City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
through implementation and ongoing support, our commitment is to provide clients with the assurance that they are valued by a company that is both attentive and impactful. Role Title: Threat Intelligence Analyst Reporting Line Manager: Head of Threat Intelligence Onsite Requirements (e.g. number of days per week onsite): 5 days Hybrid/Remote Working Policy: onsite Main Location … months Extension likelihood: Yes Maximum Daily Rate or Budget Range: 500 IR35 Status (inside/Outside/To Be Determined) Inside Experience Requirements Technology & Vendor Skillsets Required: Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools. Experience using Breach and Attack Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of adversary … tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years of experience in threat intelligence, cybersecurity operations, or penetration testing. Proven ability More ❯
onsite working DV Clearance required Restrictions Apply Our government client is seeking an experienced level 1 SOC Practitioner Analyst to work in an existing team consisting of Cyber SOC Engineers and Cyber SOC Analysts on a temporary basis until a permanent position can be filled. Scope and Objectives To Work alongside an existing team of Cyber Engineer and Cyber Analysts within an established Security Operations Centre to provide level 1 triage analysis duties which include: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate … suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyberthreats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data/Security Alerts to support Customers in responding to Security Incidents. Ensure Protective More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Solos Consultants Ltd
onsite working DV Clearance required Restrictions Apply Our government client is seeking an experienced level 1 SOC Practitioner Analyst to work in an existing team consisting of Cyber SOC Engineers and Cyber SOC Analysts on a temporary basis until a permanent position can be filled. Scope and Objectives To Work alongside an existing team of Cyber Engineer and Cyber Analysts within an established Security Operations Centre to provide level 1 triage analysis duties which include: Monitor, triage and investigate Security Alerts on the various monitoring tools to identify potential Security Incidents. Escalate … suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyberthreats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data/Security Alerts to support Customers in responding to Security Incidents. Ensure Protective More ❯
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or … Threat Detection Analyst background. Hourly Rate: £45ph - £85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online … days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting More ❯
Employment Type: Contract
Rate: £45 - £85/hour Overtime Rate of time and a quarter
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit a SOC Threat Detection Analyst subcontractor on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or … Threat Detection Analyst background. Hourly Rate: £66.00 per hour. (Umbrella/Inside IR35). Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day CycleSat to Tue - Earlies 0400-1200Wed to Sun - OffMon to Fri - Lates 1200-2000Sat to Tue OffWed to Sun - Nights 2000-0400(The … day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates)31.5 hours per weekInitially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting More ❯
Stevenage, Hertfordshire, South East, United Kingdom
Certain Advantage
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit a SOC Threat Detection Analyst subcontractor on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or … Threat Detection Analyst background. Hourly Rate: £66.00 per hour. (Umbrella/Inside IR35). Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies 0400-1200 Wed to Sun - Off Mon to Fri - Lates 1200-2000 Sat to Tue Off Wed to Sun - Nights … cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates) 31.5 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting More ❯
Employment Type: Contract
Rate: £66 per hour, Benefits Overtime Rate of 'time and a quarter'
seniority. Stakeholders – Build and maintain collaborative working relationships with internal technology teams, external partners, suppliers, and providers to drive outcomes and agree on courses of action. Principal Responsibilities Advanced Threat Hunting: Analyse and assess multiple threat intelligence sources and indicators of compromise (IOC) to identify patterns, vulnerabilities, and anomalies, then use this intelligence and tooling to uncover and … is upholding IT, OT, and organisational resilience against cyberthreats and incidents. Qualifications Considerable experience in a SOC Level 2 or 3 role with expertise in advanced threat hunting and incident response across IT and OT environments. SOC-specific training, qualifications, or a degree in Computer Science, Cybersecurity, IT, or a related subject. Ideally hold recognised security … such as targeted ransomware or state-sponsored attacks. Summary: My client are looking for an experienced Incident Response (CSIRT)/SOC Level 3 Analyst with deep expertise in advanced threat hunting, incident response, and cyber defence operations, capable of leading on high-severity incidents and mentoring junior analysts while strengthening resilience across IT and OT environments. More ❯
