Northampton, Northamptonshire, England, United Kingdom
VIQU IT Recruitment
SOCAnalyst – 3-month contract – Northampton My Customer is looking for a proactive SOCAnalyst to join their team and take ownership of monitoring, triaging, and responding to security alerts across their Microsoft security ecosystem. Strong experience troubleshooting and responding to alerts would be the main focus of the role. Strong expertise with Microsoft … Defender and Sentinel is needed. Key Skills & Experience from the SOCAnalyst Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incident response, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log … analysis, and automation within Microsoft’s security ecosystem. Key Responsibilities of the SOCAnalyst Monitor, investigate, and respond to security alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incident response and efficiency. More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
SOCAnalyst Location: Reading (Hybrid - 3 days onsite per week) Contract Type: Contract (Inside IR35) Duration: 6 Months Day Rate: £382.50 per day Inside IR35 The Role We are seeking an experienced SOC Level 2 Analyst to join our SecurityOperations Center, supporting threat detection, investigation, and response across enterprise systems. You'll work … processes, and maintain accurate incident documentation. Collaborate with IT and security teams to strengthen overall detection and response capability. Essential Skills & Experience 6-8 years in cybersecurity, with strong SOC or incident response experience. Proficient in SIEM (Splunk, ArcSight) and EDR (Defender, CrowdStrike, Carbon Black). Strong knowledge of digital forensics, malware analysis, and threat hunting. Skilled across Windows … Linux, and cloud environments. Familiar with frameworks such as MITRE ATT&CK, NIST, and ISO 27001. Scripting experience (Python, PowerShell) beneficial. Preferred Certifications SOC-related (CySA+, Blue Team L1, GCIH, GCIA, GCFA). CISSP or equivalent desirable. Additional Information Fast-paced environment; occasional out-of-hours work may be required. More ❯
rich heritage of technological excellence and a strong focus on digital transformation, they empower organisations worldwide to solve complex challenges and achieve sustainable growth. Your new role As a SOCAnalyst, you will be responsible for providing Protective Monitoring Services across a range of Secure Customers. You will be responsible for the day-to-day monitoring using … following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. The role acts as part of a 24/7 shift team and shift work will be required. This role is based in Hursley and … to succeed Must be prepared to work on shift as part of a 24/7 shift team based onsite - 4 days on - 4 days off.Microsoft Certified: SecurityOperationsAnalyst Associate Certification (SC200) is a mandatory requirement for role fulfilmentExperience working with SIEM technologies and security toolingAn understanding of IT Infrastructure and NetworkingAn understanding of vulnerability and threat More ❯
Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst 2-3 Days onsite - Crawley 6-9 Month duration Reporting line: The Analyst will report to the Cyber Security Response Manager and work within the Information Systems directorate, based in the Crawley office. Job purpose: The role of an Incident Response (CSIRT)/SOC … protect network systems and customer data from cyber threats. Dimensions People – Work collaboratively in a team of around 14 cyber securityoperations staff. Mentor Level 1 and Level 2 SOC Analysts, providing guidance and training. Suppliers – Regular interaction with technical resources from outsourced Managed Security Service Providers (MSSPs) and cyber security tooling vendors. Communication – Communicate technical cybersecurity concepts to … vulnerabilities, and anomalies, then use this intelligence and tooling to uncover and remove hidden threats that may have bypassed existing defences across IT and OT environments. Policy Development: Develop SOC policies, technical standards, and procedure documentation aligned to industry best practice. Log Management: Work with MSSPs and service owners to ensure log sources are onboarded into the SIEM solution. More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯
CYBER SECURITYANALYST | SECURITYOPERATIONS CENTER (SOC). Summer-Browning Associates is supporting our client in the Central Government who is seeking a Cyber SecurityAnalyst for an initial 12-month assignment, with the possibility of extension. Location: London | Hybrid| Remote The ideal candidates will hold active DV clearance and have a proven background in … Cyber Security, with the following skills and experience: Experience in SOCoperations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority More ❯