through operational leadership and capabilities. We’re looking for a Level 3 SOC Analyst to join our client's team, offering expertise in security analysis and incident response to help drive the success of their Cyber Security Operations Center (CSOC). In this role, you will investigate and validate … Advanced Incident Response: Handle escalated security incidents that L1 and L2 analysts cannot resolve, such as sophisticated malware infections, APTs, and complex intrusions. Lead forensicanalysis and threat hunting efforts to ensure rapid containment and recovery. Security Analysis and Root Cause Analysis: Conduct detailed analysis of security events to address current cyber threats. Participate in or lead security event analysis activities. Security Reporting and Advisories: Contribute to or lead the delivery of cyber security reports and advisories to key stakeholders. Residual Risk Assessment: Deliver post-incident analysis, technical lessons learned, and reporting More ❯
Rugby, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Hays
within the organisation's digital infrastructure. Your responsibilities will include conducting comprehensive investigations into cyber incidents and data anomalies, analysing digital media, and performing forensicanalysis following best practices and procedures. You will play a significant role in developing and implementing strategies for effective detection and response to … including risk scoring and key indicators, and ensure adherence to response escalation processes and investigative protocols. Your profile Knowledge and experience of cyber intelligence, forensicanalysis, and data analytics Knowledge and experience with digital forensic tools and techniques Knowledge and experience conducting cyber investigations and potential threats More ❯
recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensicanalysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of … threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues More ❯
threat hunting, identifying sophisticated attack vectors and emerging threat patterns. Develop and refine incident response playbooks, integrating threat intelligence and proactive defense strategies.Conduct deep forensicanalysis and root cause investigations for high-severity incidents to prevent recurrence. Provide mentorship and guidance to junior analysts, promoting best practices in … accuracy. Contribute to red/blue team exercises to validate security controls and improve SOC readiness. Support compliance and audit activities by providing expert analysis and reporting. Skills/Must Have: 4+ years of experience in a SOC, incident response, or cybersecurity operations role. Extensive experience with SIEM tools More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & ForensicAnalysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance … by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting - Familiarity with scripting languages (such More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & ForensicAnalysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance … by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting - Familiarity with scripting languages (such More ❯
in a leadership position . Strong understanding of SIEM, SOAR, EDR, IDS/IPS, and firewall technologies. Experience in incident response, threat intelligence, and forensicanalysis . Proficiency in security frameworks like MITRE ATT&CK, NIST, ISO 27001, and CIS . Background in an MSP or MSSP environment More ❯
Portsmouth, yorkshire and the humber, united kingdom
Franklin Fitch
in a leadership position . Strong understanding of SIEM, SOAR, EDR, IDS/IPS, and firewall technologies. Experience in incident response, threat intelligence, and forensicanalysis . Proficiency in security frameworks like MITRE ATT&CK, NIST, ISO 27001, and CIS . Background in an MSP or MSSP environment More ❯
detection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents, conduct forensicanalysis, and apply swift mitigation actions. Stay current on security technologies and trends to enhance system protection. Design disaster recovery plans and coordinate More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
from top-tier training and certifications. Key Responsibilities of an Incident Response Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensicanalysis of compromised systems, memory dumps, and network data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with More ❯
Leigh, Greater Manchester, United Kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
from top-tier training and certifications. Key Responsibilities of an Incident Response Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensicanalysis of compromised systems, memory dumps, and network data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with More ❯
Altrincham, Greater Manchester, United Kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
from top-tier training and certifications. Key Responsibilities of an Incident Response Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensicanalysis of compromised systems, memory dumps, and network data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with More ❯
Bolton, Greater Manchester, United Kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
from top-tier training and certifications. Key Responsibilities of an Incident Response Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensicanalysis of compromised systems, memory dumps, and network data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
