The team you'll be working with: Senior SOCAnalyst We are currently recruiting for a Senior SOC Anslyst to join our growing SecurityOperationsCentre business. This role will be based in Glasgow, and requires a willingness to work in a job that involves 24/7 operations or on call, this will probably be … using innovative technology that can create a world that is sustainable and secure. What you'll be doing: What you will be doing; The primary function of the Senior SOCAnalyst is to manage any incidents escalated by the SOCAnalyst (L1 & L2) and undertake the detailed investigation of the Security Event. The Senior … SOCAnalyst shall be able to look at all the evidence available and support the client on the appropriate action to contain and remediate any security incident. They will need to be able to provide root cause analysis and liaise with the customer and the Service Delivery Manager as well and ensuring the actions of the SOCMore ❯
Senior SecurityOperationsCentreAnalyst Location: Gosport Hours: 9-5:30pm (on-site) Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work, all applicants will be required to gain UK Security Clearance to the highest level. You must be a British National who has been resident in the … leave (with the option to purchase additional days), health cash plan, life assurance, pension scheme, and a generous flexible benefits fund. Key Requirements: We are seeking an experienced Senior SOCAnalyst who brings a strong background in securityoperations , threat detection, and incident response. This is … a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in a SecurityOperationsCentre (SOC) environment. Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk . Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
Senior SOCAnalyst Location: Gosport (Predominantly site-based with some flexibility for remote working) Salary: Highly competitive with excellent benefits package Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the highest level. You must be … leave (with the option to purchase additional days), health cash plan, life assurance, pension scheme, and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOCAnalyst who brings a strong background in securityoperations , threat detection, and incident response. This is a … critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in a SecurityOperationsCentre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in More ❯
Job Description Senior SecurityOperationsCentreAnalyst Location: Gosport Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the highest level. You must be a British who has been in the UK for at least the last … leave (with the option to purchase additional days), health cash plan, life assurance, pension scheme, and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOCAnalyst who brings a strong background in securityoperations , threat detection, and incident response. This is … a critical role that supports the defence of infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in a SecurityOperationsCentre (SOC) environment SOC Level 2 Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP More ❯
Senior SOCAnalyst Location: Washington DC Industry: Dept. of Defense/Cybersecurity Salary: $170k-$205k Employment Type: Permanent Placement Clearance: Active Top Secret clearance with SCI Eligibility Required Schedule: Monday to Friday, 8am to 5pm Summary: We are actively searching for a skilled SOCAnalyst to join our defense client s team! The successful … Technology, Computer Science or related engineering field preferred; equivalent military or professional experience may be considered in lieu of degree Minimum 5+ years of hands-on experience in a SOC or cyber threat analysis role 10+ years of overall experience in cybersecurity or information systems environments DoD 8570 IAT II Certification required (Sec+, CISSP, GCIH, CYSA+) required Proficiency in … rapidly and precisely match professionals to client requirements. We have a proprietary database of over one million candidates and maintain continuous contact with our qualified talent. Keyword Search string: SOCAnalyst, SecurityOperations Center, Cybersecurity, Information Technology, IT Professional, TAP Technologies, TAPs, Security+, Sec+, DoD 8570, Traffic Analysis Packet, Cyber Threats More ❯
Social network you want to login/join with: Senior SecurityOperationsCentreAnalyst with a strong background in securityoperations, threat detection, and incident response is required by Logic Engagements to work for a large scale leading organisation based in Gosport, Hampshire As a Senior SOCAnalyst, you will be at the forefront of … overall capability and resilience of the SecurityOperationsCentre Staying abreast of cyber threat developments and contributing to best practices and process enhancements Supporting the continuous development of the SOC team through … knowledge sharing and mentoring In order to be successful for this role you will need to be able to demonstrate the following experience: Proven experience in a SecurityOperationsCentre (SOC) environment Previous experience working as a SOC Level 2/Cyber SecurityAnalyst Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and More ❯
