our internal threat library. What You Bring Must-Haves Bachelor’s degree in Cybersecurity, Computer Science, or related field. Practical experience with at least one SIEM platform (e.g., Splunk, QRadar). Understanding of networking fundamentals, TCP/IP, and common protocols. Strong investigative mindset and attention to detail. Clear, concise communication skills for both technical and business audiences. Nice More ❯
Employment Type: Full-Time
Salary: £36,000 - £43,000 per annum, Negotiable, OTE
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
operating systems (Windows, Linux, macOS), and common enterprise applications. Expertise in analysing network traffic (e.g., packet analysis with Wireshark). Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
operating systems (Windows, Linux, macOS), and common enterprise applications. Expertise in analysing network traffic (e.g., packet analysis with Wireshark). Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
operating systems (Windows, Linux, macOS), and common enterprise applications. Expertise in analysing network traffic (e.g., packet analysis with Wireshark). Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and More ❯
uplift. Minimum Qualifications Experience in detection engineering, security engineering, or software development with a focus on cybersecurity. Proven experience developing detections and integrations within SIEM platforms (e.g., Splunk, Elastic, QRadar), ideally making use of Risk Based Alerting. Strong skills in Python and JavaScript, with familiarity in NodeJS and Kubernetes environments. Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, Cyber More ❯
uplift. Minimum Qualifications Experience in detection engineering, security engineering, or software development with a focus on cybersecurity. Proven experience developing detections and integrations within SIEM platforms (e.g., Splunk, Elastic, QRadar), ideally making use of Risk Based Alerting. Strong skills in Python and JavaScript, with familiarity in NodeJS and Kubernetes environments. Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, Cyber More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
Web Content Filtering, Database Activity Monitoring (DAM), PKI, DLP, IAM, and SOC technologies such as EDR and SOAR Good knowledge of SIEM tools like Google Chronicle, Splunk ES, or QRadar In-depth familiarity with security policies based on industry standards and best practices Experienced in security operations, incident management, intrusion analysis, device installation, configuration, and troubleshooting Experience with log More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
role). What You’ll Bring 3–5 years’ experience in a SOC environment (Tier 2-level maturity). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
. What You'll Bring 3-5 years' experience in a SOC environment (Tier 2-level maturity preferred). Hands-on experience with SIEM platforms (Sentinel/Splunk/QRadar or similar). Strong understanding of incident response and threat investigation. Comfortable working autonomously in a developing function Relevant certifications (Security+, CEH, GCIA, CISSP or similar). Package Salary More ❯
and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools - particularly IBMQRadar , Splunk, and Microsoft Sentinel. Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise with clients, Service Delivery Managers, and … activities and SOC solution demonstrations when required. What You'll Bring 3-5 years' experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerability management, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria
Our Cyber team look after some complicated and compelling areas within Aero, Defence and Security. If you want to lead from the front, gain experience working with multiple clients, and always have access to the latest technologies, then join the More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
Our Cyber team look after some complicated and compelling areas within Aero, Defence and Security. If you want to lead from the front, gain experience working with multiple clients, and always have access to the latest technologies, then join the More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
We have a large SOC team that can boast some very high profile clients within the Defence sector. Due to expansion, we have this new role for a Senior SOC SIEM Content Engineer with broad experience of Cyber. If you More ❯