Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
ISO 42001, GDPR, and DORA. This role focuses on internal audits, regulatory compliance, and readiness for external audits while also contributing to Cybersecurity Operations Center (CSOC) activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards, and risk management processes. Audit Preparation … audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as Rapid7 InsightIDR or other SIEM solutions to assist with security monitoring and incident detection. IncidentResponse Support: Participate in incidentresponse efforts, documenting security incidents and assisting in containment and recovery actions. Threat Identification: Contribute to analyzing cybersecurity … Plus. Familiarity with CSOC tools such as Rapid7 InsightIDR or other SIEM solutions. Hands-on experience in internal and external audits, compliance assessments, and process improvement. Basic understanding of incidentresponse frameworks and cybersecurity best practices. Exceptional analytical, organizational, and communication skills. Commitment to continuous learning and professional development in audit, compliance, and security. You will have an More ❯
and priorities. Develop strategies and recommendations to improve our client's security posture, and shape technical win plans with pre-sales resources. Develop and maintain security policies, procedures, and incidentresponse plans on managed devices. Conduct security awareness training and advise clients on best practices. Assist in security audits, compliance initiatives (ISO 27001, NIST, GDPR, etc.), and regulatory … Azure, GCP). Strong hands-on experience with Microsoft Sentinel, Cisco Splunk or Palo Alto QRadar, and Detection Rule languages such as KQL. Hands-on experience with threat detection, incidentresponse, and forensic analysis. Deep understanding of Palo Alto XSOAR or similar. Familiarity with compliance standards such as ISO 27001, NIST, CIS, GDPR, and HIPAA. Proficiency in scripting More ❯
pension scheme, and a generous flexible benefits fund. Key Requirements: We are seeking an experienced Senior SOC Analyst who brings a strong background in security operations , threat detection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in … hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk . Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ). Skilled in incidentresponse and threat intelligence analysis . Familiarity with Mitre Att&ck framework and advanced threat detection techniques. Excellent analytical and problem-solving capabilities. Able to provide mentorship and … and improve SOC processes. Active engagement with the cybersecurity community and awareness of emerging trends. Role & Responsibilities: As a Senior SOC Analyst , you will be at the forefront -leading incidentresponse, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ). Leading incidentresponseMore ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
pension scheme, and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOC Analyst who brings a strong background in security operations , threat detection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in … environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incidentresponse and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide mentorship and leadership … SOC processes Active engagement with the cybersecurity community and awareness of emerging trends Role & Responsibilities As a Senior SOC Analyst , you will be at the forefront of digital defenceleading incidentresponse, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incidentresponse and More ❯
have the perfect role for you! Why Join? ✅ Work with a leading UK IT Services & Consulting organisation ✅ Protect high-profile clients from cyber threats ✅ Engage in technical design, implementation & incidentresponse ✅ Benefit from a collaborative & innovative security team Your Impact: 🔹 Design, implement & manage next-gen security solutions (SIEM, IDS/IPS, endpoint protection, cloud security) 🔹 Lead technical workshops … architecture design sessions 🔹 Drive security strategy & compliance initiatives (ISO 27001, NIST, GDPR) 🔹 Perform threat detection, incidentresponse & forensic analysis 🔹 Utilize Microsoft Sentinel, Cisco Splunk, Palo Alto QRadar, KQL & more What We’re Looking For: 🔸 4+ years in Cyber Security within an MSP or similar environment 🔸 Hands-on expertise in SIEM, EDR, firewalls, VPNs, cloud security (AWS, Azure, GCP More ❯
As a member of the Starling SOC team, you will be working with the industries brightest SecOps professionals to protect Starling customers, assets, and systems using the latest technologies. Incident Triage, Response, and Investigations based on Alerts received from multiple sources which include: Cloud Infrastructure/Security. Endpoint Detection and Response. Perimeter detection tooling. Investigating and responding to … security alerts raised by Users. Enhancing and creating analytic triggers to enhance alert efficacy. Continuous development of incident handling and readiness processes. Proactive threat hunting based on threat intelligence. Documentation of incidents and investigations. About your Skills We're open-minded when it comes to hiring and we care more about aptitude and attitude than specific experience or qualifications. … Below is an overview: 3+ years experience in an in-house SOC role and team Understanding of AWS Security Solutions (or other Public Cloud Solutions) Analysis and IncidentResponse experience with Cloud systems such as AWS or GCP Experience working and supporting analytics/SIEM platforms. Experience working in CSIRT/SOC functions. Experience supporting and conducting IncidentMore ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
InstaVolt
Establish and enforce IT policies, standards, and procedures to ensure high availability, performance, and security. Lead a 24 7 support model for internal platforms and services, including service desk, incident management, access control, and remote support. Ensure high-quality internal service delivery through ITIL-aligned practices, KPIs, and SLAs. Drive automation and self-service capabilities for common support tasks … and technology partners to ensure cost-effective and reliable service delivery. Collaborate with InfoSec and Legal teams to ensure compliance with relevant regulations (e.g., ISO 27001, GDPR). Lead incidentresponse and disaster recovery planning/testing for internal platforms and operational IT. Requirements Needed: Bachelor's degree in information technology, Computer Science, or related experience. 10+ years More ❯
Eastleigh, Hampshire, United Kingdom Hybrid / WFH Options
Ageas
with internal policies, external regulations and industry good practice. (e.g., GDPR, ISO27001, CIS, ISF, NIST). Provide expert guidance on security best practices, threat modelling, and mitigation strategies. Support incidentresponse and post-incident reviews from an architectural perspective. Skills and experience you need asInformation Security Assurance Specialist: Strong understanding of all security principles and underlying technologies More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Southern Communications Ltd
