SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global Security Operations Center team providing 24/7 threatdetection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range … of technologies, contribute to detection improvements, and collaborate with wider cyber teams. This role is a 9-5 position, with occasional requirement to be on on-call rota Essential Skills Solid grasp of incident response fundamentals Understanding of common attack techniques (phishing, lateral movement, DDoS, etc.) Experience with log and packet (PCAP) analysis Familiarity with Windows and/or … Linux investigations Clear and structured documentation of technical findings Desired Skills Basic scripting (e.g., Python, Bash, PowerShell) Experience creating SIEM rules or detection logic Exposure to cloud environments and related attack vectors Knowledge of threat hunting methods and MITRE ATT&CK Interest or experience in cross-functional collaboration (e.g., Threat Intel, Red Teams More ❯
london (city of london), south east england, united kingdom
McGregor Boyall
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global Security Operations Center team providing 24/7 threatdetection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range … of technologies, contribute to detection improvements, and collaborate with wider cyber teams. This role is a 9-5 position, with occasional requirement to be on on-call rota Essential Skills Solid grasp of incident response fundamentals Understanding of common attack techniques (phishing, lateral movement, DDoS, etc.) Experience with log and packet (PCAP) analysis Familiarity with Windows and/or … Linux investigations Clear and structured documentation of technical findings Desired Skills Basic scripting (e.g., Python, Bash, PowerShell) Experience creating SIEM rules or detection logic Exposure to cloud environments and related attack vectors Knowledge of threat hunting methods and MITRE ATT&CK Interest or experience in cross-functional collaboration (e.g., Threat Intel, Red Teams More ❯
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global Security Operations Center team providing 24/7 threatdetection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range … of technologies, contribute to detection improvements, and collaborate with wider cyber teams. This role is a 9-5 position, with occasional requirement to be on on-call rota Essential Skills Solid grasp of incident response fundamentals Understanding of common attack techniques (phishing, lateral movement, DDoS, etc.) Experience with log and packet (PCAP) analysis Familiarity with Windows and/or … Linux investigations Clear and structured documentation of technical findings Desired Skills Basic scripting (e.g., Python, Bash, PowerShell) Experience creating SIEM rules or detection logic Exposure to cloud environments and related attack vectors Knowledge of threat hunting methods and MITRE ATT&CK Interest or experience in cross-functional collaboration (e.g., Threat Intel, Red Teams More ❯
Management (IAM), VPC security, and encryption techniques Experience with network defense, vulnerability management, and incident response Familiarity with DevSecOps and integrating security within CI/CD pipelines Knowledge of threatdetection, risk assessment, and security audit processes Excellent analytical, problem-solving, and communication skills Preferred Skills: AWS Certified Security – Specialty or AWS Certified Solutions Architect Checkpoint Certified Security More ❯
gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusion detection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threatdetectionMore ❯
london (city of london), south east england, united kingdom
AirSearch
gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusion detection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threatdetectionMore ❯
gathering through to procurement, budgeting, vendor management , and security assessments . Security, Compliance & Governance Partner with Information Security teams to enhance network security posture , addressing vulnerabilities and implementing intrusion detection/prevention systems. Ensure ongoing compliance with ISO 27001, PCI-DSS , and other relevant regulatory standards. Drive a proactive approach to incident response, monitoring, and continuous threatdetectionMore ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
technical contract, it's a mission-critical role at the heart of our cyber security strategy. As Operational Security Manager, you'll take ownership of our security operations, overseeing threat intelligence, vulnerability management, incident response and the performance of our outsourced 24/7 SOC. You'll work closely with internal technology teams to embed security into every aspect … a seasoned security professional with hands-on experience across SIEM, SOC, Azure, Microsoft 365 and enterprise network environments. You've led incident response, managed third-party suppliers and implemented threatdetection strategies in hybrid organisations. Certifications such as CISSP, CEH, CREST or GIAC CIH are part of your toolkit, and your technical depth is matched by your ability More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment
technical contract, it's a mission-critical role at the heart of our cyber security strategy. As Operational Security Manager, you'll take ownership of our security operations, overseeing threat intelligence, vulnerability management, incident response and the performance of our outsourced 24/7 SOC. You'll work closely with internal technology teams to embed security into every aspect … a seasoned security professional with hands-on experience across SIEM, SOC, Azure, Microsoft 365 and enterprise network environments. You've led incident response, managed third-party suppliers and implemented threatdetection strategies in hybrid organisations. Certifications such as CISSP, CEH, Crest or GIAC CIH are part of your toolkit, and your technical depth is matched by your ability More ❯
