Contract Incident Response Jobs in the UK

1 to 25 of 72 Contract Incident Response Jobs in the UK

SOC/CSIRT Level 3 Analysts

United Kingdom
Morson Talent
Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst 2-3 Days onsite - Crawley 6-9 Month duration Reporting line: The Analyst will report to the Cyber Security Response Manager and work within the Information Systems directorate, based in the Crawley office. Job purpose: The role of an Incident Response (CSIRT)/SOC … owners to ensure log sources are onboarded into the SIEM solution. Create use cases to correlate suspicious activities across endpoints, networks, applications, and both on-premises and cloud environments. Incident Response: Improve playbooks and processes, lead escalated security incidents, oversee remediation and recovery actions, track incidents, liaise with partners, report findings, and apply root cause analysis with lessons … types and enhance operational playbooks. Digital Forensics: Use forensic tools and techniques to analyse data sources such as logs, SIEM data, applications, and network traffic patterns, and recommend appropriate response actions to ensure threats are contained and eradicated. Cyber Crisis Testing: Participate in cyber-attack simulations and scenario exercises to test resilience and improve preparedness. Reporting: Develop and improve More ❯
Employment Type: Contract
Rate: £600 - 800 per day + None
Posted:

SOC Manager

West Midlands, United Kingdom
Hybrid / WFH Options
Infoplus Technologies UK Ltd
boards from below onwards The Role As SOC Manager: Establish goals and priorities by working closely with your team to identify the most critical focus areas. These include: Improving incident response times Reducing false positives and other extraneous alerts Enhancing threat detection capabilities Oversee your staff's activities and ensure they focus on the right priorities Oversee SOC … activities by reviewing your team's performance metrics, incident reports and other key indicators Lead incident response efforts when a security incident occurs, the SOC team has to respond as quickly as possible Lead these efforts by establishing clear incident response procedures and protocols and conveying them to the team Analyse incident reports … to understand your organization's security posture by reviewing incident reports, SOC managers identify patterns and trends that may indicate weaknesses or vulnerabilities in their security defences Serve as the point of contact (POC) for security incidents within the company. You are the primary liaison between the SOC team, other internal stakeholders, and external parties such as vendors, clients More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £550 per day
Posted:

Incident Response (CSIRT) / SOC Level 3 Analyst

Crawley, Sussex, United Kingdom
Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … s network systems, operational technology, and customer data from emerging and sophisticated cyber risks. Key Responsibilities As a senior member of the Security Operations team, you will: Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and … enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation across cloud and on-prem environments. Support and develop the organisation's SOAR platform, creating automated workflows and improving response efficiency. Perform More ❯
Employment Type: Contract
Rate: GBP Annual
Posted:

Incident Response (CSIRT) / SOC Level 3 Analyst

Crawley, West Sussex, South East, United Kingdom
Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … s network systems, operational technology, and customer data from emerging and sophisticated cyber risks. Key Responsibilities As a senior member of the Security Operations team, you will: Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and … enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation across cloud and on-prem environments. Support and develop the organisation's SOAR platform, creating automated workflows and improving response efficiency. Perform More ❯
Employment Type: Contract
Posted:

Senior Cyber Security Analyst

London, United Kingdom
Damia Group Ltd
Security Analyst with SPLUNK experience to join our central government client on an initial 3-month contract. You must have experience investigating and responding to cyber incidents, co-ordinating incident response in a large organisation. We have both a Senior and mid-level role available. Main responsibilities: As a senior security analyst with responsibility for incident response … investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environment Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify … lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and More ❯
Employment Type: Contract
Rate: £600 - £800/day
Posted:

SOC Analyst

Northampton, Northamptonshire, England, United Kingdom
VIQU IT Recruitment
Skills & Experience from the SOC Analyst Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft’s security … alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incident response and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Beneficial Experience More ❯
Employment Type: Contractor
Rate: £350 - £400 per day
Posted:

Security Engineer

Northampton, Northamptonshire, England, United Kingdom
VIQU IT Recruitment
Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft’s security … alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incident response and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Beneficial Experience More ❯
Employment Type: Contractor
Rate: £350 - £400 per day
Posted:

Security Analyst

Milton Keynes, Buckinghamshire, England, United Kingdom
VIQU IT Recruitment
Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft’s security … alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incident response and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Apply now More ❯
Employment Type: Contractor
Rate: £400 - £500 per day
Posted:

