Sunbury-On-Thames, London, United Kingdom Hybrid/Remote Options
BP Energy
sustainably is fundamental to achieving our ambition to be a net zero company by 2050 or sooner. About the role: As an Operational IS Specialist, you will support information security and risk activities within Operational Security Management. Our SecurityOperations Center (SOC) is the frontline of defense, responsible for incident response, initial triage, and proactive threat … hunting. You will work closely with the Cyber Security Incident Response Team (CSIRT) and business units across bp. As the first point of contact for many, SOC Analysts also play an ambassadorial rolepromoting digital security and guiding partners on a wide range of security topics. Working with the SOC Lead in Sunbury, you will be part of … a global team dedicated to safeguarding bps enterprise, enabling business continuity, and ensuring safe and secure operations worldwide. The position will be based in Sunbury and in line with bp's global hybrid working policy is expected to be office based 3 days per week. In addition, the successful candidate must be available to work Monday to Friday More ❯
sustainably is fundamental to achieving our ambition to be a net zero company by 2050 or sooner. About the role: As an Operational IS Specialist, you will support information security and risk activities within Operational Security Management. Our SecurityOperations Center (SOC) is the frontline of defense, responsible for incident response, initial triage, and proactive threat … hunting. You will work closely with the Cyber Security Incident Response Team (CSIRT) and business units across bp. As the first point of contact for many, SOC Analysts also play an ambassadorial rolepromoting digital security and guiding partners on a wide range of security topics. Working with the SOC Lead in Sunbury, you will be part of … a global team dedicated to safeguarding bps enterprise, enabling business continuity, and ensuring safe and secure operations worldwide. The position will be based in Sunbury and in line with bp's global hybrid working policy is expected to be office based 3 days per week. In addition, the successful candidate must be available to work Monday to Friday More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
VIQU IT Recruitment
Security Analyst – 5-week Contract – Fully Remote My Customer is seeking a proactive and technically skilled Security Analyst to join their growing cybersecurity function. This role acts as the critical bridge between the SOC (SecurityOperationsCentre) team and the wider management group — ensuring that security incidents are not only investigated and remediated effectively … but also translated into actionable insights and long-term improvements across the business. Skills required from the Security Analyst: Proven experience in a Security Analyst , Incident Response , or SOC environment (2nd line or similar). Strong hands-on experience in threat investigation, log analysis, and remediation . Good understanding of common security frameworks and practices (e.g., MITRE … ATT&CK, NIST, ISO 27001). Familiarity with a range of security tools and platforms – experience with Microsoft Sentinel is desirable but not essential. Excellent communication skills – able to liaise confidently between technical and non-technical teams. A consultative mindset with the ability to translate technical findings into meaningful business recommendations. Key Responsibilities from the Security Analyst: Act More ❯
SC Clearance Required) – Multiple UK Locations (Shift Work) - £55,000 - £58,000 – Permanent Are you passionate about cybersecurity and ready to make a real impact? We’re expanding our SecurityOperationsCentre (SOC) team and looking for Level 2 SOC Analysts to join us across multiple UK locations.This is a fantastic opportunity to work with enterprise-scale … You’ll be part of a collaborative team using cutting-edge technologies like Microsoft Sentinel, Splunk, and MISP Threat Sharing to protect critical infrastructure. Key Responsibilities: Monitor and analyse security alerts and events, conduct initial investigations, and escalate complex incidents. Manage SOC incident queues and support asset baseline maintenance. Prepare reports for technical and non-technical audiences. Collaborate on … intelligence development and incident documentation. Shift Pattern: 2 days (6am–6pm), 2 nights (6pm–6am), followed by 4 days off. What We’re Looking For: Experience working in a SecurityOperations Centre. Familiarity with Microsoft Sentinel and Splunk. Understanding of the MITRE ATT&CK framework. Basic knowledge of networking, client-server applications, firewalls, VPNs, and antivirus products. Entry More ❯
Stevenage, Hertfordshire, South East, United Kingdom
Guidant Global
Our client, the UK's trusted Ministry of Defence partner, is seeking an experienced SOC Threat Detection Analyst to join the cyber securityoperationscentre (SOC) within Information Management (IM). The successful candidate will support Senior SOC analysts in addressing the challenges of countering cyber threats, driving a proactive ethos in a dynamic environment, and providing … the UK InfoSec Team, and the IM Domains (Customer Support and Infrastructure/Information Systems). Responsibilities cover analysis, monitoring, reporting, alerting, and investigation activities using a variety of security platforms, including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture, Anti-Malicious Code, and Threat Detection technologies across the UK Network Perimeter. … incident response team with investigations that need to be escalated to an embedded staff member. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project More ❯
protecting their digital way of life. Job Summary As a Domain Consultant for SOC Transformation you will be the expert for our Cortex portfolio, a Next-Gen AI-powered securityoperations platform. You will play a key role in defining technical solutions that secure a customer's key business imperatives. You evangelize our industry leading solutions in Security … rates within your assigned specialization area Responsible for discussing and highlighting product alignment with customer requirements and differentiation Architect solutions that will help our customers strengthen and simplify their security posture Document High-Level Design and Key Use Cases to ensure proper implementation and value realization of Palo Alto Networks Solutions Help our customers build and develop further their … services around Cortex solutions Lead conversations about industry trends and emerging changes to the security landscape Discuss, with credibility, competitive offers in the marketplace and position ours as the best alternative Position Palo Alto Networks or Partner delivered services as appropriate to ensure proper implementation and value realization of Palo Alto Networks solutions Initiate projects to improve individual team More ❯
