with the ability to communicate complex technical concepts clearly and effectively to clients. Technical Expertise Hands-on experience with at least one major SIEM platform (e.g. Splunk, Sentinel or QRadar) and familiarity with cloud security tools such as AWS GuardDuty, Azure Security Center, or Google Cloud Security. Background in client-facing roles or consulting, with the ability to communicate More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
AWS, Azure, GCP), and Security Technologies (Anti-Virus, Intrusion Prevention, Web Application Firewalls) Interest in developing knowledge across common Incident Response and Security Monitoring applications such as SIEM (e.g., Qradar, Splunk), EDR (e.g., FireEye HX, CrowdStrike Falcon, Microsoft Defender), and SOAR (Palo Alto XSOAR, Google Secops/Chronicle) Desire to build technical skills and hands-on knowledge in the More ❯
activities and SOC solution demonstrations when required. What You’ll Bring 3–5 years’ experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerability management, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL More ❯
Active eDV REQUIRED Key Responsibilities Lead the design, configuration, and delivery of SIEM, SOAR, and XDR platforms (e.g., Microsoft Sentinel, IBMQRadar, CrowdStrike Falcon). Architect and deploy cloud security solutions across Azure and AWS environments. Manage and optimise vulnerability management tools (e.g., Tenable.SC, Rapid7, Qualys). Support the development and operation of Cyber Security Operations Centres (CSOCs) . More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cititec
. Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar — including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/IPS, and More ❯
. Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar — including log analysis and data correlation. Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black. Working knowledge of network security , including protocols, firewalls, IDS/IPS, and More ❯
detection engineering roles Solid understanding of SIEM, log analytics, data normalization, and detection lifecycle management (rule creation, tuning, suppression, enrichment) Hands-on experience with XSIAM or similar platforms (Splunk, QRadar, Sentinel, etc.) is a strong plus Strong technical writing and communication skills, with the ability to convey complex ideas clearly to both technical and non-technical audiences Skilled in More ❯
detection engineering roles Solid understanding of SIEM, log analytics, data normalization, and detection lifecycle management (rule creation, tuning, suppression, enrichment) Hands-on experience with XSIAM or similar platforms (Splunk, QRadar, Sentinel, etc.) is a strong plus Strong technical writing and communication skills, with the ability to convey complex ideas clearly to both technical and non-technical audiences Skilled in More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Sanderson
operating systems (Windows, Linux, macOS), and common enterprise applications. Expertise in analysing network traffic (e.g., packet analysis with Wireshark). Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Sanderson
operating systems (Windows, Linux, macOS), and common enterprise applications. Expertise in analysing network traffic (e.g., packet analysis with Wireshark). Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Catorfaen
SOAR (Security orchestration, automation, and response) solutions toachieve positive outcomes. Our tools include Google ChronicleSIEM/Siemplify SOAR and LogRhythm, but experience with other platformssuch as Microsoft Sentinel, Splunk, Qradar, or Humio/Logscale is alsovaluable. Backgroundknowledge in another IT discipline (e.g. Public Cloud, Windows Server,Linux, or Networking). Someexperience with scripting tools such as Powershell, Python, Bash More ❯
can explain findings clearly to technical and non-technical audiences. Track record of driving continuous improvement and developing others. Comfortable with any major SIEM or EDR platform (e.g. Splunk, QRadar, Sentinel, etc.). Package & Benefits Salary: Up to £90,000 (DOE) Bonus: 10–15% + 5% SiS Bonus Car Allowance: £6,000 Clearance: No existing clearance required – SC sponsorship More ❯
Experience with SOAR platforms and security automation workflows. Excellent problem-solving, stakeholder management, and collaboration skills. Team leadership or mentoring experience is highly desirable. Preferred Technologies/Tools: Splunk, QRadar, LogRhythm, Sentinel, ArcSight, Elastic, or similar SIEM tools. Familiarity with EDR, IDS/IPS, firewalls, and other security infrastructure. Exposure to both IT and OT (Operational Technology) environments. More ❯
Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers. They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting More ❯
We are constantly growing our SOC team and new opportunities in our Farnborough site. Come and join us in the Defence sector and support enterprise scale clients. We have opportunities for L1 SOC Analysts to be a part of our More ❯
SOC Analyst (L2) (SC Clearance Required) – Multiple UK Locations (Shift Work) - £55,000 - £58,000 – Permanent Are you passionate about cybersecurity and ready to make a real impact? We’re expanding our Security Operations Centre (SOC) team and looking for More ❯
SOC Analyst (L2) (SC Clearance Required) – Multiple UK Locations (Shift Work) - £55,000 - £58,000 – Permanent Are you passionate about cybersecurity and ready to make a real impact? We’re expanding our Security Operations Centre (SOC) team and looking for More ❯
and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools - particularly IBMQRadar , Splunk, and Microsoft Sentinel. Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise with clients, Service Delivery Managers, and … activities and SOC solution demonstrations when required. What You'll Bring 3-5 years' experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerability management, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Edge
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Edge
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst More ❯
SOC Shift Lead (SC Clearance Required) – Multiple UK Locations (Shift Work) - £65,000 - £70,000 – Permanent Are you ready to take the lead in a fast-paced, high-impact cybersecurity environment? We’re looking for a SOC Shift Lead to More ❯
SOC Shift Lead (SC Clearance Required) – Multiple UK Locations (Shift Work) - £65,000 - £70,000 – Permanent Are you ready to take the lead in a fast-paced, high-impact cybersecurity environment? We’re looking for a SOC Shift Lead to More ❯