ServiceNow SecOps

Nationwide, United Kingdom
Experis
We are seeking experienced and hands-on ServiceNow SecOps Developers to join our team on a contract basis. This role is focused on the implementation and development of Security Incident Response (SIR) and Vulnerability Response (VR) modules within the ServiceNow platform. Key Responsibilities: Design, develop, and implement solutions using ServiceNow SecOps modules, specifically SIR and VR. Collaborate … Troubleshoot and resolve technical issues related to SecOps modules. Provide documentation and knowledge transfer as needed. Required Skills & Experience: Proven hands-on experience with ServiceNow SecOps modules, particularly Security Incident Response (SIR) and Vulnerability Response (VR) . Strong understanding of ServiceNow architecture and development practices. Experience in implementing and configuring SecOps workflows and integrations. Ability to work More ❯
Employment Type: Contract
Posted:

Cybersecurity Architect

City, Sheffield, United Kingdom
Square One Resources
where necessary Required Skills/Experience The ideal candidate will have the following: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical … SMEs at a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies Experience and understanding of both the roles and interlock between enterprise & solution architecture Experience in both operational and transformation cybersecurity roles or a clear working understanding of both perspectives Experience working in More ❯
Employment Type: Contract
Rate: GBP 500 - 537 Daily
Posted:

Associate Information Security Practitioner

London, United Kingdom
Moorfields Eye Hospital NHS Foundation Trust
scans and external security & penetration tests, forensic audits, or related investigations. This includes the ability to ensure remediation of findings are handled and fed into continuous service improvement activities. Incident management of cyber security events of all severities, throughout the incident lifecycle. Business Continuity Develop, maintain, and improve data and technology Business Continuity & Disaster Recovery Plans that enable … into Live Service Experience of working with conflicting, highly complex, and/or highly sensitive information Experience in managing critical incidents, and problem investigation + resolution (including managing security incident response, and information security breaches) Experience of contributing to, and developing enabling strategies (example: information security) Coaching, mentoring and supervision of others Management of financial budgets for a … on-call, consumables, relevant 3rd party provision contracts) and developing investment cases Desirable Experience in conducting or managing information security audits, penetration testing, table-top/simulation exercises, and incident investigations Experience of management products/services in healthcare (NHS) Skills and Knowledge Essential Deal with complex business problems and translate into information security and business continuity requirements and More ❯
Employment Type: Fixed-Term
Salary: £56276.00 - £63176.00 a year
Posted:

Enhanced DV Cyber Security Lead

United Kingdom
83zero Limited
Manage and optimise vulnerability management tools (e.g., Tenable.SC, Rapid7, Qualys). Support the development and operation of Cyber Security Operations Centres (CSOCs) . Conduct threat modelling, risk assessments, and incident response . Implement and manage identity and access management (IAM) solutions using SailPoint, OKTA, and BeyondTrust. Collaborate with internal teams to ensure compliance with NIST, MITRE ATT&CK More ❯
Employment Type: Contract
Posted:

SOC Analyst

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Stott & May Professional Search Limited
Day Rate: £382.50 per day Inside IR35 The Role We are seeking an experienced SOC Level 2 Analyst to join our Security Operations Center, supporting threat detection, investigation, and response across enterprise systems. You'll work with leading security technologies, responding to advanced threats and guiding L1 analysts in a fast-paced, collaborative environment. Key Responsibilities Investigate and remediate … tools such as Splunk and Microsoft Defender. Perform forensic analysis to identify root causes and recommend containment and recovery actions. Develop detection use cases, improve processes, and maintain accurate incident documentation. Collaborate with IT and security teams to strengthen overall detection and response capability. Essential Skills & Experience 6-8 years in cybersecurity, with strong SOC or incident response experience. Proficient in SIEM (Splunk, ArcSight) and EDR (Defender, CrowdStrike, Carbon Black). Strong knowledge of digital forensics, malware analysis, and threat hunting. Skilled across Windows, Linux, and cloud environments. Familiar with frameworks such as MITRE ATT&CK, NIST, and ISO 27001. Scripting experience (Python, PowerShell) beneficial. Preferred Certifications SOC-related (CySA+, Blue Team L1, GCIH, GCIA More ❯
Employment Type: Contract
Rate: £320 - £382.50 per day
Posted:

