The team you'll be working with: P3 Senior SOC Analyst (L3) We are currently recruiting a Senior SOC Analyst L3 Managed Detection and Responseto join our growing SecurityOperationsCentre business. ThisrolewillbebasedonsiteinBirmingham,youwillneedtobewillingtoworkinshiftpatters,probably4dayson,4daysoff,asthisisa24/7securityoperationscentre. About Us NTT DATA is one of the world's largest Global Security services providers with over … Security SMEs and Integration partner to many of the worlds most recognised Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. In a constantly changing world, we work together with our people, clients and communities to enable them to fulfil their potential to do great things. We believe that … be doing; The primary function of the SeniorSOC Analyst L3 is to manage any incidents escalated by the SOC Analyst (L1 & L2) and undertake the detailed investigation of the Security Event. The Senior SOC Analyst shall be able to look at all the evidence available and support the client on the appropraite action to contain and remediate any securityMore ❯
Reading, England, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Limited
role is hybrid/office based specify location: Reading, UK Duration of assignment: 6 months contract InsideIR35 Role description: Seeking a highly experienced SOC L3 Analyst to strengthen our SecurityOperations Center. As a Tier 3 CERT Analyst, Candidate will lead the investigation and remediation of advanced cyber threats, leveraging cutting-edge tools such as Splunk , Microsoft Sentinel … CrowdStrike , and Defender and other security stacks. Candidate will handle complex incidents like APTs, malware, and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves … proactive threat hunting, incident response, and collaboration with cross-functional teams to enhance the organization s security posture. Key responsibilities: Incident Detection and Response: Lead investigations and remediation of complex security incidents, including malware infections, data breaches, and advanced persistent threats (APTs). Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other More ❯
BCG is a privately owned firm with over 80 offices in more than 40 countries. BCG's Global Functions provide professional management services to the firm, including the central operations of finance, information technology, marketing, risk, legal, operations and human resources. What You'll Do As a Cyber Security Incident Response Manager at BCG, you will be … a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG's global network. You will work closely with the SecurityOperations Center (SOC), Security Information and Event … Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to strengthening our security posture and minimizing business risks associated with cyber threats. Act as a Tier 3 Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
in Dublin, Ireland. Learn more at experianplc.com. Job Description As a Cyber Defence Analyst, you will join the Cyber Fusion Center, performing in-depth analysis, assessment, and response to security threats by following documented policies to meet Service Level Goals. The team provides global 24x7 securityoperations and monitoring for cybersecurity events affecting Experian. You will be … the first line of defence in Experian's broader incident response and incident management departments, responsible for receiving and prioritizing cybersecurity alerts, including being the dedicated contact for potential security incidents reported by users (e.g., Experian employees). Depending on the results of assessment, this team is then responsible for investigating, containing, eradicating, and recovering from events falling in … risk events to dedicated incident response and management teams in the CFC. This role is critical in ensuring the handling of potential threats and plays a part in improving security operations. This is a home based role reporting to the Director of SecurityOperations for SecOps & Threat Detection. Please note that in this role, you will have More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Focus on SAP
Full time Start: ASAP Location: Reading – Hybrid Languages: English We are seeking an experienced and highly capable SOC Tier 3 Analyst to serve as a senior member of our SecurityOperations Center (SOC). You will lead advanced incident response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and … Threat Hunting & Analysis Proactively identify emerging threats through behavioral analytics and threat intelligence. Analyze log data, network activity, and endpoints to uncover hidden anomalies or malicious behavior. Partner with security engineering teams to build detection capabilities based on evolving threats. 🔬 Digital Forensics & Investigation Conduct detailed forensic investigations to determine incident scope, root cause, and impact. Collect and preserve digital … and support threat blocking strategies. 🤝 Collaboration & Knowledge Sharing Mentor junior SOC analysts and share knowledge across incident response workflows. Engage with stakeholders across IT, DevOps, and legal to enhance security posture. Contribute to post-incident reviews and continuous process improvement. 📚 Security Research & Intelligence Stay ahead of industry developments, vulnerabilities, and attacker methodologies. Create detection rules and playbooks to More ❯
