traffic, and endpoint telemetry Supporting containment and recovery efforts during active security incidents Continuously enhancing SOC capabilities, tooling, and detection rules using threat-informed approaches like MITREATT&CK Producing detailed incident reports and documentation for both technical and non-technical stakeholders Assisting with threat intelligence activities as needed Staying current on evolving threats, attack … will have: Hands-on experience working in a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITREATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic understanding of enterprise security architecture More ❯
People Leadership: Manage and mentor analysts, shaping the future of cyber defence. Optimise Security Operations: Enhance SOC tools , improve detection rules, and refine security processes using MITREATT&CK . Represent the SOC: Engage with key partners and stakeholders. What You Bring: ? SOC Expertise: Proven experience in Security Operations Centres with hands–on threat analysis. … Leadership: Strong people management skills to mentor and develop teams.? Tech Savvy: Knowledge of Microsoft Sentinel, Splunk, and security frameworks like MITREATT&CK .? Networking & Security: Strong understanding of TCP/IP, firewalls, VPNs, and enterprise security tools . Bonus Points for: ? DV Clearance (or eligibility). ? Malware Analysis & Reverse Engineering skills. ? Programming/ More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
Operations Centre (SOC) environment Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking … capability and supporting career progression Enhancing team knowledge across SOC tooling , detection methodologies , and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation , findings, and mitigation strategies Acting as a representative of the SOC in key meetings and internal stakeholder engagements More ❯
investigate security alerts impacting critical infrastructure. Perform detailed analysis of logs, network traffic, and system events. Support development and improvement of detection use cases aligned with MITREATT&CK. Oversee incident documentation, reporting, and remediation advice. Represent the SOC in partner and stakeholder meetings. Contribute to SOC process improvement, skills development, and knowledge sharing. Skills/Must … Have: Strong experience working in a SOC environment. Proven team leadership or people management experience. Expertise in Microsoft Sentinel and Splunk. Familiarity with the MITREATT&CK framework. Sound understanding of network protocols (TCP/IP, HTTP, SMTP, etc.), firewalls, VPNs, AV products, and enterprise infrastructure. It would be great if you had: Skills in More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
Line Management. Maintain, improve and develop team knowledge of SOC tools, security operations and triage. Analyse and improve detection rules and use cases in line with MitreAtt&ck and threat-informed defence. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Represent the SOC within Partners meetings. Ability … in Security Operations Centre. People management experience to help develop Analysts and lead careers. Demonstrable experience of using Microsoft Sentinel and Splunk. Knowledge and experience with MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Good understanding of networking principles including TCP More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Operations Centre (SOC) environment Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Experience … capability and supporting career progression Enhancing team knowledge across SOC tooling , detection methodologies , and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation , findings, and mitigation strategies Acting as a representative of the SOC in key meetings and internal stakeholder engagements More ❯
and recommended mitigation strategies. What you will bring : Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations. Knowledge and experience with MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of More ❯
non-technical stakeholders. Skills/Must have: Proven experience working in a Security Operations Centre. Hands-on experience with Microsoft Sentinel and Splunk. Familiarity with the MitreATT&CK framework. Strong understanding of networking fundamentals (TCP/IP, WANs, LANs, common Internet protocols). Knowledge of enterprise-grade security tools such as firewalls, VPNs, AV More ❯
and ICS/SCADA systems. Strong knowledge of network security , firewalls, VPNs, IDS/IPS, and security zoning. Familiarity with cybersecurity frameworks: NIST CSF , IEC 62443 , MITREATT&CK for ICS . Proficient in developing architecture diagrams, security policies, and risk assessments . Experience working with cross-functional teams in industrial or critical infrastructure environments. More ❯
security incident documentation, including reports, analyses, and mitigation strategies. Requirements: Experience working in a Security Operations Centre. Managing Microsoft Sentinel and Splunk implementations. Knowledge of the MitreAtt&ck Framework. Understanding of client-server applications, web applications, databases, firewalls, VPNs, and AntiVirus products. Expertise in log data analysis and intrusion detection systems. Knowledge of networking More ❯
mitigation strategies. What you’ll bring: Experience in a Security Operations Centre. Demonstrable experience of managing Microsoft Sentinel and Splunk implementations. Knowledge and experience with the MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of More ❯
environments Investigating complex threats using logs, network traffic, and endpoint telemetry Assisting in containment, remediation, and recovery during active incidents Building smarter detection rules aligned with MITREATT&CK Producing clear, actionable incident reports for both technical and leadership teams Staying one step ahead of attackers by integrating evolving threat intel What We’re Looking More ❯
environments Investigating complex threats using logs, network traffic, and endpoint telemetry Assisting in containment, remediation, and recovery during active incidents Building smarter detection rules aligned with MITREATT&CK Producing clear, actionable incident reports for both technical and leadership teams Staying one step ahead of attackers by integrating evolving threat intel What We’re Looking More ❯
paced, mission-critical environment. The Role Monitoring & triaging alerts across secure client environments Investigating threats using logs, traffic, and endpoint telemetry Developing smarter detection rules (think MITREATT&CK) Creating incident reports for both technical & non-technical audiences Staying ahead of evolving attack techniques & threat intel We need: Solid grasp of network protocols and security More ❯
Hemel Hempstead, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Eligibility for or possession of UK Security Clearance (preferred but not required). Solid understanding of common attack techniques and vulnerability classes (e.g., OWASP Top 10, MITREATT&CK). Strong familiarity with tools such as Burp Suite, Nmap, Metasploit, etc. Excellent communication and reporting skills. Required Qualifications: Demonstrable experience in penetration testing (minimum More ❯
or C) Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them Familiarity with adversary emulation frameworks and MITREATT&CK Exposure to social engineering or physical red teaming is a strong bonus A calm, pragmatic communicator who can write clearly and explain technical risk to a More ❯