DevSecOps Lead

United Kingdom
Networker Global Limited
platform. Collaboration & Leadership: Serve as the security subject matter expert for AI/ML projects. Mentor development and data science teams on secure coding and operational best practices. Lead incident response activities related to the AI/ML platform. Qualifications & Experience (Required) Experience : 5+ years of experience in a DevOps, DevSecOps, or Cloud Security role, with at least More ❯
Employment Type: Contract
Posted:

Senior Cyber Security Analyst (Ops - Cloud)

Leeds / Exeter, United Kingdom
NHS England
Job summary The Senior Security Analyst (Ops) sits within the Protective Monitoring function of the Cyber Security Operations Centre (CSOC). The CSOC is made up of Protective Monitoring, Incident Management, Threat Operations, Engineering and Consultancy. The role is a Tier 3 analyst in the Cloud Protective Monitoring Sub team. Cyber Operations purpose is to support safe care and … Delivery Unit (CDU). Cyber Improvement Programme. Chief Information Security Office Function (CISO) The post of Senior Security Analyst has been awarded a Recruitment and Retention Premia (RRP) in response to current labour market conditions. In recognition of this, the role attracts an additional monthly RRP payment equal to 20% per annum. Please be aware that RRP is none … contractual and subject to review. Main duties of the job As a Senior Security Analyst Ops you will: Provide Tier 3 security analytics and incident response for service-specific security monitoring. Deputise for Security Lead (Analyst) in their absence. Act as an escalation point for Tier 2 Analysts for incidents and investigations. Offer mentorship and guidance to Tier More ❯
Employment Type: Fixed-Term
Salary: £66828.00 - £75218.00 a year
Posted:

Network Solution Architect

Coventry, West Midlands, United Kingdom
Hybrid / WFH Options
Infoplus Technologies UK Ltd
Exposure to virtual networking and automation tools (Terraform, Ansible, Python, etc.). Monitoring & Management Knowledge of network management systems (SolarWinds, Cisco DNA Center, etc.). Performance monitoring, logging, and incident response design. 3. Experience Requirements Typically710+ yearsin network engineering, with35 yearsin architecture or design roles. Proven experience in large-scale or complex enterprise environments. Experience producing architectural artefacts More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £550 per day
Posted:

Senior Network Engineer

West Midlands (County), Birmingham, United Kingdom
Sherborne Talent Solutions
aligned with ISO 27001, NIST, and CIS frameworks. Produce detailed documentation for configurations, processes, and troubleshooting. Collaborate with global cloud, security, and infrastructure teams for consistent, secure operations. Support incident response, root cause analysis, and ongoing improvements. Required Skills & Experience: Extensive experience executing network refresh projects. Strong expertise with Cisco, Palo Alto, HAProxy, and Azure networking. Solid understanding More ❯
Employment Type: Contract
Posted:

Solution Architect

Coventry, West Midlands, United Kingdom
Hybrid / WFH Options
Stackstudio Digital Ltd
Azure, or GCP networking services; understanding of hybrid/multi-cloud; automation tools (Terraform, Ansible, Python). Monitoring & Management: Network management systems (SolarWinds, Cisco DNA Center); performance monitoring, logging, incident response. Experience Requirements: 7 10+ years in network engineering, with 3 5 years in architecture/design roles. Proven experience in large-scale or complex enterprise environments. Architectural artefact More ❯
Employment Type: Contract
Rate: From £500 to £525 per day
Posted:

Security Analyst

City of London, London, United Kingdom
Experis
meet ISO27001 & the Cyber Essentials+ certification. Administrative requirements of PAM tool. (CyberArk) Experience Experience administrating PAM solutions, such as CyberArk - MANDATORY Working understanding of security operations, threat detection, and incident response. Experience using SIEM and security tooling for triage and log analysis. Experience tracking and managing vulnerabilities using industry frameworks. Familiarity with enterprise systems including Microsoft 365 and Azure More ❯
Employment Type: Contract
Rate: £400 - £401/day
Posted:

Senior XSOAR / XSIAM Consultant

United Kingdom
83zero Limited
/XSIAM Consultant to join a major Public Sector programme. This role is a key position within the security operations landscape, helping to drive advanced automation, threat detection, and response capabilities across a complex environment. This is a contract opportunity suited to someone with deep technical knowledge of Palo Alto's XSOAR and XSIAM platforms, combined with hands-on … workflows to enhance SOC automation Integrate XSIAM with existing SIEM, XDR, and third-party security tools Build advanced detection logic, enrichment pipelines, and correlation rules to improve visibility and response Develop dashboards, reports, and monitoring tools to provide real-time threat intelligence Troubleshoot and resolve complex issues across XSOAR, XSIAM, and associated security integrations Required Skills & Experience Proven expertise … across Cortex platforms) Strong knowledge of SIEM, XDR, and SOC operations Proficiency in Python or other scripting languages for automation Hands-on experience in log ingestion, alert tuning, and incident response workflows Ability to lead on both design and implementation projects with minimal supervision Must be eligible for SC Clearance to work within the UK Public Sector Desirable More ❯
Employment Type: Contract
Rate: £600 - £700 per day
Posted:

AWS Cloud Security Product Owner

London, United Kingdom
Damia Group Ltd
to review technical security proposals with Product Teams. Attend Security Working Groups and Tenant Forums to provide and lead on ongoing technical security guidance. Participate in high-priority security incident bridge calls and provide expert support during security incidents (office hours only): lead Post Incident Response investigations. Requirements: Strong knowledge of cloud security principles, frameworks, and best More ❯
Employment Type: Contract
Rate: £650 - £800 per day
Posted:

AWS Cloud Security Product Owner

Nationwide, United Kingdom
Damia Group Ltd
technical security proposals with Product Teams. . Attend Security Working Groups and Tenant Forums to provide and lead on ongoing technical security guidance. . Participate in high-priority security incident bridge calls and provide expert support during security incidents (office hours only): lead Post Incident Response investigations. Essential Skills & Experience . Strong knowledge of cloud security principles More ❯
Employment Type: Contract
Rate: £750 - £840/day
Posted:

Defence Senior Cyber Security Analyst - 3 months

London, South East, England, United Kingdom
Hybrid / WFH Options
NonStop Consulting Ltd
We are currently recruiting for Defence Associate Security Analysts with knowledge of Cyber security threats using SPLUNK and EDR (Endpoint Detection and Response) to join a great project for 3 months, that is ran by a Central Government Authority. The best thing about this opportunity is that you will have a great work-life balance with remote working , thus … be able to organise your time up to your liking (2-3 days/week in London office) Essential Experience: Experience of investigating and responding to cyber incidents, coordinating incident response in large org5+ years' experience SPLUNK and EDR (Endpoint Detection and Response) Analytical, problem solving oriented MOD/DEFENCE - highly desirable SC Clearance - Candidates holding active … Central Government Contrac t so you can improve prospects for future contracting Interviews will start as soon good candidates are available, if you are interested do not delay the response and forward you updated CV today. If you would like to discuss further about this opportunity or others in the UK Public Sector, please reach out (extension 8144) and More ❯
Employment Type: Contractor
Rate: Competitive salary
Posted:

Defence Senior Cyber Security Analyst - 3 months

London, United Kingdom
Hybrid / WFH Options
NonStop Consulting
We are currently recruiting for Defence Associate Security Analysts with knowledge of Cyber security threats using SPLUNK and EDR (Endpoint Detection and Response) to join a great project for 3 months, that is ran by a Central Government Authority. The best thing about this opportunity is that you will have a great work-life balance with remote working , thus … be able to organise your time up to your liking (2-3 days/week in London office) Essential Experience: Experience of investigating and responding to cyber incidents, coordinating incident response in large org 5+ years' experience SPLUNK and EDR (Endpoint Detection and Response) Analytical, problem solving oriented MOD/DEFENCE - highly desirable SC Clearance - Candidates holding … Central Government Contrac t so you can improve prospects for future contracting Interviews will start as soon good candidates are available, if you are interested do not delay the response and forward you updated CV today. If you would like to discuss further about this opportunity or others in the UK Public Sector, please reach out (phone number removed More ❯
Employment Type: Contract
Posted:

SOC Operations Manager - Active SC, Azure, ISO27001, Energy

London, United Kingdom
Hays
SC), to lead the day-to-day operations of a Security Operations Centre. This is a hands-on leadership role where you'll manage a team of analysts, drive incident response, and ensure the SOC delivers measurable value to a well-known end client within the Energy Sector. Key Requirements: Proven experience working within SOC management, within Energy … with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms and automation in incident response. Immediate availability If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now. If this More ❯
Employment Type: Contract
Rate: £600.0 - £800.0 per day + up to £800 per day (Inside IR35)
Posted:
Incident Response
10th Percentile
£381
25th Percentile
£456
Median
£537
75th Percentile
£649
90th Percentile
£741