Job Summary: The Senior Incident Response Analyst will play a critical role in our SecurityOperations Center (SOC) by leading the detection, analysis, and response to cybersecurity incidents. This individual will be responsible for monitoring security events, conducting in-depth investigations, and implementing advanced threat detection techniques. The ideal candidate will have extensive experience in cybersecurity … the ability to mentor junior analysts. The role requires a willingness to work on shifts, including one weekend a month during predominantly sociable hours. Key Responsibilities: Monitor and analyze security events from various sources. Conduct in-depth investigations of security events to determine root cause, potential impact, and mitigation steps. Collaborate with other IT and security teams … to improve overall security posture. Create and maintain detailed documentation of incidents, investigations, and response actions. Provide mentorship and guidance to junior SOC analysts. Stay current with emerging threats, vulnerabilities, and industry best practices. Participate in the development and refinement of SOC processes and procedures. Engage in threat hunting activities and rule writing/detection engineering as encouraged. Qualifications More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Limited
role is hybrid/office based specify location: Manchester, UK Duration of assignment: 6 months contract InsideIR35 Role Description: We are seeking a highly skilled and experienced SOC L3 Analyst with strong engineering knowledge and deep expertise in Microsoft Sentinel and the Microsoft Defender suite. The ideal candidate will take a lead role in advanced threat detection, incident response … detection engineering, and security monitoring, while also optimizing license consumption and SIEM integration efforts. 5+ years in cybersecurity with 2+ years in a Level 3 SOC role Key Responsibilities: Advanced Threat Detection & Incident Response - Investigate and analyze complex security incidents escalated from L1/L2 SOC analysts. - Leverage Microsoft Sentinel (SIEM) and Microsoft Defender XDR to conduct in … using KQL within Microsoft Sentinel. - Develop and fine-tune custom analytics rules, workbooks, and hunting queries. - Apply the MITRE ATT&CK framework to build coverage and improve threat visibility. Security Engineering & Platform Management - Onboard and integrate new data sources into Microsoft Sentinel, ensuring accurate log ingestion and parsing. - Build and manage data connectors, custom log parsers, and normalization schemas. More ❯
Role Purpose We are seeking an enthusiastic and driven Tier 1 SecurityOperations Centre (SOC) Analyst to join our SecurityOperations Centre. In this frontline role, you’ll support the detection, triage, and escalation of security incidents, helping to protect our organisation and customers from evolving cyber threats. You'll monitor security alerts … This is an excellent opportunity for someone early in their cybersecurity career to gain hands-on experience, grow their skills, and be part of a collaborative and high-performing security team. Role Responsibilities Key responsibilities for this role may include: Incident Detection & Response: Monitor security events and alerts using SIEM (Security Information and Event Management) and other … security tools to identify potential security threats and incidents. Conduct initial triage, analysis, and categorisation of security incidents based on severity and impact. Escalate complex or high-impact incidents to senior SOC analysts or other IT/security teams as required Assist with containment and remediation efforts, ensuring incident response actions are carried out promptly and More ❯
SecurityOperations Center (SOC) Analyst Sprytech Ltd is an established cyber security and emerging technology company based in London, UK, founded by experienced technocrats having many years of industry experience across the globe. Sprytech has started an India office based in Mumbai and is working to establish an AI/ML driven cybersecurity and digital threat … analytics centre to enhance the security of industry and government organisations. We at Sprytech, as cyber security industry experts, work collaboratively with universities and provide internships to MSc students. We are looking for a SOC Analyst to join our team to work on the newly set up SOC operations. Application Process Interested candidates are invited to submit … include examples of previous work, such as GitHub repositories or published papers, if applicable. Last date of application: 30th June 2024 Start Date: 1st August 2024 Job Description A SecurityOperations Center (SOC) Analyst plays a critical role in protecting an organization’s information systems by detecting, analyzing, and responding to cybersecurity threats. The job description for More ❯
SOC Analyst Dundee - Hybrid Competitive salary & benefits We are Systal: a global managed network, cloud and security transformation specialist. We provide complex and strategic technology services for enterprise businesses, managing 200,000+ assets across 93 countries. These services help our customers achieve strategic technology transformation and maximise the business value, security and innovative potential of their IT … infrastructure. We are seeking enthusiastic, dedicated and detail-oriented Level 1 SOC Analyst to join our UK based SecurityOperations Centre (SOC). The successful candidate will be responsible for the initial analysis and triage of security alerts, monitoring security systems, and supporting the development of security event investigation and analysis within a large … Organisational Environment. This role is critical in identifying and responding to security incidents to protect our customers information assets. What will you be doing? •Monitor Security Information & Event Management (SIEM) Tools: Continuously monitor SIEM tools to pro-actively engage with and investigate potential security incidents. •Incident Identification and Triage: Identify, analyse, and prioritize security incidents, escalating More ❯