Senior SecurityOperationsCentre Analyst Location: Gosport Hours: 9-5:30pm (on-site) Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work, all applicants will be required to gain UK Security Clearance to the highest level. You must be a British National who has been … health cash plan, life assurance, pension scheme, and a generous flexible benefits fund. Key Requirements: We are seeking an experienced Senior SOC Analyst who brings a strong background in securityoperations , threat detection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential … Skills and Experience: Proven experience in a SecurityOperationsCentre (SOC) environment. Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk . Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ). Skilled in incident response and threat intelligence analysis . Familiarity with Mitre Att&ck framework and advanced More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
Senior SOC Analyst Location: Gosport (Predominantly site-based with some flexibility for remote working) Salary: Highly competitive with excellent benefits package Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the highest level. You must be a … health cash plan, life assurance, pension scheme, and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOC Analyst who brings a strong background in securityoperations , threat detection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential … Skills and Experience: Proven experience in a SecurityOperationsCentre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat detection techniques More ❯
team you'll be working with: SOC Analyst (L1) We are currently recruiting for an Associate level Managed Detection and Response SOC Analyst Level 1 to join our growing SecurityOperationsCentre business. This role will be based on-site in Birminham, we need canddiates that are able towork in a job that involves 24/… operations, this will probably be inshift patterns of 4 days on, 4 days off. About Us NTT DATA is one of the world's largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of the worlds most recognised Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals … you'll be doing: What you will be doing; The primary function of the SOC Analyst (L1) is to analyse any incidents and undertake the detailed investigation of the Security Event. The role is a 'hands-on' shift-based roles, working as part of a 24/7 operation working in a standard rotation shift pattern. They are responsible More ❯
you'll be working with: SOC Analyst (L2) We are currently recruiting for a Senior Associate level Managed Detection and Response SOC Analyst Level 2 to join our growing SecurityOperationsCentre business. This role will be based on-site in Birmingham. We need candidates who are able to work in a job that involves 24/… operations, likely in shift patterns of 4 days on, 4 days off. About Us NTT DATA is one of the world's largest Global Security services providers with over 7,500 Security SMEs and an integration partner to many of the world's most recognized Security Technology providers. We strive to hire exceptional, innovative, and passionate … doing: What you will be doing; The primary function of the SOC Analyst (L2) is to analyze incidents escalated by the SOC Analyst (L1) and undertake detailed investigations of Security Events. The Security Analyst (L2) will determine whether a security event qualifies as an incident and coordinate with the customer's IT and Security teams for More ❯
Cyber SOC Analyst – Corsham Location: On-site, 5 days per week (Corsham) Security Clearance: Must currently hold SC clearance and be eligible for DV Citizenship Requirement: Sole British only About the Role Embedded within an established customer SecurityOperationsCentre (SOC), this role involves participating in core SOC functions, identifying opportunities for improvement, and driving best … practices in cyber defence operations. You will play a key role in monitoring and responding to cyber threats, supporting threat detection and mitigation, and contributing to continuous improvement in security posture. Key Responsibilities Conduct reactive monitoring across client networks to deliver agile cyber defence across all domains Triage and manage alerts, perform impact assessments, and recommend mitigation strategies Improve … and enforce cyber security policies, procedures, and operational directives Maintain awareness of emerging cyber threats, vulnerabilities, and industry developments Share insights via reports, threat briefs, and team knowledge-sharing sessions Your Profile Experience working as a Security Analyst in a SOC or similar security monitoring environment Knowledge of data networks and SIEM tools Strong understanding of securityMore ❯
SOAR Engineer/Analyst (Security Orchestration, Automation, and Response) Duration: 12 months contract Pay: £360.26/day PAYE or £495.15/day via umbrella Location: Remote (UK) Role Purpose The SOAR Engineer/Analyst is responsible for designing, developing, implementing, and maintaining automation playbooks to improve incident response efficiency within the SecurityOperations Centre. This role integrates … multiple security tools and workflows, leveraging platforms like , Darktrace , and CrowdStrike to create cohesive and automated threat detection and response mechanisms. Key Responsibilities Playbook Development: Design, implement, and maintain SOAR playbooks for automated response and alert enrichment. Tool Integration: Develop and manage integrations with: Google SecOps (Chronicle, Security Command Center) Darktrace (Threat Visualizer, Antigena) CrowdStrike Falcon (EDR, threat … intelligence, APIs) Other security platforms such as SIEMs, ticketing systems, and firewalls. Automation & Enrichment: Automate repetitive security tasks like indicator enrichment, triage, and threat intelligence lookups. Collaboration: Work with SOC analysts and threat detection teams to identify and implement automation opportunities. Monitoring & Optimization: Continuously evaluate the effectiveness of SOAR playbooks and integrations; fine-tune for performance and accuracy. More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Queen Square Recruitment
