Job summary As a Security Officer, you will rotate around the CSOC into 4 main areas: Protective Monitoring, Incident Management, ThreatIntelligence and Threat Hunting. As part of Protective Monitoring, you will join the analyst pool team responsible for triaging cyber alerts ranging from identity & access alerts, networking alerts and XDR. Within Threat Hunting, you … will conduct daily hunting investigations using prewritten queries across a range of multi-tenant hunting platforms, including but not limited to M365D XDR, Microsoft Sentinel and Splunk. The ThreatIntelligence team perform the collection, aggregation, analysis and contextualisation of healthcare and security information to produce actionable cyberthreat intelligence. The Incident Management team provide end-to … end management of cyber security incidents as well as making security control recommendation and are also involved with fielding several cyber security related queries from the public and NHS staff. The post of Security Officer has been awarded a Recruitment and Retention Premia (RRP) in response to current labour market conditions. In recognition of this, the role attracts More ❯
Tasking Coordinator - CyberThreatIntelligence Contract | Inside IR35 | London We're seeking a proactive Tasking Coordinator to support a government client in coordinating responses to cyber threats across departments. This isn't a traditional SOC role - it's about enabling defenders to act as one and sharing intelligence that drives action. Key Responsibilities: Triage and … escalate reports as part of the Watch Officer rota. Support incident response during high-alert periods. Monitor and assess emerging cyber threats. Share actionable threatintelligence via reports and briefings. Manage tooling (eg malware sandboxes, TIPs) and collaborate across teams. Represent the organisation in wider cyberintelligence communities. What You'll Bring: Cyber security … experience, ideally in a SOC or threatintelligence setting. Strong IT foundations and stakeholder engagement skills. Clear, concise communication - written and verbal. Familiarity with adversary TTPs and threatintelligence platforms. If you're a hands-on operator who thrives in fast-paced environments and enjoys working across teams, apply now to make an impact. Carbon60, Lorien More ❯
Tasking Coordinator - CyberThreatIntelligence Contract | Inside IR35 | London We're seeking a proactive Tasking Coordinator to support a government client in coordinating responses to cyber threats across departments. This isn't a traditional SOC role - it's about enabling defenders to act as one and sharing intelligence that drives action. Key Responsibilities: Triage and … escalate reports as part of the Watch Officer rota. Support incident response during high-alert periods. Monitor and assess emerging cyber threats. Share actionable threatintelligence via reports and briefings. Manage tooling (e.g. malware sandboxes, TIPs) and collaborate across teams. Represent the organisation in wider cyberintelligence communities. What You'll Bring: Cyber security … experience, ideally in a SOC or threatintelligence setting. Strong IT foundations and stakeholder engagement skills. Clear, concise communication - written and verbal. Familiarity with adversary TTPs and threatintelligence platforms. If you're a hands-on operator who thrives in fast-paced environments and enjoys working across teams, apply now to make an impact. Carbon60, Lorien More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
Cyber Security Analyst £600 - £730/Day Inside IR35 UK Remote 83 Working days, adhoc We are seeking a Cyber Security Analyst for our Government client The Home Office on a fully remote basis. This role is 86 working days from start date to Feb 2026, adhoc days as and when needed, paying between £600 - £730/Day … Inside IR35. C learance: DV Role Profile: Have experience with dealing with real world threats in the serious and organised crime or cyberthreat incidents Have experience in analysing malware behaviour and an ability to identify associated infrastructure Have an excellent understanding of how cyberthreat attackers build and use infrastructure to undertake malicious activity CompTIA … Cybersecurity Analyst (CySA+) or a similar certification GIAC CyberThreatIntelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification*HM will accept 2 of the above qualifications* Data analysis and visualisation Understanding of Cybersecurity Concepts and ThreatMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
Cyber Security Analyst (Inside IR35) Are you an SC cleared Cyber Security Analyst looking for a new role? We are partnered with a government client looking for a Cyber Security Analyst with a mix of good technical skillsets and good stakeholder management This role would be based on a hybrid working basis in Central London Experience Experience … of working in Cyber Security, ideally within SOC Excellent stakeholder management skills Experience with threatintelligence platforms Active SC clearance would be required If you are an SC cleared Cyber Security Analyst looking for a new role, please apply now! Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation More ❯
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
and optimize Security Information and Event Management (SIEM) tools like Splunk. Firewall & Proxy Audits: Review configurations and coordinate changes with infrastructure teams. Incident Response: Act as part of the Cyber Security Incident Response Team (CSIRT) to address threats. Compliance: Ensure alignment with ISO 27001, and other security standards. Risk Management: Maintain risk frameworks and produce assurance documentation. Secure by … Design: Partner with project teams to integrate security requirements early in development. ThreatIntelligence: Research emerging threats and mitigation strategies. Testing & Audits: Oversee penetration tests and security audits. Policy Development: Keep security policies and staff training programs up to date. Requirements Essential: Degree in Computing or related field. Proven experience in cybersecurity, SIEM tools (e.g., Splunk), and ISO More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Crone Corkill
fixed term contract, with a view to go perm thereafter. Please note that all hires the business makes year will be initial FTCs.Working as part of a well skilled Cyber Security team, you’ll be key in a variety of upcoming projects and tasks, including the implementation and full ownership of Splunk Enterprise Security, coverage of L3 & L4 incidents … an ad-hoc basis until the move has been completed Maintain Nessus vulnerability management, update systems, run scans and provide reports Cover email security using Mimecast Enterprise Real world threat modelling and incident response (mainly L3/L4 when required) Make suggestions and influence various areas of the business/group from a security perspective Automate tasks and processes … ideal) Microsoft Defender for EDR/XDR/MDR Nessus for vulnerability management Mimecast for email security SCCM/Intune for patch management L3/L4 Incident Response experience ThreatIntelligence/modelling experience Automating tasks using PowerShell, Python etc What’s in it for you? In return you’ll be joining a well established organisation at an More ❯
Welwyn Garden City, Hertfordshire, United Kingdom Hybrid / WFH Options
Pontoon
latest security trends and techniques to continually refine our strategies. What We're Looking For: To thrive in this role, you should possess the following technical skills and experience: Cyber Security Tools : Hands-on experience with SOAR platforms and ThreatIntelligence Platforms. Programming Expertise : Proficiency in Python script with a solid experience of REST APIs to develop … and interact with them effectively. Framework Knowledge : Familiarity with the MITRE ATT&CK framework or equivalent, including knowledge of emerging threat actor tactics, techniques, and procedures. Operating Systems : Experience and working knowledge of both Linux and Windows platforms. Public Cloud Experience: Familiarity with working in public cloud environments is a plus! Adecco is a disability-confident employer. It is More ❯