from top-tier training and certifications. Key Responsibilities of an Incident Response Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensicanalysis of compromised systems, memory dumps, and network data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with More ❯
london, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
from top-tier training and certifications. Key Responsibilities of an Incident Response Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensicanalysis of compromised systems, memory dumps, and network data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
from top-tier training and certifications. Key Responsibilities of an Incident Response Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensicanalysis of compromised systems, memory dumps, and network data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with More ❯
Ashton-Under-Lyne, Greater Manchester, United Kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
from top-tier training and certifications. Key Responsibilities of an Incident Response Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensicanalysis of compromised systems, memory dumps, and network data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with More ❯
london (west end), south east england, united kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
from top-tier training and certifications. Key Responsibilities of an Incident Response Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensicanalysis of compromised systems, memory dumps, and network data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with More ❯
with current full time work rights for the United Kingdom, currently residing in the UK. What will you be responsible for? Management of vulnerabilities Analysis and development of security requirements, including their design and implementation Conduct forensicanalysis and post-mortem reviews of security incidents Assist in More ❯
Brighton, England, United Kingdom Hybrid / WFH Options
X4 Technology
SDN/SDA environments and virtualised infrastructure (e.g., VMware, Hyper-V, UCS, QNAP) Awareness of the security incident lifecycle, including threat detection, response, and forensicanalysis If this position is of interest, please send an updated CV through and I will call you to discuss in more detail. More ❯
operational customer staff in implementing and maintaining security operations for ICS equipment and networks Security Analyst work, Tier 1, Tier 2 and Tier 3 analysis Write procedures and playbooks Maintain and improve the internal tool-landscape Collaborate within a distributed team, share knowledge as a daily routine Analyzing cyber … expert to provide insight and guidance to colleagues engaging in prevention measures. Conducting research regarding the latest methods, tools, and trends in digital forensics analysis Creating thorough reports and documentation of all incidents and procedures; presenting findings to team and leadership on a routine basis Preparation, review, and maintenance … technologies such as firewall logs, IDS, endpoint security solutions, NIDS, access control systems, and other related security technologies within ICS environments Capability in performing analysis on systems and evaluating situations for incident response, forensics, threat hunting, and data analysis GIAC certificates, examples: FOR500, FOR508, FOR572 or similar Programming More ❯
operational customer staff in implementing and maintaining security operations for ICS equipment and networks Security Analyst work, Tier 1, Tier 2 and Tier 3 analysis Write procedures and playbooks Maintain and improve the internal tool-landscape Collaborate within a distributed team, share knowledge as a daily routine Analyzing cyber … expert to provide insight and guidance to colleagues engaging in prevention measures. Conducting research regarding the latest methods, tools, and trends in digital forensics analysis Creating thorough reports and documentation of all incidents and procedures; presenting findings to team and leadership on a routine basis Preparation, review, and maintenance … technologies such as firewall logs, IDS, endpoint security solutions, NIDS, access control systems, and other related security technologies within ICS environments Capability in performing analysis on systems and evaluating situations for incident response, forensics, threat hunting, and data analysis GIAC certificates, examples: FOR500, FOR508, FOR572 or similar Programming More ❯
operational customer staff in implementing and maintaining security operations for ICS equipment and networks Security Analyst work, Tier 1, Tier 2 and Tier 3 analysis Write procedures and playbooks Maintain and improve the internal tool-landscape Collaborate within a distributed team, share knowledge as a daily routine Analyzing cyber … expert to provide insight and guidance to colleagues engaging in prevention measures. Conducting research regarding the latest methods, tools, and trends in digital forensics analysis Creating thorough reports and documentation of all incidents and procedures; presenting findings to team and leadership on a routine basis Preparation, review, and maintenance … technologies such as firewall logs, IDS, endpoint security solutions, NIDS, access control systems, and other related security technologies within ICS environments Capability in performing analysis on systems and evaluating situations for incident response, forensics, threat hunting, and data analysis GIAC certificates, examples: FOR500, FOR508, FOR572 or similar Programming More ❯