Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
SOCAnalyst Location: Reading (Hybrid - 3 days onsite per week) Contract Type: Contract (Inside IR35) Duration: 6 Months Day Rate: £382.50 per day Inside IR35 The Role We are seeking an experienced SOC Level 2 Analyst to join our SecurityOperations Center, supporting threat detection, investigation, and response across enterprise systems. You'll work … processes, and maintain accurate incident documentation. Collaborate with IT and security teams to strengthen overall detection and response capability. Essential Skills & Experience 6-8 years in cybersecurity, with strong SOC or incident response experience. Proficient in SIEM (Splunk, ArcSight) and EDR (Defender, CrowdStrike, Carbon Black). Strong knowledge of digital forensics, malware analysis, and threat hunting. Skilled across Windows … Linux, and cloud environments. Familiar with frameworks such as MITRE ATT&CK, NIST, and ISO 27001. Scripting experience (Python, PowerShell) beneficial. Preferred Certifications SOC-related (CySA+, Blue Team L1, GCIH, GCIA, GCFA). CISSP or equivalent desirable. Additional Information Fast-paced environment; occasional out-of-hours work may be required. More ❯
rich heritage of technological excellence and a strong focus on digital transformation, they empower organisations worldwide to solve complex challenges and achieve sustainable growth. Your new role As a SOCAnalyst, you will be responsible for providing Protective Monitoring Services across a range of Secure Customers. You will be responsible for the day-to-day monitoring using … following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. The role acts as part of a 24/7 shift team and shift work will be required. This role is based in Hursley and … to succeed Must be prepared to work on shift as part of a 24/7 shift team based onsite - 4 days on - 4 days off.Microsoft Certified: SecurityOperationsAnalyst Associate Certification (SC200) is a mandatory requirement for role fulfilmentExperience working with SIEM technologies and security toolingAn understanding of IT Infrastructure and NetworkingAn understanding of vulnerability and threat More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