R2 Cyber SecurityAnalyst Remote The R2 Analyst plays a vital role in the SecurityOperationsCentre (SOC), contributing to the organisation's overall cybersecurity posture by actively participating in the monitoring, analysis, and response to security incidents and events. With a focus on continuous learning and collaboration, the R2 Analyst supports the … SOC team in identifying, assessing, and mitigating potential security threats and vulnerabilities. Through the application of foundational technical skills and a strong dedication to detail-oriented analysis, the R2 Analyst assists in safeguarding the organization's critical systems, data, and assets from cyber risks. By working closely with senior analysts and leveraging emerging technologies, the R2 Analyst … to analyze and interpret threat intelligence feeds and implement protective measures accordingly. Incident Remediation and Documentation: Provide incident remediation and prevention recommendations to customers using established procedures and analyst experience. Document and adhere to security monitoring processes. Apply preventative measures by implementing domain blocking, host isolation and file hash blacklisting. Customer Service and Escalation: Exceed customer expectations by More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Queen Square Recruitment
Our client, a leading global organisation, is partnering with a prestigious end client based in Manchester. We are excited to offer a fantastic opportunity for a talented SOCAnalyst L3 to join a dynamic and agile development team on an initial 6-month contract, with the potential for extension. If you are interested and have the relevant … skills and experience, please apply promptly to discuss further. Job Title: SOCAnalyst – Level 3 Location: Manchester, UK (Hybrid – minimum 3 days on-site per week) Contract Type: Contract (6 months) Day Rate: Inside IR35 (Flexible) About the Role A leading organisation is seeking an experienced SOCAnalyst (Level 3) to join its cybersecurity … professionals who excel in high-stakes environments and possess a strong engineering background, particularly within the Microsoft and Azure security ecosystem. The ideal candidate will be instrumental in driving SOC maturity, optimizing license consumption, and enhancing security visibility across the enterprise. Key Responsibilities Lead the investigation and resolution of high-severity security incidents Conduct proactive threat hunting using Microsoft More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Limited
Job title: SOC Tier 3 Analyst Will the role be 100% remote, hybrid or 100% office? Hybrid 3 days/week If the role is hybrid/office based specify location: Reading, UK Duration of assignment: 6 months contract InsideIR35 Role description: Seeking a highly experienced SOC L3 Analyst to strengthen our SecurityOperations … Center. As a Tier 3 CERT Analyst, Candidate will lead the investigation and remediation of advanced cyber threats, leveraging cutting-edge tools such as Splunk , Microsoft Sentinel , CrowdStrike , and Defender and other security stacks. Candidate will handle complex incidents like APTs, malware, and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. … tasks or create custom detection methods. Certifications (Preferred ): Certified Information Systems Security Professional (CISSP) Certified Incident Handler (GCIH, EC-Council) Certified Forensic Computer Examiner (CFCE) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) Analytical Skills: Strong analytical thinking, with the ability to connect seemingly unrelated pieces of information to identify threats. Excellent troubleshooting, problem More ❯
The team you'll be working with: SOCAnalyst (L1) We are currently recruiting for an Associate level Managed Detection and Response SOCAnalyst Level 1 to join our growing SecurityOperationsCentre business. This role will be based on-site in Birminham, we need canddiates that are able towork in a job that … to play a pivotal role in helping to shape our client's transformation journeys. What you'll be doing: What you will be doing; The primary function of the SOCAnalyst (L1) is to analyse any incidents and undertake the detailed investigation of the Security Event. The role is a 'hands-on' shift-based roles, working as … part of a 24/7 operation working in a standard rotation shift pattern. They are responsible for utilising the SOC's SIEM and SOAR toolsets to detect and investigate potential Security and Service Incidents occurring within the monitored networks. Main Duties Monitor, triage, analyse and investigate alerts, log data and network traffic using the Protective Monitoring platform and More ❯
Join to apply for the Senior SOCAnalyst role at Bluecube Technology Solutions - An Ekco Company 1 day ago Be among the first 25 applicants Join to apply for the Senior SOCAnalyst role at Bluecube Technology Solutions - An Ekco Company Get AI-powered advice on this job and more exclusive features. Founded in … highly talented and supportive colleagues (and counting) across a number of regional offices in the UK, Benelux, South Africa, Malaysia& Ireland. The Role Reporting to the regional Head of SOC, the role of the Senior SOCAnalyst is to apply the understanding of investigative techniques and analytical skills, to defend against and respond to cybersecurity events … part of a team to deliver monitoring and protection in both a reactive and proactive manner. You will also be responsible for rolling out security tools including creating documentation. SOC Analysts at Ekco are operationally focused; they configure, secure, and monitor systems, using advanced toolsets, to prevent security breaches and to respond to incidents as they arise. Day to More ❯
