Senior IT Security Officer 6 Month Contract - ASAP start Birmingham - 3 days on site Inside IR35 £500 - £550 This is an excellent opportunity for an experienced and proactive IT Security professional to play a critical role in the management and continuous improvement of the SecurityOperations function through safeguarding the information and technology systems. This company … network and are considered as a huge part within the UK's expansion plans. As the company continues to grow, they are looking to bring on a Senior IT Security Officer to keep up with the high demand. In this varied role you will be accountable for a broad range of SecurityOperations activities, including proactive monitoring … incident response, threat and vulnerability management, managing the external SecurityOperationsCentre (SOC) partnership and developing security capabilities. You will also play a key part in providing expert technical advice for risk assessments and compliance initiatives. The ideal candidate will possess strong experience in managing and delivering securityoperations, including planning vulnerability assessments and More ❯
Employment Type: Contract
Rate: £500 - £550 per day + Inside IR35 + ASAP Start
London, South East, England, United Kingdom Hybrid/Remote Options
VIQU IT Recruitment
Security Analyst – 5-week Contract – Fully Remote My Customer is seeking a proactive and technically skilled Security Analyst to join their growing cybersecurity function. This role acts as the critical bridge between the SOC (SecurityOperationsCentre) team and the wider management group — ensuring that security incidents are not only investigated and remediated effectively … but also translated into actionable insights and long-term improvements across the business. Skills required from the Security Analyst: Proven experience in a Security Analyst , Incident Response , or SOC environment (2nd line or similar). Strong hands-on experience in threat investigation, log analysis, and remediation . Good understanding of common security frameworks and practices (e.g., MITRE … ATT&CK, NIST, ISO 27001). Familiarity with a range of security tools and platforms – experience with Microsoft Sentinel is desirable but not essential. Excellent communication skills – able to liaise confidently between technical and non-technical teams. A consultative mindset with the ability to translate technical findings into meaningful business recommendations. Key Responsibilities from the Security Analyst: Act More ❯
on a temporary basis until a permanent position can be filled. Scope and Objectives To Work alongside an existing team of Cyber Engineer and Cyber Analysts within an established SecurityOperationsCentre to provide level 1 triage analysis duties which include: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyber threats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data/Security Alerts to support Customers in responding to Security … of the team to ensure best practice and that their knowledge is up to date. In association with other colleagues provide an on-Call service to investigate and remedy security and technical issues in relation to the SOC service on a 24/7 basis . Skills and Experience Working knowledge of Various Operating systems including Windows and Linux. More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Solos Consultants Ltd
on a temporary basis until a permanent position can be filled. Scope and Objectives To Work alongside an existing team of Cyber Engineer and Cyber Analysts within an established SecurityOperationsCentre to provide level 1 triage analysis duties which include: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyber threats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data/Security Alerts to support Customers in responding to Security … of the team to ensure best practice and that their knowledge is up to date. In association with other colleagues provide an on-Call service to investigate and remedy security and technical issues in relation to the SOC service on a 24/7 basis . Skills and Experience Working knowledge of Various Operating systems including Windows and Linux. More ❯
Job Title: Cyber Security Analyst (Contract) Contract Rate: Negotiable (Inside IR35) Shift Pattern (Day/Night) Location: Andover, Hampshire Security Clearance: ** Current valid SC clearance required ** Eligibility: ** UK eyes only ** About the Role: This is a brilliant opportunity to join our growing team at CND. We are looking for an experienced Security Analyst. This role offers a … great shift pattern, ensuring you regularly have 5 days off and at least 2 weekends off per month. Key Responsibilities: Deliver excellent and thorough security analysis, taking SIEM output and actioning it accordingly. Push for improvements across the overall monitoring capability. Engage with a wide range of stakeholders, with varying levels of technical understanding. Be flexible on location; some … of our clients will need provision on site, balanced to ensure your wellbeing. Suggest ideas for improving CND’s own internal security posture. Be proactive with client requirements, offering guidance and input to highly technical challenges. Essential Skills: Experience working with SIEM tools such as ArcSight, Splunk, LogRhythm, or AlienVault. Understanding of how to get the best from available More ❯
Analyst (Operational Technology) Outside IR35 Duration: 6 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and/or escalated events and alerts then, using experience combined … forensic analysis across multiple data sources and recommend containment and eradication actions. Crisis Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous … Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause Analysis Leader Experience working with and enhancing security monitoring tooling Extensive IT/OT Systems Experience Extensive CNI & OT Environment Awareness Experience aligning with organisational requirements and contributing to audit readiness Tickets/Qualifications/Accreditations required More ❯
Analyst (Operational Technology) Outside IR35 Duration: 6 – 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and/or escalated events and alerts then, using experience combined … forensic analysis across multiple data sources and recommend containment and eradication actions. Crisis Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous … Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause Analysis Leader Experience working with and enhancing security monitoring tooling Extensive IT/OT Systems Experience Extensive CNI & OT Environment Awareness Experience aligning with organisational requirements and contributing to audit readiness Tickets/Qualifications/Accreditations required More ❯