on a temporary basis until a permanent position can be filled. Scope and Objectives To Work alongside an existing team of Cyber Engineer and Cyber Analysts within an established SecurityOperationsCentre to provide level 1 triage analysis duties which include: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyber threats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data/Security Alerts to support Customers in responding to Security … of the team to ensure best practice and that their knowledge is up to date. In association with other colleagues provide an on-Call service to investigate and remedy security and technical issues in relation to the SOC service on a 24/7 basis . Skills and Experience Working knowledge of Various Operating systems including Windows and Linux. More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Solos Consultants Ltd
on a temporary basis until a permanent position can be filled. Scope and Objectives To Work alongside an existing team of Cyber Engineer and Cyber Analysts within an established SecurityOperationsCentre to provide level 1 triage analysis duties which include: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyber threats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data/Security Alerts to support Customers in responding to Security … of the team to ensure best practice and that their knowledge is up to date. In association with other colleagues provide an on-Call service to investigate and remedy security and technical issues in relation to the SOC service on a 24/7 basis . Skills and Experience Working knowledge of Various Operating systems including Windows and Linux. More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid/Remote Options
Summer Browning Associates
SOC ANALYST | CYBER SECURITY ANALYST Summer-Browning Associates is supporting our client in the Central Government who is seeking a SOC/Cyber Security Analyst for an initial 6-month assignment, with the possibility of extension. Location: Milton Keynes | London | Hybrid The ideal candidates will hold active SC or DV clearance and have a proven background in Cyber … Security Operation Centres working within a high-threat government environment: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Sentinel, Splunk, Defender, Qualys, Tenable, Huntsman & LogRhyth Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for … efficient remediation. Experience in network security principles, firewalls, and access control mechanisms Knowledge of navigating secure environments in the public sector/defence sector effectively. To apply, please submit your latest CV for review. More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid/Remote Options
Summer Browning Associates
SOC ANALYST CYBER SECURITY ANALYST Summer-Browning Associates is supporting our client in the Central Government who is seeking a SOC/Cyber Security Analyst for an initial 6-month assignment, with the possibility of extension. Location: Milton Keynes London Hybrid The ideal candidates will hold active SC or DV clearance and have a proven background in Cyber … Security Operation Centres working within a high-threat government environment: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Sentinel, Splunk, Defender, Qualys, Tenable, Huntsman & LogRhyth Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for … efficient remediation. Experience in network security principles, firewalls, and access control mechanisms Knowledge of navigating secure environments in the public sector/defence sector effectively. To apply, please submit your latest CV for review. More ❯
Stevenage, Hertfordshire, South East, United Kingdom Hybrid/Remote Options
MBDA
Stevenage Join MBDA's cutting-edge cyber security team and help protect some of the most advanced defence technologies in the world. As a Cyber Security Engineer, you'll be at the forefront of innovation-enhancing the visibility, automation, and efficiency of our SecurityOperationsCentre (SOC). This role is perfect for someone who … contribute to a mission that truly matters. Salary : Circa £50,000 - £60,000 depending on experience Dynamic (hybrid) working :2 days per week on-site due to workload classification Security Clearance : British Citizen or a Dual UK national with British citizenship Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a … minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS), which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus : Up to £2,500 (based on company performance and will vary year to year) Pension : maximum total (employer and employee) contribution of up More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid/Remote Options
Sopra Steria
a lot to offer! Our new position of Lead SOC Analyst will direct a team of SOC Analysts, conduct monitoring and triage of alerts associated with host and network security events for our clients critical infrastructure and support the SOC through both delivery of client work and adding skills and ideas to this already diverse team. Come and make … Clearance for this role. What you'll be doing: Lead and empower a team of SOC analysts, providing mentoring, performance management, and career progression opportunities. Monitor, triage, and investigate security incidents on critical client infrastructure. Perform in-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Provide Incident Response support. Maintain … improve and develop team knowledge of SOC tools, securityoperations and triage. Prepare reports for managed clients to both technical and non-technical audiences. Analyse and improve detection rules and use cases in line with Mitre Att&ck and threat-informed defence. Represent the SOC within Stakeholders meetings. Ability to work in a hybrid approach from home and More ❯
