOC team in Manchester , we’d love to hear from you. More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Found Talent Limited
Leadership, leading key initiatives to protect systems, data and users while helping shape the organisations security posture. What youll be doing: Managing day-to-day information security operations, including incidentresponse and risk assessments Leading the development and implementation of security policies, standards, and controls Driving continuous improvement initiatives to strengthen cyber resilience Developing and supporting security roadmaps … to Cyber Essentials, ISO27001 or similar What youll need: Proven experience managing IT security or information security functions Strong technical knowledge of Microsoft environments and security controls Experience with incidentresponse, vulnerability management, and security risk mitigation Confident working with both technical teams and business stakeholders Solid understanding of security frameworks and compliance standards Ability to lead projects More ❯
STIGs, and UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning and access enforcement. Incident Management & Response Participate in access-related incidentresponse, including unauthorized access investigations, root-cause analysis, and mitigation measures. Client Engagement & Training Collaborate with stakeholders to understand … SAML/OAuth, and access governance tools. Security Framework Knowledge : Understanding of defence and public-sector security frameworks (JSP 440/604, STIGs, ISO 27001, Government Functional Standard 007) Incident & Risk Handling : Proven ability to conduct security incident investigations relevant to unauthorized access and remediate gaps. Communication Skills : Strong ability to engage with both technical teams and non More ❯
Chester, Cheshire, United Kingdom Hybrid / WFH Options
Adecco
WORKING - 3 DAYS ONSITE Are you ready to step into a vital role that ensures the smooth operation of our client's technology services? We are seeking an enthusiastic Incident Management Analyst to join our Global Command centre team. This is an exciting opportunity to contribute to a dynamic environment, ensuring business continuity and operational excellence across the EMEA … region. Position Summary: As an Incident Management Analyst, you will play a key role in maintaining the availability and performance of our client's systems. Your primary focus will be ensuring that end-user systems are consistently available per required SLAs. This role is critical for sustaining the continual demand for incident assistance during both weekdays and weekends. … Key Responsibilities: IncidentResponse: - React promptly to service failures based on business impact. - prioritise multiple high-priority incidents simultaneously. - Facilitate standard call processes, lead troubleshooting efforts, and engage technical teams, escalating issues as necessary. Communication Management: - Communicate effectively with stakeholders and internal teams. - Confidently interact with senior executives. - Provide regular updates on incident status and ensure effective More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Proactively work with business units and global functions in InfoSec to support internal and external audits and ensure their success, Support other InfoSec teams and local IT teams during incident management and incidentresponse activities, Liaise with Data Protection Officers for the implementation of data protection processes and controls, and during any data privacy issue, Contribute to More ❯
Stockport, Greater Manchester, North West, United Kingdom
Nexperia
staff or contractors on-site, including a dedicated Factory Systems Support team (CIM), Operational Technology Engineers, Data Engineers, and Web Developer Monitoring and reporting on system performance, availability, and incidentresponse metrics Providing leadership in incident management and root cause analysis for system-related issues, while also ensuring effective change control procedures for all changes introduced to More ❯
staff or contractors on-site, including a dedicated Factory Systems Support team (CIM), Operational Technology Engineers, Data Engineers, and Web Developer Monitoring and reporting on system performance, availability, and incidentresponse metrics Providing leadership in incident management and root cause analysis for system-related issues, while also ensuring effective change control procedures for all changes introduced to More ❯
for efficient, repeatable infrastructure provisioning DevSecOps Integration Incorporate security controls and governance into CI/CD pipelines and infrastructure designs in line with defence-grade standards Monitoring, Logging and IncidentResponse Configure and manage tools like CloudWatch and ELK Stack to maintain visibility, resilience, and incident support capabilities Stakeholder Collaboration Work closely with solution architects, engineers and More ❯
level. * Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. * SSH Key Management. * Certificate management * HSM configuration/installation/support * Incident management * Change management * ITIL * Ensure the integrity and availability of cryptographic and key management services to business functions and applications Key Accountabilities: * Cryptographic Hardware Management - including on site local … core geographic locations globally. * Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. * Adherence to Group IT Security Standards. * Problem, Incident & Change Management including root cause identification. * Procedure/process development. * Project delivery. * Cryptographic Hardware Management. * Auditable Record Management. * Excellent Risk and Control Maintenance * Ensure governance and clear record keeping … creation and maintenance. * Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality * Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. * Experience of SharePoint, Confluence and JIRA. * Unix/Windows O/S skills More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Investigo
activities Perform SSH key and certificate management Support cryptographic key lifecycle activities: generation, distribution, storage, recovery, and deletion Maintain accurate documentation and perform regular risk and compliance checks Handle incident, problem, and change management processes (aligned with ITIL best practices) Ensure strong governance, audit trails, and adherence to Barclays' IT Security Standards Contribute to automation and scripting efforts (e.g. … in security and/or project management Experience with Unix/Windows operating systems Proficiency in tools such as SharePoint, Confluence, and JIRA Understanding of compliance, data protection, and incidentresponse best practices Experience creating and maintaining operational documentation If you are interested and looking for your next role, please apply with a copy of your CV or More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusion detection prevention systems as well as with SIEM tools and security incidentresponse Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse stakeholders More ❯
warrington, cheshire, north west england, united kingdom Hybrid / WFH Options
LTIMindtree
Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto etc Experience with intrusion detection prevention systems as well as with SIEM tools and security incidentresponse Excellent problem solving skills analytical thinking and the ability to communicate effectively with diverse stakeholders More ❯
systems and its employees, indirectly we protect those who protect us - who serve in our military and rely on the products and services we create. Across Threat Intelligence, Detection, IncidentResponse and now Active Defence we work to evolve cyber operations as a world class capability. Why BAE Systems? This is a place where you'll be able More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. . SSH Key Management. . Certificate management . HSM configuration/installation/support . Incident management . Change management . ITIL . Ensure the integrity and availability of cryptographic and key management services to business functions and applications Key Accountabilities . Cryptographic Hardware Management … globally. . Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. . Adherence to Group IT Security Standards. . Problem, Incident & Change Management including root cause identification. . Procedure/process development. . Project delivery. . Cryptographic Hardware Management. . Auditable Record Management. . Excellent Risk and Control Maintenance . … maintenance. . Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality . Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. . Experience of Sharepoint, Confluence and JIRA. . Unix/Windows O/ More ❯