SOC Analyst Dundee - Hybrid Competitive salary & benefits We are Systal: a global managed network, cloud and security transformation specialist. We provide complex and strategic technology services for enterprise businesses, managing 200,000+ assets across 93 countries. These services help our customers achieve strategic technology transformation and maximise the business value, security and innovative potential of their IT … infrastructure. We are seeking enthusiastic, dedicated and detail-oriented Level 1 SOC Analyst to join our UK based SecurityOperations Centre (SOC). The successful candidate will be responsible for the initial analysis and triage of security alerts, monitoring security systems, and supporting the development of security event investigation and analysis within a large … Organisational Environment. This role is critical in identifying and responding to security incidents to protect our customers information assets. What will you be doing? •Monitor Security Information & Event Management (SIEM) Tools: Continuously monitor SIEM tools to pro-actively engage with and investigate potential security incidents. •Incident Identification and Triage: Identify, analyse, and prioritize security incidents, escalating More ❯
We are seeking a highly motivated and detail-oriented SOC Analyst to join our SecurityOperations Center team. The SOC Analyst will be responsible for monitoring, analyzing, and responding to cybersecurity incidents and threats. The ideal candidate will have experience with security monitoring tools, threat analysis, and incident response. Key Responsibilities: Monitor and analyze security … events and alerts from various sources (SIEM, IDS/IPS, firewall, antivirus, etc.). Perform initial triage and classification of incidents based on defined procedures. Investigate and escalate potential security incidents as needed. Maintain accurate documentation of incidents, investigations, and findings. Collaborate with IT and security teams to coordinate response and resolution. Conduct threat hunting to proactively detect … malicious activity. Maintain and improve SOC procedures and playbooks. Stay current on cybersecurity trends, threats, and vulnerabilities. Participate in regular security audits and assessments. Assist in developing and maintaining security monitoring rules and use cases. Qualifications: Education: Bachelors degree in Computer Science, Information Security, or related field (or equivalent work experience). Experience: 13 years of experience More ❯
Open: June 16, 2025 Deadline: June 22, 2025 Non-Union Department Name SW LDG SecurityOperations The Cyber SecurityAnalyst position responsible for senior support of critical cybersecurity technologies and processes across the South West Local Delivery Group (LDG). This mid-level position requires hands-on experience in threat detection, incident response, and security monitoring. The ideal candidate will have proven expertise in security tools and technologies, with the ability to work independently while collaborating effectively with cross-functional teams. Key Responsibilities: Use knowledge of security tools (EDR/XDR, SIEM, VM, etc.) to conduct detailed investigations. Coordinate and lead incident response activities, including detection, investigation, containment, eradication, and recovery in … coordination with external stakeholders (HSP(s), Managed Security Service Providers (MSSPs), Ontario Health, Canadian Centre for Cyber Security and law enforcement). Conduct root cause analysis and post-incident activities. Maintain documentation of incidents, investigations, and response actions. Conduct Threat Hunting activities to proactively identify incidents warranting action to disrupt and remediate threats. Conduct vulnerability assessments and support More ❯
Direct message the job poster from Walsh Employment Director | Technology Recruitment Partner.Delivering strategic hiring solutions for companies seeking top technology talent. Senior SecurityOperations Centre Analyst Location: Gosport Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work all applicants will be required to gain UK Security … with the option to purchase additional days), health cash plan, life assurance, pension scheme, and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOC Analyst who brings a strong background in securityoperations , threat detection, and incident response. This is a critical role that supports the defence of national infrastructure through proactive … monitoring, analysis, and improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in a SecurityOperations Centre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att More ❯
Windsor, England, United Kingdom Hybrid / WFH Options
Women in Tech UK
