Contract Role - SOC Manager/Cyber SecurityOperations Manager - Leeds/Remote - 12 Months Initial - Inside IR35 We are seeking an exceptional SOC Manager/Cyber SecurityOperations Manager to lead our Cyber SecurityOperations Centre; responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response … ensuring vulnerability scanning and remediation efforts across the organization. Role Overview: Job Title: SOC Manager/Cyber SecurityOperations Manager Location: Leeds/England/Remote Contract Type: Contract Duration: 12 months initially Sector: Healthcare . Qualifications: Bachelor’s degree in Cybersecurity, Information Technology, or a related field (Master’s preferred). Minimum 5 years of experience in … cybersecurity operations, with at least 2 years in a leadership or management role. Strong knowledge of SOC operations, incident response, and vulnerability management best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM, CEH, GIAC, or GCIA are highly desirable. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
British Business Bank
to suit your lifestyle - from discounts on retail and dining, to health and wellbeing, travel, and technology...and plenty more The Role Join us as our Interim Director of Information Security and play a critical role in strengthening the Banks cyber resilience. Were looking for a dynamic and experienced security leader to join our IT Operations team as … Interim Director of Information Security. This is a high-impact, senior role, offering a unique opportunity to drive security strategy, lead a skilled team, and manage our external security partnerships during a 6-month secondment. Key Responsibilities: Lead, mentor, and develop a team of 7 Information Security professionals. Enhance the Banks security posture through governance, assurance … architecture, and operations. Manage the relationship and performance of our Managed Security Services Provider (MSSP). Oversee securityoperations including monitoring, threat detection, incident response, and threat hunting. Lead investigations, forensic analysis, and ensure lessons learned from incidents. Drive project delivery to mitigate key risks and ensure audit-readiness. Deliver effective risk assessments using the Banks Risk More ❯
Security Engineer | Hybrid | London | 6 – Months My client is looking for a Security Engineer to join their cybersecurity and SecOps division. The successful candidate with be maintaining and improving security infrastructure, while also maintaining BAU handling cybersecurity related tickets. The client doesn't use the traditional Microsoft suite and uses Google workspace for cloud-based productivity and … management of work. Key Responsibilities of the Security Engineer: Dealing with escalation of security related tickets and hands-on maintenance to solve the issues. Creating SIEM dashboards and detection rules using Splunk. Using CrowdStrike … to monitor and investigate security alerts. Management of identity, MDM, or directory services via Jump cloud. Conducting regular vulnerability scans and risk assessments using Qualys. Work within the SecOps team and collaboration with other IT teams to insure secure system configurations. Stay Informed on emerging threats, vulnerabilities and best practice within cyber security. Requirements and Experience of the SecurityMore ❯
SC Cleared*** Required OUTSIDE I35 We are seeking a skilled and proactive SOC Engineer with strong expertise in Microsoft Sentinel and LogRhythm to join our SecurityOperations Center team. The ideal candidate will be responsible for monitoring, analyzing, and responding to security incidents, optimizing SIEM configurations, and contributing to threat detection and response strategies. This role requires … hands-on experience with both platforms and a deep understanding of cybersecurity principles and incident management. Key Responsibilities: Monitor and investigate security alerts from Microsoft Sentinel and LogRhythm . Analyze logs, network traffic, and other data sources to detect threats and suspicious activities. Develop and tune detection rules, analytics, and alerting logic in both SIEM platforms. Collaborate with incident … response teams to contain and remediate security incidents. Create dashboards, workbooks, and reports for stakeholders. Perform threat hunting activities and support continuous improvement of SOC processes. Maintain and enhance use cases, playbooks, and automation (e.g., with Logic Apps or SOAR). Ensure SIEM solutions are properly integrated with data sources (e.g., firewalls, endpoints, cloud services). Support compliance and More ❯