Stevenage, Hertfordshire, South East, United Kingdom
Guidant Global
Our client, the UK's trusted Ministry of Defence partner, is seeking an experienced SOC Threat Detection Analyst to join the cyber security operations centre (SOC) within Information Management (IM). The successful candidate will support Senior SOC analysts in addressing the challenges of countering cyberthreats, driving a proactive ethos in a dynamic environment … and providing robust threat detection and analysis within the 24x7 SOC. Key Responsibilities: To support the SOC Manager in assisting Information Management UK in meeting the challenges and demands of countering cyberthreats, the role involves supporting the operational functions of the UK SOC. This includes working with other UK SOC members, the UK InfoSec Team, and … alerting, and investigation activities using a variety of security platforms, including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture, Anti-Malicious Code, and Threat Detection technologies across the UK Network Perimeter. The SOC Analyst reports to the SOC Manager and conducts a range of analyses, assisting the incident response team with investigations that More ❯
development of the location's IT/OT network infrastructure and requires a strong industrial cybersecurity focus, ensuring alignment with corporate security standards and safeguarding production systems from cyber threats. As part of a small, agile team, the technician will engage in a balanced mix of independent and collaborative work to deliver high-quality digital services and secure More ❯
Worcester, Worcestershire, Warndon, United Kingdom
Rullion Managed Services
development of the location's IT/OT network infrastructure and requires a strong industrial cybersecurity focus, ensuring alignment with corporate security standards and safeguarding production systems from cyber threats. As part of a small, agile team, the technician will engage in a balanced mix of independent and collaborative work to deliver high-quality digital services and secure More ❯
suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyberthreats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data/Security Alerts to support Customers in responding to Security Incidents. Ensure Protective … Linux. Experience of working with SIEM and IPS products within a SOC Environment. Good Analytical skills with the ability to manipulate, interrogate and analyse large data sets. Relevant cyber security analyst experience within a SOC environment. Knowledge of IT Networking, specifically in Firewalls and other Network security devices Strong interpersonal skills ability to assist other team members Excellent More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Rise Technical Recruitment Limited
suspected Security Incidents to the Lead Analysts. Assist Lead Analysts and Incident Response team with investigation and containment. Maintain knowledge of technology and cyberthreats by reading Threat Intel, reports, attending Threat Intel briefings and self-study. Perform analysis of Security Event Data/Security Alerts to support Customers in responding to Security Incidents. Ensure Protective … Linux. Experience of working with SIEM and IPS products within a SOC Environment. Good Analytical skills with the ability to manipulate, interrogate and analyse large data sets. Relevant cyber security analyst experience within a SOC environment. Knowledge of IT Networking, specifically in Firewalls and other Network security devices Strong interpersonal skills ability to assist other team members Excellent More ❯
recovery strategy to minimise business impact and ensure UK Power Networks (UKPN) network systems and customer data are protected from cyber threats. Overview of role and responsibilities: Threat Hunting: Analyse intel and IOCs to find and remove hidden threats across UKPN's OT/IT environments. Policy: Create SOC policies, standards and procedures aligned with best practice. … Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous Improvement: Automate and enhance monitoring, detection and response based on evolving threats. … required: Essential Extensive End to End Cyber Incident Leadership Experience Extensive SOC L3/CSIRT L3 Experience Extensive CNI/Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause Analysis Leader Experience working with and enhancing security monitoring tooling Extensive IT/OT More ❯
recovery strategy to minimise business impact and ensure UK Power Networks (UKPN) network systems and customer data are protected from cyber threats. Overview of role and responsibilities: Threat Hunting: Analyse intel and IOCs to find and remove hidden threats across UKPN's OT/IT environments. Policy: Create SOC policies, standards and procedures aligned with best practice. … Testing: Take part in cyber-attack simulations to strengthen resilience. Reporting: Improve reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance. Continuous Improvement: Automate and enhance monitoring, detection and response based on evolving threats. … required: Essential Extensive End to End Cyber Incident Leadership Experience Extensive SOC L3/CSIRT L3 Experience Extensive CNI/Defence/Business Critical Environment Experience Desirable Threat Hunting Experience Threat Hunting Strategy Mindset Runbook & Playbook Authoring Lessons Learned/Root Cause Analysis Leader Experience working with and enhancing security monitoring tooling Extensive IT/OT More ❯