Join Centrica's IT Security Team as Global SecurityOperations Centre Analyst! Are you ready to drive the UK's energy transformation? Centrica is seeking a dedicated and skilled Global SecurityOperations Centre (GSOC) Analyst to join our IT Security team. In this critical role, you will be responsible for maintaining and … enhancing the security posture of our organisation. You will monitor, detect, and respond to security incidents, and develop measures to protect our systems and data. Location: Hybrid working with occasional travel to office Key Responsibilities: Incident Detection and Response: Monitor alerts, investigate incidents, and follow response processes. Detection Engineering: Develop detection rules and maintain playbooks. Automation and Scripting … and PowerShell. Threat Hunting: Identify and mitigate potential threats. Collaboration: Work with other cyber defence teams and communicate findings. Continuous Improvement: Suggest and document process improvements. Monitoring: Provide continuous security console monitoring. Technical Analysis: Analyse incident telemetry and investigation pathways. Intelligence Integration: Support investigations with relevant intelligence. Incident Documentation: Record actions and secure data. Reporting: Generate and present technical More ❯
As Junior SecurityOperationsAnalyst for this leading provider of innovative solutions in the communications industry, you will be responsible for supporting the securityoperations center (SOC) in monitoring, detecting, and responding to security threats and incidents. You will work closely with senior analysts and other IT teams to ensure the integrity, confidentiality, and … availability of information assets. Key Responsibilities: Monitor security alerts and events from various sources, including intrusion detection systems (IDS), firewalls, and SIEM (Security Information and Event Management) systems. Conduct initial analysis and triage of security incidents to determine the severity and impact. Assist in the investigation of security breaches and other cyber security incidents. Support … the implementation and management of security tools and technologies. Collaborate with IT and other departments to address security vulnerabilities and improve the overall security posture. Document and report security incidents, including the creation of incident tickets and detailed incident reports. Participate in regular security assessments and audits. Stay up-to-date with the latest securityMore ❯
London, England, United Kingdom Hybrid / WFH Options
Eutelsat Communications SA
Select how often (in days) to receive an alert: SecurityOperationsAnalyst Country/Region: GB Connect with Eutelsat Group Be part of a new era in communications, transforming connectivity with Eutelsat Group – the world’s first GEO-LEO integrated global satellite operator. As a leader in satellite communications, we provide global connectivity solutions - connecting businesses, communities … love working as a part of a lean team. You want to make a real difference in the world by revolutionizing technology in Space. What You’ll Do: The SecurityOperationsAnalyst will be focused on providing excellent 24/7 first line operational and incident response support, so our teams can provide fantastic customer experience. You … will work closely with internal customers to build and support operational resilience, monitoring and security across IT systems required to support the Eutelsat Group mission. You will also contribute to the design, build, and support of the SecurityOperations technology infrastructure. Responsibilities include: Provide effective incident management through monitoring and analysis of Security Events and Incidents More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
holiday and annual leave of analysts on Day/Night shift rotations. Compensation: Competitive Salary plus performance related bonus and shift allowance. This role will lead our approach to Security Response at Smart DCC, assisting with the toolsets, processes and capabilities required to effectively deliver a world class securityoperations Centre. Responsibilities will include leading security investigations that are initiated by managed security services (SOC) or from events generated by our security tools. You will be joining an exciting and growing area and will be instrumental in supporting and advancing the operational security capabilities of the Cyber Security Team. There will be opportunity to work on and establish new Security … as well as provide an advisory role to other elements of the business on best practice. The role will require establishing relationships with key stakeholders in Risk, Technology and Operations, as well as establishing yourself as a Subject Matter Expert (SME) for cyber security within the organisation. What will you be doing? Lead incident response for potential incidents More ❯
Local Defender/SecurityOperations Center SOC Analyst OASYS, INC., a Leading-Edge Government contractor, is seeking applicants for a Local Defender SOC Analyst position to support our Army customer at Camp Roberts in San Miguel, California. Job Responsibilities include: Supports our Army customer by providing a critical cybersecurity role through system monitoring and analysis support … for the detection of cyber incidents and provides recommendations on how to correct findings. This role combines the duties of a SecurityOperations Center (SOC) Analyst and Threat Analyst to ensure a holistic defense against emerging threats. Performs tasks in a variety of areas to include: Monitoring security logs, analyzing and reporting cyber incidents, reviewing … . Work is performed on-site with occasional on-call duties for critical incidents in a collaborative, demanding environment requiring attention to emerging threats and vulnerabilities. Monitor and analyze security events and alerts generated by SIEM platforms, firewalls, IDS/IPS, and endpoint detection tools to identify potential threats and anomalous behavior. Submits and tracks all service tickets submitted More ❯
