Contract Role - SOC Manager/Cyber SecurityOperations Manager - Leeds/Remote - 12 Months Initial - Inside IR35 We are seeking an exceptional SOC Manager/Cyber SecurityOperations Manager to lead our Cyber SecurityOperationsCentre; responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and … response, ensuring vulnerability scanning and remediation efforts across the organization. Role Overview: Job Title: SOC Manager/Cyber SecurityOperations Manager Location: Leeds/England/Remote Contract Type: Contract Duration: 12 months initially Sector: Healthcare . Qualifications: Bachelor’s degree in Cybersecurity, Information Technology, or a related field (Master’s preferred). Minimum 5 years of experience … in cybersecurity operations, with at least 2 years in a leadership or management role. Strong knowledge of SOC operations, incident response, and vulnerability management best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM, CEH, GIAC, or GCIA are highly More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Salt Search
Security Analyst - NHS Band 6 Location : Fully Remote Contract : 6 Months (with potential extension) Rate : £200 per day (Inside IR35) Full-Time An excellent opportunity has become available for an experienced Security Analyst to join a national healthcare programme supporting a wide range of cyber assurance and operational security activities. This fully remote role will see you … working across major digital initiatives and contributing to the resilience of national systems and infrastructure. Key Responsibilities: Provide cyber security support and assurance across multiple digital programmes. Embed appropriate security controls during the full lifecycle of digital projects. Actively support the Cyber SecurityOperationsCentre (CSOC) with threat monitoring, incident response, and proactive threat hunting. … Monitor infrastructure security alerts, analyse incidents, and recommend remediation actions. Maintain and improve threat detection tools including SIEM systems. Support the creation of security documentation and standard operating procedures. Contribute to security awareness and user education activities. Experience & Skills Required: Hands-on experience working in a cyber security function within a large or complex organisation. Strong More ❯
SC Cleared*** Required OUTSIDE I35 We are seeking a skilled and proactive SOC Engineer with strong expertise in Microsoft Sentinel and LogRhythm to join our SecurityOperations Center team. The ideal candidate will be responsible for monitoring, analyzing, and responding to security incidents, optimizing SIEM configurations, and contributing to threat detection and response strategies. This role requires … hands-on experience with both platforms and a deep understanding of cybersecurity principles and incident management. Key Responsibilities: Monitor and investigate security alerts from Microsoft Sentinel and LogRhythm . Analyze logs, network traffic, and other data sources to detect threats and suspicious activities. Develop and tune detection rules, analytics, and alerting logic in both SIEM platforms. Collaborate with incident … response teams to contain and remediate security incidents. Create dashboards, workbooks, and reports for stakeholders. Perform threat hunting activities and support continuous improvement of SOC processes. Maintain and enhance use cases, playbooks, and automation (e.g., with Logic Apps or SOAR). Ensure SIEM solutions are properly integrated with data sources (e.g., firewalls, endpoints, cloud services). Support compliance and More ❯