week) Contract Type: Contract (6 months) Day Rate: Inside IR35 (Flexible) About the Role A leading organisation is seeking an experienced SOC Analyst (Level 3) to join its cybersecurity operations team. This senior role is ideal for professionals who excel in high-stakes environments and possess a strong engineering background, particularly within the Microsoft and Azure security ecosystem. … The ideal candidate will be instrumental in driving SOC maturity, optimizing license consumption, and enhancing security visibility across the enterprise. Key Responsibilities Lead the investigation and resolution of high-severity security incidents Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite Develop and fine-tune analytic rules, detection use-cases, and SOAR playbooks Monitor and optimise … license consumption across Microsoft security tools Manage log onboarding/offboarding processes across varied sources and environments Drive SOC maturity initiatives, identifying and implementing process improvements Perform deep-dive analysis on malware, phishing, and lateral movement threats Correlate events across diverse log sources, including cloud and on-prem infrastructure Collaborate with engineering teams to enhance integration and performance of More ❯
Are you passionate about Cyber Security and Enterprise Architecture? Do you have senior-level experience as a Cyber Security Professional? Join us to shape the security technology and tooling strategy for HMRC and influence the UK Public Sector. Enjoy a healthy work/life balance while making a significant impact. HMRC are now one of the most … IT Landscape across Multi-Hybrid Cloud Platform. Working in one of the most complex infrastructures across Europe with significant investment and over 1000 changes monthly impacting over 600 services. Security Modernisation is critical to this initiative and our collective success. Now is a great time to join us as we establish a team of outstanding people in the fields … of Security Architecture, Risk Assessment and Testing who will create and run these new and improved technology services. This is a chance to work on services that matter and affect the lives of millions of citizens as well as delivering Government Security services directly across circa 400 Government Departments and Arms-Length Bodies (ALBs). Job description HMRC More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
Are you passionate about Cyber Security and Enterprise Architecture? Do you have senior-level experience as a Cyber Security Professional? Join us to shape the security technology and tooling strategy for HMRC and influence the UK Public Sector. Enjoy a healthy work/life balance while making a significant impact. HMRC are now one of the most … IT Landscape across Multi-Hybrid Cloud Platform. Working in one of the most complex infrastructures across Europe with significant investment and over 1000 changes monthly impacting over 600 services. Security Modernisation is critical to this initiative and our collective success. Now is a great time to join us as we establish a team of outstanding people in the fields … of Security Architecture, Risk Assessment and Testing who will create and run these new and improved technology services. This is a chance to work on services that matter and affect the lives of millions of citizens as well as delivering Government Security services directly across circa 400 Government Departments and Arms-Length Bodies (ALBs). Job description HMRC More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
Job title OT Cyber Security Analyst Ref 40929 Division Digital Transformation Location Hybrid - Clearwater Court - RG1 8DB Contract type Permanent Full/Part-time Full-time Salary Up to £65,000 per annum depending on skills and experience Job grade B Closing date 16/05/2025 We are seeking a highly skilled and experienced OT Senior Cyber … Security Analyst to join our dynamic SecurityOperations team at Thames Water. As the UK's largest water company, we are committed to ensuring the highest level of security and compliance, protecting the critical infrastructure that delivers essential water services to 15 million customers. In this role, you will be responsible for maintaining SecOps solutions, controls … SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be tasked with ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you More ❯