recurring false positives or noisy alerts and propose sustainable resolutions Support deployment and configuration of security tooling Compliance, Reporting and Documentation: Lead security audits and assessments, providing evidence of SOC activities and controls Maintain accurate records of all events handled, including triage notes and escalation details. Lead the delivery of incident and vulnerability summaries to the management team and … Security Working Groups Lead post-incident reviews and document lessons learned Ensure compliance with industry standards, regulations, and internal security policies Prepare and present regular reports and metrics on SOCoperations and overall security posture Vulnerability Management: Coordinate and support risk-based prioritisation of vulnerability remediation efforts Support vulnerability lifecycle management, including exception handling, patch validation, and reporting Provide … learnings to improve the overall security posture of the organization Continuous Improvement: Identify gaps in detection, response, or processes and propose pragmatic, measurable improvements Lead small initiatives to improve SOC efficiency, such as automating repetitive tasks or improving alert triage Contribute to maturity efforts such as MITRE ATT&CK mapping, control gap analysis, or threat modelling Education and Experience More ❯
recurring false positives or noisy alerts and propose sustainable resolutions. Support deployment and configuration of security tools. Compliance, Reporting, and Documentation Lead security audits and assessments, providing evidence of SOC activities and controls. Maintain accurate records of all events handled, including triage notes and escalation details. Lead the delivery of incident and vulnerability summaries to the management team and … security working groups. Lead post-incident reviews and document lessons learned. Ensure compliance with industry standards, regulations, and internal security policies. Prepare and present regular reports and metrics on SOCoperations and overall security posture. Vulnerability Management Coordinate and support risk-based prioritization of vulnerability remediation efforts. Support vulnerability lifecycle management, including exception handling, patch validation, and reporting. Provide … intelligence, and incident learnings to improve the overall security posture. Continuous Improvement Identify gaps in detection, response, or processes and propose pragmatic, measurable improvements. Lead small initiatives to improve SOC efficiency, such as automating repetitive tasks or enhancing alert triage. Contribute to maturity efforts like MITRE ATT&CK mapping, control gap analysis, or threat modeling. Application Process To apply More ❯
Social network you want to login/join with: SecurityOperations Center Analyst, Leeds, West … Yorkshire Client: Anson McCade Location: Leeds, West Yorkshire, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 2 Posted: 08.05.2025 Expiry Date: 22.06.2025 Job Description: Senior SOCAnalyst Please note: Candidates must be eligible for DV clearance (sole British national). We’re looking for an experienced Senior SOCAnalyst to … Conduct in-depth incident investigations, reporting, and remediation. Utilise threat intelligence to detect and respond to potential threats. Support incident response activities for national-scale cyber events. Help improve SOC workflows, including automation and threat detection use cases. Coach junior analysts and contribute to continuous improvement across the team. Hands-on experience with Microsoft Sentinel (critical to this role More ❯
Job Title: SOC AnalystLocation: On-site - Wiltshire, UKSalary: £40,000 - £46,000 (DOE) + Bonus + Excellent BenefitsClearance: Must hold active SC clearance and be willing to undergo DV clearance (or already DV cleared)Nationality Requirement: Sole British Nationals onlyWorking Pattern: Fully on-site, no shift work About the Role:We are seeking a highly motivated and detail-oriented … SOCAnalyst to join our on-site team in Wiltshire. This is a critical role within our cyber securityoperations, responsible for monitoring, detecting, and responding to security incidents, ensuring compliance, and maintaining the integrity of our systems and networks. Key Responsibilities: * Monitor and analyse security events using SIEM tools* Conduct incident response and triage activities* Perform … accurately* Stay current with emerging threats and vulnerabilities* Demonstrate an understanding of the wider cyber security landscape and risks Essential Skills & Experience: * Minimum of 2 years' experience in a SOC or cyber security role* Strong understanding of SIEM technologies and incident response processes* Solid knowledge of computer networks, protocols, and infrastructure* Experience with security monitoring, logging, and compliance frameworks More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Whitehall Resources Ltd