Job Description Senior SecurityOperations Center Analyst - Permanent - 3x a week in office, Hybrid Bestman Solutions is working with a leading customer data science company to hire a senior securityoperationsanalyst to bolster its global information security team. This is a fantastic opportunity to work with a market-leading business, contribute to … cutting-edge securityoperations, and play a key role in enhancing security capabilities across global retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using Kusto Query (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation … and infrastructure-as-code initiatives. Qualifications We're looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident Response More ❯
Social network you want to login/join with: SecurityOperations Center Analyst, cambridge col-narrow-left Client: Location: Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 3 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: Job Title: L3 SOC Analyst One of our clients, a leading provider of managed … security services, is looking for a Level 3 SOC Analyst to join their SecurityOperations Center (SOC). This is a critical role within a growing team responsible for the advanced detection, investigation, and mitigation of complex cyber threats. As a senior member of the SOC, you will leverage your deep technical expertise to lead high … impact incident response efforts and guide the strategic direction of the organization's security posture. Responsibilities: Lead complex incident investigations, coordinating with internal and external stakeholders to resolve critical security issues. Perform advanced threat hunting, identifying sophisticated attack vectors and emerging threat patterns. Develop and refine incident response playbooks, integrating threat intelligence and proactive defense strategies.Conduct deep forensic More ❯
Job Description Senior SecurityOperations Centre Analyst Location: Gosport Security Clearance Level: Must be eligible for DV Clearance . Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the highest level. You must be a British who has been in the UK for at … with the option to purchase additional days), health cash plan, life assurance, pension scheme, and a generous flexible benefits fund Key Requirements We are seeking an experienced Senior SOC Analyst who brings a strong background in securityoperations , threat detection, and incident response. This is a critical role that supports the defence of infrastructure through proactive monitoring … analysis, and improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in a SecurityOperations Centre (SOC) environment SOC Level 2 Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
Job Description Experienced IT SOC Analyst About the Role: We are seeking an experienced and highly skilled IT SOC Analyst to join a large, complex technical environment starting in June 2025. This role requires an individual who thrives in a fast-paced setting and has substantial expertise in managing a high volume of security incidents within a … Microsoft security technical environment. This is an interesting opportunity to contribute to a high-profile project in a dynamic and challenging technical environment. You will work alongside talented professionals and make a significant impact on the organisation's security operations. Key Responsibilities: Monitor, analyse, and respond to security events and incidents within the organisation's SOC environment. … Identify, investigate, and mitigate potential security threats and vulnerabilities. Provide expert-level incident handling and contribute to continuous improvement of incident response processes. Collaborate with technical teams to enhance the organisation's overall security posture. Generate reports on security incidents, trends, and system performance for key stakeholders. Proactively recommend security enhancements and best practices specific to More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Queen Square Recruitment
Recruitment Our client, a leading global consultancy, is partnering with a prestigious end client based in Manchester. We are excited to offer a fantastic opportunity for a talented SOC Analyst - L3 to join a dynamic and agile development team on an initial 6 months contract, with the potential for extension. If you are interested and have the relevant skills … and experience, please apply promptly to discuss further. Job Title: SOC Analyst – Level 3 Location: Manchester, UK (Hybrid – minimum 3 days on-site per week) Contract Type: Contract (6 months) Day Rate: Inside IR35 (Flexible) About the Role A leading organisation is looking for an experienced SOC Analyst (Level 3) to join its cybersecurity operations team. This … role is ideal for senior professionals who thrive in high-stakes environments and enjoy working on proactive threat detection, incident response, and advanced security automation. Key Responsibilities Lead the investigation and resolution of high-severity security incidents Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite Develop and fine-tune analytic rules, detection use-cases, and More ❯
role is an onsite role at our Welwyn Garden City office and requires you to be present in the office for your shifts - (4 days on, 4 days off) Security and Batch Operations Analysts are central to driving PayPoint’s Cyber Security and IT operations, playing a key role in delivering services to our clients, retailers … and consumers across the United Kingdom. From the SecurityOperations Centre located in Welwyn Garden City, the team of analysts monitor and respond to alerts and events from across our network. The team will undertake the actions necessary to maintain our service availability and security, including triage, investigation, analysis, resolution, and escalation to third-line support teams. … those with IT backgrounds such as service desk and desktop engineers looking for a new role or path in their career. What will you be doing? Monitor IT and security events from SIEM (Security Information and Event Management) systems and other security tools to proactively detect incidents and prevent disruptions to services. Manage the lifecycle of securityMore ❯