Cargo, Iberia, Iberia Express, LEVEL and Vueling. Job Description P urpose of the role The purpose of the role is to design, implement, and manage automation solutions within the SecurityOperationsCentre (SOC) to improve the efficiency and effectiveness of security operations. This role focuses on automating repetitive tasks, optimizing workflows, and integrating tools and systems … to enhance threat detection, incident response, and overall SOC performance. The goal is to streamline securityoperations, reduce manual effort, and accelerate the identification and mitigation of security threats, enabling the SOC team to focus on more complex and critical tasks. Accountabilities The SOC Automation Engineer is accountable for the following: - Automation of SOC Processes Design and … implement automation solutions to streamline repetitive tasks such as alert triaging, incident response, and reporting - Tool Integration Integrate various security tools (SIEM, SOAR, firewalls, etc.) to improve data flow and response coordination. - Optimization of Workflows Enhance and optimize SOC workflows for improved efficiency and reduced manual effort. - Development of Playbooks Create automated response playbooks for common security incidents More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Client Server
Senior SecurityOperations Analyst (SOC Splunk) London/WFH to £100k Are you a technologist SOC Analyst looking for an opportunity to make an impact, working on complex and interesting systems? You could be progressing your career in a hands-on role at a global cryptocurrency market data and trade execution technology company that is experiencing great success … and is growing as a result. As a Senior SecurityOperations Analyst you will be responsible for monitoring and analysing security incidents, responding to threats in real-time and ensuring the integrity of core systems and platforms. You will work closely with the SOC Manager across daily activities of the SecurityOperations Center, continuously monitoring … security alerts and incidents using SIEM tools (Splunk) to create detection use cases, analyse security event data for proactive threat hunting and conduct research on the latest threats and vulnerabilities to enhance incident response readiness and capabilities. Location/WFH: You'll join the team in the London office three days a week with flexibility to work from More ❯
Security (SOC) Engineer Manchester/Remote (On site once a month) £35K- £55K (depending on experience) + Great Benefits A SOC Engineer is required for our medical client who are based in Manchester. The successful candidate will be responsible for delivering hands-on technical expertise to support in defending the organisation's systems from attack whilst ensuring they operate … seamlessly and are secure, enabling the team to deliver effective cybersecurity. You will work within the SecurityOperationsCentre (SOC), supporting the engineering lead in configuring, implementing, and maintaining the tools that support all SOC functions. You will assess, implement, configure, and optimise our technical security controls, tools, and data feeds to maintain and continuously improve … the visibility across our environments. You will also lead initiatives to improve the security posture and respond to incidents, problems and change requests from a securityoperations perspective. Essential skills- Practical experience working within a SOC (SecurityOperationsCentre) or in a cyber security focused role - Ideally 1- 2 years working as an More ❯
We need a Lead Cyber Security Analyst to join us in London. When you join Simply Business, you'll protect us from threat actors who attempt to evade our cyber defences. This is a hands-on technical position where you'll play an important role in increasing the maturity of our SecurityOperationsCentre (SOC). … rapidly evolving environment, which will bring new challenges and opportunities for growth on a regular basis. You'll be empowered to develop and explore your unique passion for cyber security operations. In return we offer an extremely agile working environment with some of the latest technologies such as SASE, AI and with lots of automation. One of our main … make a difference. Simply Business is a cloud-native company which is leading the way with its offerings in the InsureTech market. You will be reporting into Laura the SecurityOperations Manager, and working alongside an award winning team of 5 other analysts and 3 engineers with a diverse set of technical skills and backgrounds within cyber security. More ❯
Job Title: Cyber Security Lead Location: West Midlands, United Kingdom Salary: £62,000 - £73,000 (depending on experience) + Bonus + Excellent Benefits Clearance: Must be a British National and SC Cleared or Eligible ________________________________________ About the Role: We are seeking a proactive and experienced Cyber Security Lead to drive and enhance our organisation's cyber security strategy. … This is a key leadership role responsible for managing security incidents, ensuring compliance with industry standards, and embedding cyber assurance across the business. You will work closely with the SecurityOperationsCentre (SOC), senior stakeholders, and cross-functional teams to maintain a secure and resilient environment. ________________________________________ Key Responsibilities: * Lead the response to cyber security incidents … ensuring timely resolution and root cause analysis. * Oversee the development and implementation of information security compliance and assurance programmes. * Ensure alignment with ISO 27001, NIST, and other relevant security frameworks. * Collaborate with the SOC to monitor, detect, and respond to cyber threats. * Manage governance, risk, and compliance (GRC) activities, including risk assessments and mitigation strategies. * Promote a securityMore ❯