Social network you want to login/join with: SOCSecurityAnalyst (Microsoft Sentinel & Defender Specialist), Manchester col-narrow-left Location: Manchester, United Kingdom Job Category: Information Technology EU work permit required: Yes col-narrow-right Job Reference: BBBH64047_1750251157 Job Views: 21 Posted: 18.06.2025 Expiry Date: 02.08.2025 col-wide Job Description: SOCSecurityAnalyst (Microsoft Sentinel & Defender Specialist) Whitehall resources are looking for an experienced SOCSecurityAnalyst (Microsoft Sentinel & Defender Specialist). This role is hybrid working with 2-3 days per week on site in Manchester, and the remainder remote working, for an initial 6-month contract. ***Inside IR35*** Job Summary: We are seeking a highly skilled … and experienced SOC L3 Analyst with strong engineering knowledge and deep expertise in Microsoft Sentinel and the Microsoft Defender suite. The ideal candidate will take a lead role in advanced threat detection, incident response, detection engineering, and security monitoring, while also optimising license consumption and SIEM integration efforts. Key Responsibilities: Advanced Threat Detection & Incident Response - Investigate and More ❯
We are seeking a highly motivated and detail-oriented SOCAnalyst to join our SecurityOperations Center team. The SOCAnalyst will be responsible for monitoring, analyzing, and responding to cybersecurity incidents and threats. The ideal candidate will have experience with security monitoring tools, threat analysis, and incident response. Key Responsibilities: Monitor and analyze … accurate documentation of incidents, investigations, and findings. Collaborate with IT and security teams to coordinate response and resolution. Conduct threat hunting to proactively detect malicious activity. Maintain and improve SOC procedures and playbooks. Stay current on cybersecurity trends, threats, and vulnerabilities. Participate in regular security audits and assessments. Assist in developing and maintaining security monitoring rules and use cases. … cybersecurity, or IT role. Experience with SIEM platforms (e.g., Splunk, QRadar, ArcSight). Familiarity with log analysis and intrusion detection systems. Certifications (Preferred but not required): CompTIA Security+ Certified SOCAnalyst (CSA) GIAC Security Essentials (GSEC) Certified Ethical Hacker (CEH) Skills: Strong analytical and problem-solving skills. Good understanding of TCP/IP, DNS, HTTP, VPN, and More ❯
The team you'll be working with: SOCAnalyst (L2) We are currently recruiting for a Senior Associate level Managed Detection and Response SOCAnalyst Level 2 to join our growing SecurityOperationsCentre business. This role will be based on-site in Birmingham. We need candidates who are able to work in a … the SOCAnalyst (L2) is to analyze incidents escalated by the SOCAnalyst (L1) and undertake detailed investigations of Security Events. The SecurityAnalyst (L2) will determine whether a security event qualifies as an incident and coordinate with the customer's IT and Security teams for resolution. Main Duties Security Monitoring & Investigation … threat intelligence into monitoring processes. Contribute to threat intelligence feeds for proactive detection. Security Tool Management: Manage and optimize SIEM tools, ensuring proper configuration and updates. Develop and implement SOC Use Cases. Evaluate new security technologies and recommend improvements. Collaboration: Work with IT, legal, and management teams on security incidents and preventive measures. Provide guidance to other analysts. Coordinate More ❯
worldwide. The team’s mission is to enhance the global cyber defence posture and reduce cyber risks through operational leadership and capabilities. We’re looking for a Level 3 SOCAnalyst to join our client's team, offering expertise in security analysis and incident response to help drive the success of their Cyber SecurityOperations Center (CSOC … . In this role, you will investigate and validate potential security threats, utilising a range of security tools and products. As a Senior Analyst, you will also work to mentor and uplift analyst skills and act as a key escalation point. The role will involve collaborating with global security teams, including CERT and Incident Management, to … perspective, identifying potential threat group activity. Mentorship & Leadership: Mentor and encourage team members to create sustainable knowledge bases, playbooks, processes, and procedures. Key Requirements: 4+ years of experience in SOC analysis, security event analysis, and incident response (Level 2 or above). Extensive hands-on experience in security event analysis and incident response. Deep knowledge of IPv4/IPv6 More ❯
worldwide. The team’s mission is to enhance the global cyber defence posture and reduce cyber risks through operational leadership and capabilities. We’re looking for a Level 3 SOCAnalyst to join our client's team, offering expertise in security analysis and incident response to help drive the success of their Cyber SecurityOperations Center (CSOC … . In this role, you will investigate and validate potential security threats, utilising a range of security tools and products. As a Senior Analyst, you will also work to mentor and uplift analyst skills and act as a key escalation point. The role will involve collaborating with global security teams, including CERT and Incident Management, to … perspective, identifying potential threat group activity. Mentorship & Leadership: Mentor and encourage team members to create sustainable knowledge bases, playbooks, processes, and procedures. Key Requirements: 4+ years of experience in SOC analysis, security event analysis, and incident response (Level 2 or above). Extensive hands-on experience in security event analysis and incident response. Deep knowledge of IPv4/IPv6 More ❯