shared sense of direction. One that’s enabling innovation, accelerating growth, and disrupting entire industries. This is what it means to #BeAProactivist. What you’ll do As a SOC Analyst you will be trained in all aspects of SIEM, using your studies, and possibly any work experience you may have, as a good foundation of knowledge to build upon. … This is an entry level position and does not require any prior experience in Security Analysis. The role includes, but is not limited to: Producing Security Analysis for Proact, and customers Looking for anomalies and patterns in events Analysing vulnerabilities in Proact’s and customer’s systems Monitoring for anomalies which could be IoC (Indicators of Compromise) Alerting … corresponding authentication failures etc. Growing your technical expertise in: Network protocols including TCP/IP fundamental Operating systems (Windows and Linux) Hosting platforms, enterprise systems and infrastructure Virtual environments Security products such as anti-virus, IDS, IPS, SIEM, APT detection, VA systems Vulnerability management (network scanning, ethical hacking, penetration testing) Malware, virus, botnet, MITRE ATT&CK framework techniques, etc. More ❯
Description: Job Title: SOC Analyst L2 Location: Melbourne, FL. Pay Rate$45/hr on w2 Job Description: Must Have- BS/BA (or equivalent) degree in IT Security or related field, and 2-4years related experience ; or 4+years related experience with 2 years post-Secondary/AA-AS degree; or 8+ years related experience with no … system logs and familiarity with log analysis. • Understanding of cyber-attack vectors (Buffer Overflow, Phishing, etc.) • Ability to obtain and maintain a FAA public trust clearance This is an operations center staff position that supports the Enterprise SecurityOperations Control Center (SOCC) L3Harris is searching for talented Information Systems Security professionals to join the L3Harris SecurityOperations Team as a Security Analyst. This is a Level 2 Information Systems Security (ISS) position that is staffed in the SecurityOperations Control Center (SOCC). Essential Functions: • Responsible for cybersecurity threat intelligence data collection via open intelligence sources. • Organizes, documents, and collaborates discovered intelligence via information sharing platform. • Research threat actors, malware More ❯
P-11 Security, based in Southern California, is a certified Economically-Disadvantaged Women-Owned Small Business (EDWOSB) with over 9 years of expertise in the security field. Specializing in Security in Depth (SiD) services, we deliver an integrated suite of 360 Security Services, Cyber Security, and Information Technology solutions, embodying our commitment to Multi-Layered … for Maximum Security. Our strategies are meticulously adapted to the unique challenges faced by the Defense Industry Base, military installations, government agencies, and educational institutions, ensuring tailored and effective security solutions. At P-11 Security, we are driven by a mission to empower our clients with comprehensive security measures that protect their operations across every layer. … unwavering commitment to excellence. Upholding values of integrity, diversity, and respect, we foster an environment where our team of seasoned professionals can thrive and contribute to the safety and security of our clients. Join us in making a significant impact in a challenging and rewarding field, where your efforts ensure stability and security for our clients' critical missions. More ❯
What You’ll Be Working On: ️ Monitoring security events and alerts in real-time using SIEM tools (e.g., Splunk, ArcSight, QRadar) ️ Analyzing and investigating potential security incidents, conducting root cause analysis ️ Coordinating with other security teams to respond to and remediate security incidents ️ Creating detailed incident reports and contributing to post-incident reviews to improve security posture ️ Assisting with vulnerability management and threat hunting activities to proactively identify and address security risks What We’re Looking For: ️ Proven experience as a SOC Analyst or in a similar role within securityoperations ️ Strong experience with SIEM tools (Splunk, QRadar, ArcSight, etc.) and incident response ️ Familiarity with common attack vectors, techniques, and mitigation More ❯
Social network you want to login/join with: Senior SecurityOperations Center Analyst, london (city of london) col-narrow-left Client: Bestman Solutions Location: london (city of london), United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 4 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide Job Description: Senior SecurityOperations Center Analyst - Permanent - Hybrid Bestman Solutions is working with a leading customer data science company to hire a senior securityoperationsanalyst to bolster its global information security team. This is a fantastic opportunity to work with a market-leading business, contribute to cutting-edge securityoperations, and play a … key role in enhancing security capabilities across global retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using Kusto Query Language (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications We're More ❯