Reading, Berkshire, United Kingdom Hybrid / WFH Options
DCL
escalations Conduct advanced threat hunting using the Microsoft Security Stack. Build, optimise and maintain workbooks, rules, analytics etc. Correlate data across Microsoft 365 Defender, Azure Defender and Sentinel. Perform rootcauseanalysis and post-incident reporting. Aid in mentoring and upskilling Level 1 and 2 SOC analysts. Required Skills & Experience: The ability to achieve UK Security Clearance More ❯
Perform 2nd Level Operations and Maintenance (O&M) on customer IP network elements, including routers, switches, and firewalls. •Meet or exceed network availability targets and ensure service continuity. •Conduct rootcauseanalysis (RCA) for network system faults. •Prioritize fault resolution to meet SLA/WLA requirements. •Investigate and resolve system/network problems comprehensively. •Coordinate with technical More ❯
CrowdStrike, escalating incidents as needed and ensuring timely resolution. Leverage Microsoft Co-pilot and automation workflows to streamline threat detection, incident triage, and response processes. Conduct in-depth log analysis and correlation across multiple data sources to identify potential security threats and reduce false positives. Support threat hunting and rootcauseanalysis efforts, providing detailed documentation More ❯
This L3 SOC Analyst will have the previous following experience: Act as a lead investigator for high-severity security incidents, coordinating response activities and containment strategies. Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats. Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk). Collaborate with engineering and … campaigns using tools such as Defender, CrowdStrike, and custom scripts. Contribute to playbook development, automation improvements (including Microsoft Co-pilot integration), and process optimization. Produce executive-level incident reports, rootcause analyses, and recommendations for remediation and hardening. More ❯
and mitigate threats Design, maintain, and continuously enhance playbooks, response frameworks, and tabletop exercises, incorporating threat intelligence and detection insights from CrowdStrike and Splunk to mature IR readiness. Lead rootcauseanalysis and develop actionable remediation plans; deliver executive-level reporting and trend analysis using integrated dashboards, combining insights from Splunk and Defender data sources. Serve More ❯