London, England, United Kingdom Hybrid / WFH Options
55 Exec Search
whilst having a generous shift allowance of 17.5%! Our client is a dedicated, pure-play cybersecurity consulting firm. As part of their growth plans, they are seeking a Senior SOCAnalyst, Shift Lead who combines technical expertise with a desire to lead junior analysts to join their dynamic, fast-paced team. About the Role This is a … hands-on shift leadership role operating on a 4-on, 4-off shift pattern , ensuring sustained SOC coverage across critical hours. You’ll manage, mentor, and train two junior SOC analysts working on your shift, while also delivering advanced securityoperations services to clients across a range of industries. As a Senior SOCAnalyst , you … will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including SOAR platforms, to deliver smarter, faster, and more effective security outcomes. This role provides a unique opportunity to help shape the future More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
55 Exec Search
whilst having a generous shift allowance of 17.5%! Our client is a dedicated, pure-play cybersecurity consulting firm. As part of their growth plans, they are seeking a Senior SOCAnalyst, Shift Lead who combines technical expertise with a desire to lead junior analysts to join their dynamic, fast-paced team. About the Role This is a … hands-on shift leadership role operating on a 4-on, 4-off shift pattern , ensuring sustained SOC coverage across critical hours. You’ll manage, mentor, and train two junior SOC analysts working on your shift, while also delivering advanced securityoperations services to clients across a range of industries. As a Senior SOCAnalyst , you … will be central to incident response, threat hunting , and real-time defence management , guiding and mentoring two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including SOAR platforms, to deliver smarter, faster, and more effective security outcomes. This role provides a unique opportunity to help shape the future More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Focus on SAP
Be among the first 25 applicants Direct message the job poster from Focus on SAP SAP Recruitment Consultant at Focus on SAP (part of the Focus Cloud Group) Position: SOC Tier 3 Analyst Employment Type: Contract, Full time Start: ASAP Location: Reading – Hybrid Languages: English We are seeking an experienced and highly capable SOC Tier … Analyst to serve as a senior member of our SecurityOperations Center (SOC). You will lead advanced incident response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. This is a pivotal role for those passionate about cybersecurity, threat detection, and investigative analysis. Key Responsibilities Advanced … collaboration with IT and infrastructure teams. Ensure proper cleanup and restoration of affected systems. Share Indicators of Compromise (IOCs) and support threat blocking strategies. Collaboration & Knowledge Sharing Mentor junior SOC analysts and share knowledge across incident response workflows. Engage with stakeholders across IT, DevOps, and legal to enhance security posture. Contribute to post-incident reviews and continuous process improvement. More ❯
Seeking a highly experienced SOC L3 Analyst to strengthen our SecurityOperations Center. As a Tier 3 CERT Analyst, Candidate will lead the investigation and remediation of advanced cyber threats, leveraging cutting-edge tools such as Splunk, Microsoft Sentinel, CrowdStrike, and Defender and other security stacks. Candidate will handle complex incidents like APTs, malware, and … etc.) to automate tasks or create custom detection methods. Certifications (Preferred ): o Certified Information Systems Security Professional (CISSP) o Certified Forensic Computer Examiner (CFCE) o GIAC Certified Forensic Analyst (GCFA) o GIAC Certified Intrusion Analyst (GCIA) Analytical Skills: o Strong analytical thinking, with the ability to connect seemingly unrelated pieces of information to identify threats. o More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Focus on SAP
Position: SOC Tier 3 Analyst Employment Type: Contract, Full time Start: ASAP Location: Reading – Hybrid Languages: English We are seeking an experienced and highly capable SOC Tier 3 Analyst to serve as a senior member of our SecurityOperations Center (SOC). You will lead advanced incident response efforts, conduct proactive threat hunting … collaboration with IT and infrastructure teams. Ensure proper cleanup and restoration of affected systems. Share Indicators of Compromise (IOCs) and support threat blocking strategies. 🤝 Collaboration & Knowledge Sharing Mentor junior SOC analysts and share knowledge across incident response workflows. Engage with stakeholders across IT, DevOps, and legal to enhance security posture. Contribute to post-incident reviews and continuous process improvement. … Security Research & Intelligence Stay ahead of industry developments, vulnerabilities, and attacker methodologies. Create detection rules and playbooks to improve SOC capabilities. Contribute threat intelligence findings and detection logic to the team knowledge base. 🧾 Documentation & Reporting Produce clear, detailed incident reports and present findings to stakeholders or clients. Maintain thorough documentation of investigation steps, timelines, and decisions taken. ⚖️ Compliance & Risk More ❯