Analyst (Operational Technology) Outside IR35 Duration: 6 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and/or escalated events and alerts then, using experience combined … forensic analysis across multiple data sources and recommend containment and eradication actions. Crisis Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous … Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause Analysis Leader Experience working with and enhancing security monitoring tooling Extensive IT/OT Systems Experience Extensive CNI & OT Environment Awareness Experience aligning with organisational requirements and contributing to audit readiness Tickets/Qualifications/Accreditations required More ❯
Analyst (Operational Technology) Outside IR35 Duration: 6 – 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and/or escalated events and alerts then, using experience combined … forensic analysis across multiple data sources and recommend containment and eradication actions. Crisis Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous … Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause Analysis Leader Experience working with and enhancing security monitoring tooling Extensive IT/OT Systems Experience Extensive CNI & OT Environment Awareness Experience aligning with organisational requirements and contributing to audit readiness Tickets/Qualifications/Accreditations required More ❯
We have opportunities for L1 SOC Analysts to be a part of our success and work with multiple, high profile clients. You should showcase your proficiency in a busy SecurityOperations Center with a technology-oriented attitude and the capacity to assume control. From a technical perspective we are using Microsoft Sentinel, Splunk and MISP Threat sharing so … days off. You do need to be eligible for DV Clearance for this role, and cannot start until your clearance is through. What you'll be doing: Monitor, analyse security alerts and events, conduct initial investigations, and determine the appropriate response. Raise complex incidents to Senior Analysts. Manage SOC Incident queues. Support the maintenance of monitored asset baselines of … informed defense. Participate in a team effort to guarantee that corporate data and technology platform components are shielded from known threats. Collaborate with team members to maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Aid the development and use of threat intelligence throughout the service. Ability to work shifts from our office More ❯
a SOC Shift Lead to guide a team of talented analysts in protecting critical infrastructure across multiple UK locations.This is a hands-on leadership role where you’ll oversee security monitoring, incident response, and continuous improvement of SOC operations. You’ll work with cutting-edge technologies and frameworks, including Microsoft Sentinel, Splunk, and the MITRE ATT&CK framework, while … mentoring and developing your team. Key Responsibilities: Lead and manage a team of SOC Analysts across shift operations. Monitor, triage, and investigate security incidents on critical infrastructure. Perform in-depth analysis of network traffic, logs, and system events. Enhance SOC capabilities through detection rule tuning and threat-informed defence. Maintain incident documentation and represent the SOC in partner meetings. … Work a rotating shift pattern: 2 days (6am–6pm), 2 nights (6pm–6am), followed by 4 days off. What We’re Looking For: Proven experience in a SecurityOperationsCentre environment. Strong people management and mentoring skills. Hands-on experience with Microsoft Sentinel and Splunk. Familiarity with the MITRE ATT&CK framework. Solid understanding of networking principles More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid/Remote Options
SUMMER-BROWNING ASSOCIATES LIMITED
SOC ANALYST | CYBER SECURITY ANALYST Summer-Browning Associates is supporting our client in the Central Government who is seeking a SOC/Cyber Security Analyst for an initial 6-month assignment, with the possibility of extension. Location: Milton Keynes |London | Hybrid The ideal candidates will hold active SC or DV clearance and have a proven background in Cyber … Security Operation Centres working within a high-threat government environment: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Sentinel, Splunk, Defender, Qualys, Tenable, Huntsman & LogRhyth Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for … efficient remediation. Experience in network security principles, firewalls, and access control mechanisms Knowledge of navigating secure environments in the public sector/defence sector effectively. To apply, please submit your latest CV for review. More ❯
its technical capability, with ambitious growth plans and multiple acquisitions planned every year for the next 5 years (8 in the past 12 months). Reporting into the IT Operations Manager, you will oversee core infrastructure and networking. You'll work closely with managed service providers to ensure seamless operations and business continuity whilst taking a lead on … the Service Desk Team * Set up and configure Local Area Networks (LANs), including hardware deployment and support * Coordinate with third-party MSPs for network and infrastructure management * Manage firewall operations and connectivity with ISPs * Oversee network IP addressing and VPN setups * Support business continuity through proactive incident management * Rapid deployment of site connectivity solutions, including 4G routers * Monitor network … health and performance, ensuring high availability and resilience * Maintain inventory and configuration records for infrastructure and software * Collaborate with the SecurityOperations Center (SOC) on network security * Support software licensing and upgrades * Support data privacy and security audits * Provide technical support and mentoring * Maintain server rooms and ensure operational efficiency * Develop and implement business processes and More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid/Remote Options
SUMMER-BROWNING ASSOCIATES LIMITED
SOC ANALYST CYBER SECURITY ANALYST Summer-Browning Associates is supporting our client in the Central Government who is seeking a SOC/Cyber Security Analyst for an initial 6-month assignment, with the possibility of extension. Location: Milton Keynes London Hybrid The ideal candidates will hold active SC or DV clearance and have a proven background in Cyber … Security Operation Centres working w click apply for full job details More ❯