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom Hybrid/Remote Options
Hays Technology
What You'll Do * Monitor and maintain the network performance, resolving issues proactively. * Lead and mentor a team of network professionals. * Implement robust security measures to protect against cyber threats. * Plan and deliver network upgrades, expansions, and migrations. * Collaborate with vendors and manage SLAs. * Analyse performance data and provide actionable insights. * Oversee budgeting, resource planning, and compliance The More ❯
Kingston Upon Hull, East Riding of Yorkshire, United Kingdom Hybrid/Remote Options
Hays Technology
What You'll Do * Monitor and maintain the network performance, resolving issues proactively. * Lead and mentor a team of network professionals. * Implement robust security measures to protect against cyber threats. * Plan and deliver network upgrades, expansions, and migrations. * Collaborate with vendors and manage SLAs. * Analyse performance data and provide actionable insights. * Oversee budgeting, resource planning, and compliance The More ❯
good understanding of technical language and solutions is necessary to manage a technical plan. Security Focus: The ultimate goal is to implement PAM strategies and tools to protect against cyberthreats by controlling privileged access to critical resources Candidates will ideally show evidence of the above in their CV in order to be considered.Please be advised if you haven't heard More ❯
The Role Working as part of a team safeguarding BAE Systems against cyberthreats by developing and enhancing the Technical Operations capability across People, Process, and Technology, ensuring an efficient approach to all Cyber Operations. Proactively protecting BAE Systems through continual automation and testing of security controls. Continuously working toward organisational, departmental, and individual objectives and … upholding security standards and principles. Providing assurance to the Head of Cyber Operations and Technical Operations Manager that the SOC is operating efficiently through the use of orchestration and automation. Role Responsibilities: Not limited to Identification of process that can be automated to make the SOC more effective. Responsible for the overall delivery of the Technical Operations function … by providing support to other members of the team to protect BAE Systems against cyber threats. Lead in the identification and the creation, maintenance and troubleshooting of SOAR playbooks, automations and enrichments. Apply critical thinking to solve unique problems in the information security space. Enhancing the processes around interacting with large datasets to construct actionable information to enhance More ❯
Our client, the UK's trusted Ministry of Defence partner, is seeking an experienced SOC Threat Detection Analyst to join the cyber security operations centre (SOC) within Information Management (IM). The successful candidate will support Senior SOC analysts in addressing the challenges of countering cyberthreats, driving a proactive ethos in a dynamic environment … and providing robust threat dete click apply for full job details More ❯
City of London, London, United Kingdom Hybrid/Remote Options
FBI &TMT
Key Responsibilities: Applying security skills to design, build and protect enterprise systems, applications, data, assets, and people Providing services to safeguard information, infrastructures, applications, and business processes against cyberthreats Managing SSPM or CSPM knowledge, policies, and configurations Configuring security settings for Salesforce, ServiceNow, M365, Snowflake, Workday SaaS applications Integrating SaaS 3rd party applications with on-prem tools … Strong understanding of industry security frameworks and benchmarks such as NIST and CIS Significant experience with Security Engineering Desirable Skills/Preferred Qualifications: Awareness of Enterprise Security and Cyber Security domains Experience with Atlassian stack (Confluence, JIRA, BitBucket) Hands-on skills with Unix or Windows Docker experience on both Windows and Unix platforms Excellent documentation skills If you More ❯
Ashton-on-Ribble, Preston, Lancashire, England, United Kingdom
Outsource
to make the SOC more effective. Responsible for the overall delivery of the Technical Operations function by providing support to other members of the team to protect against cyber threats. Lead in the identification and the creation, maintenance and troubleshooting of SOAR playbooks, automations and enrichments. Apply critical thinking to solve unique problems in the information security space. … is a leading global defence, aerospace, and security company. They’re experts in delivering advanced solutions for air, land, and naval forces, as well as commercial aerospace and cyber security. Known for its commitment to innovation and excellence, BAE Systems offers exciting career opportunities for those looking to make a significant impact in cutting-edge technology and defence More ❯