SOC Analysts to join their Security Operations Centre. This is an excellent opportunity for an experienced SOC professional to step into a senior role, leading on complex investigations and incidentresponse within a high-profile environment. The Role - The Senior SOC Analyst will act as the technical expert within the SOC, responsible for handling escalations from Tier … and Tier 2 analysts and managing the most complex security incidents. You will lead deep-dive investigations, improve detection and response processes, and play a key role in stakeholder engagement. Key responsibilities include: Analysing advanced security incidents, determining root cause and attack paths. Leading incidentresponse activities across SIEM, EDR/XDR, networks, and cloud platforms. Producing … clear, business-focused incident reports and updates for senior stakeholders. Advising on SOC tooling and ensuring effective integration of incidentresponse requirements. Supporting security exercises, crisis response, and compliance alignment with industry frameworks. Candidate Profile - The successful candidate will bring: Significant experience in SOC operations and cyber incident response. Strong knowledge of adversary TTPs and More ❯
London, Old Bailey, United Kingdom Hybrid / WFH Options
Morson Talent
SOC Analysts to join their Security Operations Centre. This is an excellent opportunity for an experienced SOC professional to step into a senior role, leading on complex investigations and incidentresponse within a high-profile environment. The Role - The Senior SOC Analyst will act as the technical expert within the SOC, responsible for handling escalations from Tier … and Tier 2 analysts and managing the most complex security incidents. You will lead deep-dive investigations, improve detection and response processes, and play a key role in stakeholder engagement. Key responsibilities include: Analysing advanced security incidents, determining root cause and attack paths. Leading incidentresponse activities across SIEM, EDR/XDR, networks, and cloud platforms. Producing … clear, business-focused incident reports and updates for senior stakeholders. Advising on SOC tooling and ensuring effective integration of incidentresponse requirements. Supporting security exercises, crisis response, and compliance alignment with industry frameworks. Candidate Profile - The successful candidate will bring: Significant experience in SOC operations and cyber incident response. Strong knowledge of adversary TTPs and More ❯
Threat Modeling & Risk Assessment: Strong knowledge of security risk management. Cloud & Container Security: Expertise in AWS, Azure, GCP, Docker, and Kubernetes. Security Governance: Experience developing and enforcing security standards. IncidentResponse Leadership: Skilled in leading incidentresponse and root cause analysis. Training & Mentorship: Ability to upskill teams on DevSecOps best practices. Please apply with your updated More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
Threat Modeling & Risk Assessment: Strong knowledge of security risk management. Cloud & Container Security: Expertise in AWS, Azure, GCP, Docker, and Kubernetes. Security Governance: Experience developing and enforcing security standards. IncidentResponse Leadership: Skilled in leading incidentresponse and root cause analysis. Training & Mentorship: Ability to upskill teams on DevSecOps best practices. Please apply with your updated More ❯
Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, IncidentResponse, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management and continuous More ❯
e.g., ISO 27001, NIST), and risk mitigation. Conduct assessments and audits of existing network and cloud security postures. Deliver workshops and training sessions on M365 and Azure security capabilities. IncidentResponse & Monitoring: Collaborate with SOC teams to monitor and respond to network-based threats. Utilize Microsoft Sentinel and Defender for Cloud to detect and remediate vulnerabilities. Develop playbooks More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
e.g., ISO 27001, NIST), and risk mitigation. Conduct assessments and audits of existing network and cloud security postures. Deliver workshops and training sessions on M365 and Azure security capabilities. IncidentResponse & Monitoring: Collaborate with SOC teams to monitor and respond to network-based threats. Utilize Microsoft Sentinel and Defender for Cloud to detect and remediate vulnerabilities. Develop playbooks More ❯
Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incidentresponse, and forensic analysis. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation. Experience in network security More ❯
organization's risk exposure. Develops detailed reports with findings, impact analysis, and actionable remediation re commendations. Simulates real-world attacks to test the effectiveness of existing security controls and incident response. Keeps up to date with the latest vulnerabilities, exploit techniques and penetration testing tools in general and more specific to an airline industry, transportation sector. Your responsibilities: Performing More ❯
actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerability management, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications (CISSP, CISM, CISA, CRISC) desirable. This More ❯
actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerability management, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications (CISSP, CISM, CISA, CRISC) desirable. This More ❯
compliance with and company adherence to relevant regulations and control frameworks e.g. NCSC CAF, ONR SyAPs, ISO27001. Proven knowledge of adversary TTPs and frameworks like MITRE ATT&CK. Strong incidentresponse, investigation, analysis, logging and reporting skills. Excellent communication and stakeholder management skills with the ability to translate complex technical threats and attack paths to non-technical audiences. … Nice to have: GIAC Certified Incident Handler (GCIH) Certification or similar. Immediate availability. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk More ❯
into actionable engineering guidelines and reusable controls. Ensure AI systems avoid prohibited practices and meet obligations around: Transparency and user awareness Data minimisation and lawful processing Continuous monitoring and incidentresponse Cross-Functional Collaboration & Governance Partner with legal, compliance, and architecture teams to align AI development with enterprise risk and governance frameworks. Contribute to internal working groups on More ❯
into actionable engineering guidelines and reusable controls. Ensure AI systems avoid prohibited practices and meet obligations around: Transparency and user awareness Data minimisation and lawful processing Continuous monitoring and incidentresponse Cross-Functional Collaboration & Governance Partner with legal, compliance, and architecture teams to align AI development with enterprise risk and governance frameworks. Contribute to internal working groups on More ❯
and manage SIEM solutions using Splunk, including data onboarding, creating correlation rules, and developing dashboards and reports to improve security visibility. Develop and maintain detection use cases, alerts, and response playbooks based on threat intelligence and compliance requirements. Monitor, tune, and optimise Splunk performance to ensure availability, scalability, and accuracy of security event logging and analysis. Work closely with … SOC analysts, incidentresponse, and threat hunting teams to enhance threat detection, investigation capabilities, and response effectiveness. More ❯
of Scrum SW delivery team. Responsibilities: * Maintain in house private build environment for build and deploy SW for the Business Function, delivering self service capability. Automate deployment, monitoring, and incidentresponse processes using GCP-native tools and technologies. * Develop capabilities which allow Platform Engineering teams to operate with a DevOps ethos. * Collaborate with development teams to optimize application More ❯
of Scrum SW delivery team. Responsibilities: * Maintain in house private build environment for build and deploy SW for the Business Function, delivering self service capability. Automate deployment, monitoring, and incidentresponse processes using GCP-native tools and technologies.* Develop capabilities which allow Platform Engineering teams to operate with a DevOps ethos.* Collaborate with development teams to optimize application More ❯
environments (Mellanox and Meraki). Collaborate with systems/platform teams for scalable deployments. Ensure network security, redundancy, and compliance. Document network topology, standards, and troubleshooting procedures. Support migrations, incidentresponse, and performance tuning. Candidate Profile Essential Skills & Experience: Proven experience in data centre networking. Hands-on with MPLS, VPLS, and cross-connects. Strong routing protocol knowledge (OSPF More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
environments (Mellanox and Meraki). Collaborate with systems/platform teams for scalable deployments. Ensure network security, redundancy, and compliance. Document network topology, standards, and troubleshooting procedures. Support migrations, incidentresponse, and performance tuning. Candidate Profile Essential Skills & Experience: Proven experience in data centre networking. Hands-on with MPLS, VPLS, and cross-connects. Strong routing protocol knowledge (OSPF More ❯
it's about enabling defenders to act as one and sharing intelligence that drives action. Key Responsibilities: Triage and escalate reports as part of the Watch Officer rota. Support incidentresponse during high-alert periods. Monitor and assess emerging cyber threats. Share actionable threat intelligence via reports and briefings. Manage tooling (e.g. malware sandboxes, TIPs) and collaborate across More ❯
guidance to IT team and staff Carry out regular access log review and organise improvements Organise and provide security training to staff Document the security process Support the security incidentresponse Communicate regularly with customer line manager to update on task progress Hold monthly 1:1 meetings with line manager and bi-weekly meetings with service management team … IT Security Coordinator Ideal Candidate: 2 - 3 years of experience in the coordination Experience in IT security administration such as documentation, audit and incident evidence collections, and Windows and Anti-Virus log review General IT system knowledge in Windows AD Experience with MS365 as a user Task management and tracking issues Business level fluency in English Flexible working ethic More ❯