Job description Assistant Manager – SecurityOperationsCentre (SOC) Assistant Manager – IGH Location: Bristol, Birmingham, London, Cheltenham Capability: Consulting The SecurityOperationsCentre - Assistant Manager role will provide the pivotal function of planning, designing, building, and sustaining SOC and Next-Generation SOC services, operating within the uppermost levels of Government. You will work as part … clients' organisations, applying sector knowledge and technology solutions to deliver the best possible outcomes and get it right first time. Why Join KPMG as a Manager within our Cyber Security function? Cyber security is one of the areas which KPMG has identified for tremendous investment and growth. Our clients face a challenging cyber threat and look to us … them understand and respond to that threat. This is an opportunity to join a high performing team that works with a wide variety of clients, including Defence and National Security, which is a KPMG priority sector. That means we are a fast-growing team which presents exciting opportunities for a manager to lead impactful projects, drive our ambitious growth More ❯
the support and development to succeed. A progressive organisation where you can really make a difference. We a great opportunity for a SOC Tier 3 Analyst to strengthen the SecurityOperations Center. As a Tier 3 CERT Analyst you will lead the investigation and remediation of advanced cyber threats, leveraging cutting-edge tools such as Splunk, Microsoft Sentinel … CrowdStrike, and Defender and other security stacks. You will handle complex incidents like APTs, malware, and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. Key Responsibilities: 1. Incident Detection and Response: o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze … and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioural analysis and threat intelligence data. o Analyse data from logs, network traffic, endpoint activities, and threat intelligence feeds to detect unusual or malicious activity. 3. Incident Forensics: o Perform in-depth forensic analysis to determine the scope, impact, and root cause More ❯
Job Title: Cyber Security Manager Location: Wiltshire, United Kingdom (with some travel required) Salary: £62,000 - £73,000 (depending on experience) + Bonus + Excellent Benefits Clearance: Must be a British National and SC Cleared or Eligible About the Role: We are seeking a highly skilled and motivated Cyber Security Manager to lead and enhance our cyber security posture. This is a pivotal role responsible for overseeing incident management, ensuring compliance with information security standards, and driving cyber assurance across the organisation. You will work closely with the SecurityOperationsCentre (SOC), senior stakeholders, and cross-functional teams to maintain a robust security framework aligned with industry best practices. Key Responsibilities: * Lead … and manage cyber security incidents, ensuring timely resolution and root cause analysis. * Oversee the implementation and maintenance of InfoSec and Cyber Security compliance and assurance programs. * Ensure alignment with ISO 27001, NIST, and other relevant security frameworks. * Collaborate with the SecurityOperations team to monitor, detect, and respond to threats. * Manage governance, risk, and compliance More ❯
Cyber Security Delivery Manager | Permanent | UK Remote | £50,000 p.a Peaple Talent have partnered with a brilliant consultancy in the UK looking to recruit a Cyber Security Service Delivery Manager on a full-time permanent basis. Our client is located in the South West of England, but are looking to hire remotely due to the client facing element … at cultivating meaningful client relationships, this would be a suitable role for you. Our client is seeking a Technical Service Delivery Manager who can guide their clients towards enhanced security practices, maximize the value of their offerings, and bring clarity to intricate challenges. They’re looking for someone with a background in cybersecurity operations, excellent interpersonal abilities and … consistent dialogue and delivering regular service updates. Work alongside the sales team to help retain existing clients by supporting the renewal process for CSOC contracts. Handle investigations into potential security events, generate incident reports, and resolve client concerns ensuring corrective measures are actioned to reduce further risk. Develop and maintain internal technical documentation to streamline operational workflows. Support service More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Cadent Gas
140.00 (depending on experience) Job Function: Information Technology Working Hours: 37 Location Type: Hybrid Contract Type: Permanent Engineer the defences that protect our critical infrastructure As a Cyber Security Engineer at Cadent, you will play a key role in safeguarding the UK's largest gas distribution network. Working within our Cyber SecurityOperationsCentre (CSOC), you … technical controls that protect both our IT and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerability management, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure … with advanced SIEM, SOAR, and threat detection tools across IT and OT environments. Strategic Contribution - Influence the development of new controls and support the delivery of Cadent's cyber security strategy. Cross-Team Collaboration - Partner with threat intelligence, vulnerability analysts, and incident responders to enhance our defences. Continuous Improvement - Engineer solutions for unpatchable vulnerabilities and automate detection and response More ❯