Are you in a SecurityOperationsCentre and every day is the same? We can assure you that there is no boredom in our role. We have a growing Cyber practice in our Defence sector and support enterprise scale clients. Now we have opportunities for L2 SOC Analysts to join in our success and work with multiple … can offer great career progression opportunities, benefits which you can flex to meet your needs and training and development opportunities. What you will be doing: Monitor, triage, and investigate security incidents on critical client infrastructure. In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Provide Incident Response support. Maintain, improve … and develop team knowledge of SOC tools, securityoperations and triage. Prepare reports for managed clients to both technical and non-technical audiences and continuously improve their content and presentation. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. What you will bring : Experience in SecurityOperations Centre. Demonstrable More ❯
tier consultancy that operates at the sharp end of cybersecurity within defence, aerospace, and national security. We’re looking for an experienced SOC Analyst to join our high-performing SecurityOperationsCentre in Farnborough. This is a unique chance to contribute to real-world cyber defence, on country critical technology, pitting your SCO skills against state of … attacks. As the SOC Analyst, you will: Monitoring and triaging alerts across secure client environments Investigating threats using logs, network traffic, and endpoint telemetry Supporting response efforts during live security incidents Improving detection rules, playbooks, and tooling with MITRE ATT&CK-driven enhancements Producing clear incident reports for both technical and non-technical audiences Contributing to threat intelligence initiatives … Staying ahead of the curve on emerging threats, tactics, and techniques To secure this SOC role: Proven experience in a SecurityOperationsCentre (SOC) environment Hands-on knowledge of SIEM tools (Microsoft Sentinel, Splunk, etc.) Familiarity with MITRE ATT&CK and threat detection methodologies Strong analytical mindset with log, endpoint, and network analysis skills Understanding of network More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
SNG (Sovereign Network Group)
across the South, West and East of England, including London, as well as aiming to create thousands of new affordable homes every year. We're seeking an experienced Cyber Security Analyst to help protect our organisation from cyber threats and contribute to a safe, secure digital future for our customers, systems, and data. You'll be based in our … office in Wembley or Basingstoke, combining both office and home working. The Role: As a Cyber Security Analyst, you'll play a key role in maintaining and improving our cyber resilience. Working closely with our external SecurityOperationsCentre (SOC) and internal teams, you'll monitor systems, respond to threats, remediate vulnerabilities, and help manage incidents. … You'll be part of a collaborative cyber security function that supports all areas of the business, ensuring our infrastructure, applications, and data remain secure and compliant with relevant frameworks and standards. Key Responsibilities Monitor and analyse security events and alerts using SIEM and other security tools Conduct triage of security incidents and escalate as appropriate More ❯
We are rapidly growing our SOC team, offering serious career growth and exciting work with multiple high-profile clients! Join our expanding Cyber practice in the Aerospace Defence and Security sector. This team supports enterprise-scale clients and requires proven experience working in a busy SOC with a tech-first approach. The team is on the cusp of continued … off. You must be eligible for Developed Vetting (DV). We offer excellent career progression opportunities, flexible benefits, and training and development programs. Responsibilities include: Monitoring, triaging, and investigating security incidents on critical client infrastructure. Analyzing network traffic, logs, and system events to identify threats and vulnerabilities. Providing Incident Response support. Maintaining and developing team knowledge of SOC tools … and security operations. Preparing reports for technical and non-technical audiences and improving their content. Updating security incident documentation, including reports, analysis, and mitigation strategies. Qualifications and experience: Experience working in a SecurityOperations Centre. Managing Microsoft Sentinel and Splunk implementations. Knowledge of the Mitre Att&ck Framework. Understanding of client-server applications, web applications, databases More ❯