Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
SOCAnalyst Location: Reading (Hybrid - 3 days onsite per week) Contract Type: Contract (Inside IR35) Duration: 6 Months Day Rate: £382.50 per day Inside IR35 The Role We are seeking an experienced SOC Level 2 Analyst to join our SecurityOperations Center, supporting threat detection, investigation, and response across enterprise systems. You'll work … processes, and maintain accurate incident documentation. Collaborate with IT and security teams to strengthen overall detection and response capability. Essential Skills & Experience 6-8 years in cybersecurity, with strong SOC or incident response experience. Proficient in SIEM (Splunk, ArcSight) and EDR (Defender, CrowdStrike, Carbon Black). Strong knowledge of digital forensics, malware analysis, and threat hunting. Skilled across Windows … Linux, and cloud environments. Familiar with frameworks such as MITRE ATT&CK, NIST, and ISO 27001. Scripting experience (Python, PowerShell) beneficial. Preferred Certifications SOC-related (CySA+, Blue Team L1, GCIH, GCIA, GCFA). CISSP or equivalent desirable. Additional Information Fast-paced environment; occasional out-of-hours work may be required. More ❯
Threat Hunter/Threat Detector/SOCAnalyst/TTP/Threats/Monitoring/Detection/ZTNA/Sentinel/Splunk. Superb London based client have an Urgent role, Inside IR35, Hybrid Remote and Onsite for an experienced SOCAnalyst/TTP/Threats Monitoring/Detection/ZTNA/Sentinel/Splunk. … This role, working across Cloud (AWS/Azure and GCP) will see you focusing on threat detection and threat hunting as part of a busy SOC Team. This role isn't about dealing with threats when they happen, it is about hunting them out. Thinking ahead of the curve and providing direction, thoughts and strategy as to how the More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯
CYBER SECURITYANALYST | SECURITYOPERATIONS CENTER (SOC). Summer-Browning Associates is supporting our client in the Central Government who is seeking a Cyber SecurityAnalyst for an initial 12-month assignment, with the possibility of extension. Location: London | Hybrid| Remote The ideal candidates will hold active DV clearance and have a proven background in … Cyber Security, with the following skills and experience: Experience in SOCoperations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority More ❯