8 of 8 Contract Threat Detection Jobs in the UK excluding London

SOC Threat Detection Analyst

Hiring Organisation
Certain Advantage
Location
Stevenage, Hertfordshire, United Kingdom
Employment Type
Contract
Contract Rate
£45 - £85/hour Overtime Rate of time and a quarter
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit … someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: £45ph - £85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern ...

SOC Analyst

Hiring Organisation
Certain Advantage
Location
Stevenage, Hertfordshire, England, United Kingdom
Employment Type
Contractor
Contract Rate
£66.00 per hour, Inc benefits
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit a SOC Threat Detection Analyst subcontractor on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit … someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: £66.00 per hour. (Umbrella/Inside IR35). Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day CycleSat to Tue - Earlies ...

SIEM Engineer

Hiring Organisation
CBSbutler Holdings Limited
Location
Wokingham, Berkshire, South East, United Kingdom
Employment Type
Contract
Contract Rate
Up to £430 per day + inside ir35
management of modern SIEM and EDR platforms. This role is ideal for someone with strong hands-on technical security expertise and a passion for threat detection, analysis, and automation. Key Responsibilities: Syslog experience and/or strong Linux skills SIEM Deployment & Management Configure, deploy, and maintain SIEM platforms … . Build and optimise log ingestion pipelines. EDR Deployment & Management Manage and maintain tools including Tanium , Trellix , FireEye , Microsoft Defender , or Elastic EDR . Threat Detection & Analysis Monitor security logs and alerts. Investigate anomalies, understand attack patterns, and provide actionable recommendations. Syslog Management Configure and maintain Syslog servers ...

MSS SOC Threathunting

Hiring Organisation
Randstad Technologies
Location
London, South East, England, United Kingdom
Employment Type
Contractor
Contract Rate
£450 - £470 per day
Adword Job Title: SOC Threat hunting Analyst Location: Remote Duration: 04 months contract Active SC Clearance required Experience and knowledge Key Responsibilities: Threat Detection Use Case Development: Design and implement detection logic aligned to specific threat scenarios, using industry frameworks such as MITRE ATT&CK. … Maintain detection content throughout its lifecycle - from development and testing to deployment and tuning. Work with client Lead Analysts to ensure content relevance and effectiveness in detecting threats across various environments. Proactive Threat Hunting: Conduct hypothesis-driven threat hunts based on client telemetry, threat intelligence ...

Senior Security Engineer - SIEM, KQL

Hiring Organisation
Harvey Nash
Location
London, South East, England, United Kingdom
Employment Type
Contractor
Contract Rate
£500 - £600 per day
site** Key Responsibilities SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical … sources (AD, firewalls, servers, cloud infrastructure) Manage event collection and forwarding infrastructure Implement data filtering and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security ...

Security (SIEM, Elastic) Architect - SC Cleared

Hiring Organisation
Sanderson Government and Defence
Location
Warwick, Warwickshire, West Midlands, United Kingdom
Employment Type
Contract
Contract Rate
£600 - £800 per day + Flexible
native observability tools (AWS CloudWatch, Azure Monitor, GCP Operations Suite). Automate log collection and enrichment using Beats, OpenTelemetry, and scripting. Security Use Cases & Threat Detection Build and maintain SIEM use cases, alerts, and dashboards for threat detection. Map detection rules to frameworks like MITRE ...

IT Expert Principal

Hiring Organisation
Hays Specialist Recruitment Limited
Location
London, South East, England, United Kingdom
Employment Type
Contractor
Contract Rate
Salary negotiable
design, deployment, and optimisation of advanced security capabilities across a complex virtualised environment. You will work closely with technical leads to enhance firewall, threat protection, monitoring, and investigative capabilities within VMware security platforms. What You'll Be Doing Firewall & Platform Enablement (vDefend DFW) Supporting deployment of the platform … macro, meso, and micro-segmentation policies Assisting with Identity Firewall configuration Enhancing logging, monitoring, visibility, and operational metrics Supporting capacity management activities Advanced Threat Protection (ATP) Assisting with ATP enablement and configuration Supporting policy activation for IPS/IDS Participating in testing, validation, and malware prevention tuning Helping with ...

Lead Identity Specialist - Microsoft Entra

Hiring Organisation
VANLOQ LIMITED
Location
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Employment Type
Contract
Trust principles. Support large-scale IAM adoption, modernisation, and migration from legacy identity platforms. Drive proactive use of Microsoft Defender for Identity to enhance threat detection and identity-based risk management. Partner with security leadership to ensure compliance with audit, regulatory, and governance requirements. Serve as enterprise escalation ...