SOC Analysts while performing advanced investigations and, when required, first-line triage to maintain queue health and SLA compliance. You are responsible for high-quality service delivery through detailed analysis, evidence-led response actions, and operational leadership. In addition to handling escalated alerts, you provide line management, oversee ticket quality, contribute to training and onboarding, and drive continual improvement. … Customer Communications - You provide timely incident updates and lead bridging calls with customers during high-priority incidents, ensuring that communications are clear, evidence-led, and aligned to customer expectations. • Threat Hunting Oversight - You lead and coordinate proactive threat hunting across customer environments, using hypothesis-based approaches to identify undetected threats and validate detection coverage. Essential Duties • Advanced Investigation … all available tooling. o Reconstruct attack chains and identify root causes using MITRE ATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and ThreatAnalysis o Investigate indicators of compromise using commercial and open-source threat intelligence. o Validate alerts and determine their relevance to customer environments, providing context on adversary More ❯
SOC Analysts while performing advanced investigations and, when required, first-line triage to maintain queue health and SLA compliance. You are responsible for high-quality service delivery through detailed analysis, evidence-led response actions, and operational leadership. In addition to handling escalated alerts, you provide line management, oversee ticket quality, contribute to training and onboarding, and drive continual improvement. … Customer Communications - You provide timely incident updates and lead bridging calls with customers during high-priority incidents, ensuring that communications are clear, evidence-led, and aligned to customer expectations. • Threat Hunting Oversight - You lead and coordinate proactive threat hunting across customer environments, using hypothesis-based approaches to identify undetected threats and validate detection coverage. Essential Duties • Advanced Investigation … all available tooling. o Reconstruct attack chains and identify root causes using MITRE ATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and ThreatAnalysis o Investigate indicators of compromise using commercial and open-source threat intelligence. o Validate alerts and determine their relevance to customer environments, providing context on adversary More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
investigations Reviewing, tuning and enhancing detection rules, alerts and playbooks in SIEM/SOAR tools Providing mentorship and technical guidance to SOC analysts Driving post-incident reviews, root cause analysis and continuous improvement Conducting proactive threat hunting and supporting compliance/audit requirements Collaborating with wider IT/security teams to improve detection and response capability What you … ll bring 3+ years' experience in a SOC or security operations role Strong knowledge of incident detection, response and threatanalysis Hands-on experience with SIEM, SOAR and endpoint detection tools Excellent problem-solving, analytical and communication skills A degree in a relevant subject or equivalent experience Relevant certifications such as GCIA, GCIH, CEH or CompTIA CySA+ (desirable More ❯
IT Consultancy delivering digital transformation to Defence and National Security end clients. Overview: The PKI Engineer will be responsible for applying security best practices and industry standards derived from threatanalysis to implement PKI technology according to Design requirements. The position requires strong theoretical knowledge as well as industry experience in applying advanced cryptography schemes to secure complex More ❯
s Cyber Incident Response Plan (CIRP) and Security Strategy. You will also work on and be actively involved with the development, implementation and maintenance of cyber security policies, controls, threatanalysis, testing, assessments, auditing, reporting, detailed documentation, training, and other security activities. You'll be promoting cyber security awareness, good practice and compliance amidst end users, Trust service More ❯
NG1, Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Rebel Recruitment Limited
someone who loves to automate mundane tasks, make scalable, highly available, and robust solutions, and making sure whatever you’re working on is secure, through things like vulnerability scanning, threatanalysis, and patching, is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around with the latest More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Anson Mccade
security. What you'll do: • Own EW requirements and system design for key elements of advanced weapon systems • Lead system integration, RF design, and validation across complex programmes • Perform threatanalysis, capability assessments, and operational modelling • Collaborate with internal teams, suppliers, and customers to deliver robust, high-performance solutions Skills & Experience: • Strong systems engineering background across the full More ❯
Bolton, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Anson Mccade
security. What you'll do: • Own EW requirements and system design for key elements of advanced weapon systems • Lead system integration, RF design, and validation across complex programmes • Perform threatanalysis, capability assessments, and operational modelling • Collaborate with internal teams, suppliers, and customers to deliver robust, high-performance solutions Skills & Experience: • Strong systems engineering background across the full More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Bright Purple Resourcing
and confidence to influence both technical and strategic decisions. We are looking for someone with: At least 5 years experience in cybersecurity, with a focus on vulnerability management and threatanalysis Proven hands-on experience with Tenable.io, Tenable.sc, and Nessus Strong understanding of operating systems, networking, cloud platforms and containers The ability to interpret CVEs and CVSS scores More ❯
edinburgh, central scotland, united kingdom Hybrid / WFH Options
Resourcing Group
and confidence to influence both technical and strategic decisions. We are looking for someone with: At least 5 years experience in cybersecurity, with a focus on vulnerability management and threatanalysis Proven hands-on experience with Tenable.io, Tenable.sc, and Nessus Strong understanding of operating systems, networking, cloud platforms and containers The ability to interpret CVEs and CVSS scores More ❯
broughton, central scotland, united kingdom Hybrid / WFH Options
Resourcing Group
and confidence to influence both technical and strategic decisions. We are looking for someone with: At least 5 years experience in cybersecurity, with a focus on vulnerability management and threatanalysis Proven hands-on experience with Tenable.io, Tenable.sc, and Nessus Strong understanding of operating systems, networking, cloud platforms and containers The ability to interpret CVEs and CVSS scores More ❯
livingston, central scotland, united kingdom Hybrid / WFH Options
Resourcing Group
and confidence to influence both technical and strategic decisions. We are looking for someone with: At least 5 years experience in cybersecurity, with a focus on vulnerability management and threatanalysis Proven hands-on experience with Tenable.io, Tenable.sc, and Nessus Strong understanding of operating systems, networking, cloud platforms and containers The ability to interpret CVEs and CVSS scores More ❯
dunfermline, north east scotland, united kingdom Hybrid / WFH Options
Resourcing Group
and confidence to influence both technical and strategic decisions. We are looking for someone with: At least 5 years experience in cybersecurity, with a focus on vulnerability management and threatanalysis Proven hands-on experience with Tenable.io, Tenable.sc, and Nessus Strong understanding of operating systems, networking, cloud platforms and containers The ability to interpret CVEs and CVSS scores More ❯