Tasks: Security assessments:?Create and perform security assessments and threat models Security standards:?Develop,implement&maintainsecurity standards and plans VulnerabilityManagement:?Research weaknesses and find ways to counter them Security incidentresponse:?Respond to attack vectors and security incidents, and coordinate incidentresponse across teams Security software testing:?Test company software, firmware, and firewalls Security software design … event log analysis Network Troubleshooting skillsrequired. Knowledge and hands-on experience in penetration testing/vulnerability scanning, security tools like tenable Nessus, kaliLinux Knowledge of ITIL disciplines such as Incident, Problem and Change Management Experience of infrastructure design and management in mission critical environments preferred. Understanding of Virtual Infrastructure and windows environments preferred Effective communication, organizational, problem-solving and More ❯
initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents. The Tier 2 Analyst works closely with senior and junior analysts to ensure a seamless SOC operation and acts as a bridge between foundational and advanced … threat detection and response functions. Due to the customer requirements successful applicants must be eligible for high level UK Security clearance, SC and be able to work onsite in Farnborough. Responsibilities: Conduct escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions … to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs). Investigate potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
doing: Monitor, triage, and investigate security incidents on critical client infrastructure. In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Provide IncidentResponse support. Maintain, improve and develop team knowledge of SOC tools, security operations and triage. Prepare reports for managed clients to both technical and non-technical audiences and … continuously improve their content and presentation. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. What you will bring : Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations. Knowledge and experience with Mitre Att&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
training and development programs. Responsibilities include: Monitoring, triaging, and investigating security incidents on critical client infrastructure. Analyzing network traffic, logs, and system events to identify threats and vulnerabilities. Providing IncidentResponse support. Maintaining and developing team knowledge of SOC tools and security operations. Preparing reports for technical and non-technical audiences and improving their content. Updating security incidentMore ❯
/engineering and creation of rulesets & dashboards aligned to the MITRE ATT&CK framework. Preferred vendors: Microsoft Sentinel, Google Chronicle (SecOps), Elastic. Excellent Knowledge of EDR/XDR – including incident investigation at a priority 1 and 2 severity and general day-to-day usage alongside best-practice configurations for common toolsets. Preferred vendors: CrowdStrike, Microsoft, Palo Alto, SentinelOne. Good … Knowledge of incidentresponse, aligned to MITRE ATT&CK with a good knowledge of common tactics, tools and techniques attackers utilise in the wild. Good Knowledge of VM – including analysis, classification and prioritisation to create tangible and actionable insights. Preferred Solutions: Rapid 7, Tenable, Vulcan. Good Knowledge of CTI – Including its utilisation within a SOC environment. Preferred Solutions More ❯
targeted attacks and service disruptions. This is not your average support role – you’ll be: Client-facing – engaging with high-profile stakeholders, requiring strong communication Handling monitoring, escalations, and incidentresponse Working closely with Cloudflare’s security & performance services Supporting feeds & tools introduced to prevent breaches during races Acting as a key part of the incident management … Must-Have Skills Cloudflare experience (WAF, CDN, DDoS protection, DNS, etc.) Strong communication – this is a client-heavy, speaking role Understanding of security operations, monitoring, and escalation Experience in incident or breach response Comfortable in a high-pressure, fast-moving environment like F1 WORKING HOURS: FRI/SAT/SUN - to support during race weekends RATES: £500 PER More ❯
targeted attacks and service disruptions. This is not your average support role – you’ll be: Client-facing – engaging with high-profile stakeholders, requiring strong communication Handling monitoring, escalations, and incidentresponse Working closely with Cloudflare’s security & performance services Supporting feeds & tools introduced to prevent breaches during races Acting as a key part of the incident management … Must-Have Skills Cloudflare experience (WAF, CDN, DDoS protection, DNS, etc.) Strong communication – this is a client-heavy, speaking role Understanding of security operations, monitoring, and escalation Experience in incident or breach response Comfortable in a high-pressure, fast-moving environment like F1 WORKING HOURS: FRI/SAT/SUN - to support during race weekends RATES: £500 PER More ❯
targeted attacks and service disruptions. This is not your average support role – you’ll be: Client-facing – engaging with high-profile stakeholders, requiring strong communication Handling monitoring, escalations, and incidentresponse Working closely with Cloudflare’s security & performance services Supporting feeds & tools introduced to prevent breaches during races Acting as a key part of the incident management … Must-Have Skills Cloudflare experience (WAF, CDN, DDoS protection, DNS, etc.) Strong communication – this is a client-heavy, speaking role Understanding of security operations, monitoring, and escalation Experience in incident or breach response Comfortable in a high-pressure, fast-moving environment like F1 WORKING HOURS: FRI/SAT/SUN - to support during race weekends RATES: £500 PER More ❯
methodology, as well as managing end-to-end project life cycles to optimize performance Working with experienced Laravel developers on tasks including: - Code quality and peer reviews - Process improvement - Incidentresponse - Testing Work closely with a Project Manager and external developers to allocate development resource Translating business priorities and user stories into forecast timelines of development work, including More ❯
and optimise system performance using AWS CloudWatch, X-Ray, and Trusted Advisor. Ensure security and compliance via IAM policies, encryption, and cloud best practices. Support disaster recovery, backups, and incidentresponse processes. Required Qualifications: Bachelor’s degree in Computer Science, Engineering, or a related field (or equivalent experience). 2+ years of professional Python development experience. Proficiency with More ❯