inconsistencies. Facilitate smooth transitions across IT and OT environments, including hypercare and process adaptations. Investigate and resolve IAM security incidents, access anomalies, and authentication issues. Review and monitor Identity ThreatDetection & Response (ITDR) systems. Collaborate with SOC teams to detect privileged account misuse and insider threats. Identity & Access Management (IAM): Design, implement, and maintain IAM solutions leveraging Active … integration. Privileged Access Management: CyberArk - Vault administration, credential rotation, JIT access, session monitoring, compliance reporting. Security & Compliance: CAF, eCAF, NIST frameworks; IAM controls for critical infrastructure; incident response and threat detection. Preferred Certifications: Microsoft Certified: Identity and Access Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified Identity and More ❯
london, south east england, united kingdom Hybrid / WFH Options
TalentHawk
inconsistencies. Facilitate smooth transitions across IT and OT environments, including hypercare and process adaptations. Investigate and resolve IAM security incidents, access anomalies, and authentication issues. Review and monitor Identity ThreatDetection & Response (ITDR) systems. Collaborate with SOC teams to detect privileged account misuse and insider threats. Identity & Access Management (IAM): Design, implement, and maintain IAM solutions leveraging Active … integration. Privileged Access Management: CyberArk – Vault administration, credential rotation, JIT access, session monitoring, compliance reporting. Security & Compliance: CAF, eCAF, NIST frameworks; IAM controls for critical infrastructure; incident response and threat detection. Preferred Certifications: Microsoft Certified: Identity and Access Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified Identity and More ❯
slough, south east england, united kingdom Hybrid / WFH Options
TalentHawk
inconsistencies. Facilitate smooth transitions across IT and OT environments, including hypercare and process adaptations. Investigate and resolve IAM security incidents, access anomalies, and authentication issues. Review and monitor Identity ThreatDetection & Response (ITDR) systems. Collaborate with SOC teams to detect privileged account misuse and insider threats. Identity & Access Management (IAM): Design, implement, and maintain IAM solutions leveraging Active … integration. Privileged Access Management: CyberArk – Vault administration, credential rotation, JIT access, session monitoring, compliance reporting. Security & Compliance: CAF, eCAF, NIST frameworks; IAM controls for critical infrastructure; incident response and threat detection. Preferred Certifications: Microsoft Certified: Identity and Access Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified Identity and More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
TalentHawk
inconsistencies. Facilitate smooth transitions across IT and OT environments, including hypercare and process adaptations. Investigate and resolve IAM security incidents, access anomalies, and authentication issues. Review and monitor Identity ThreatDetection & Response (ITDR) systems. Collaborate with SOC teams to detect privileged account misuse and insider threats. Identity & Access Management (IAM): Design, implement, and maintain IAM solutions leveraging Active … integration. Privileged Access Management: CyberArk – Vault administration, credential rotation, JIT access, session monitoring, compliance reporting. Security & Compliance: CAF, eCAF, NIST frameworks; IAM controls for critical infrastructure; incident response and threat detection. Preferred Certifications: Microsoft Certified: Identity and Access Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified Identity and More ❯
end users, our mission is to enable secure cloud and end user services guided by our Zero Trust Security Model. Our teams specialise in Identity Verification, Managed Endpoints, ThreatDetection, Secure Remote Access, and Adaptive Security Policies, balancing exceptional user experience with enterprise grade security. We operate under an ISO/IEC 27001 certified ISMS and an ITIL … Terraform, Azure CLI, and PowerShell. Contribute to CI/CD integration for infrastructure as code. Ensure compliance with ISO27001 standards and Zero Trust principles. Manage firewalls, access controls, and threat detection. Maintain accurate documentation and mentor junior engineers. This role gives you the opportunity to deliver secure, modern cloud infrastructure on projects with national impact. What We’re Looking More ❯
london (city of london), south east england, united kingdom
Zero Plus Ltd
end users, our mission is to enable secure cloud and end user services guided by our Zero Trust Security Model. Our teams specialise in Identity Verification, Managed Endpoints, ThreatDetection, Secure Remote Access, and Adaptive Security Policies, balancing exceptional user experience with enterprise grade security. We operate under an ISO/IEC 27001 certified ISMS and an ITIL … Terraform, Azure CLI, and PowerShell. Contribute to CI/CD integration for infrastructure as code. Ensure compliance with ISO27001 standards and Zero Trust principles. Manage firewalls, access controls, and threat detection. Maintain accurate documentation and mentor junior engineers. This role gives you the opportunity to deliver secure, modern cloud infrastructure on projects with national impact. What We’re Looking More ❯
end users, our mission is to enable secure cloud and end user services guided by our Zero Trust Security Model. Our teams specialise in Identity Verification, Managed Endpoints, ThreatDetection, Secure Remote Access, and Adaptive Security Policies, balancing exceptional user experience with enterprise grade security. We operate under an ISO/IEC 27001 certified ISMS and an ITIL … Terraform, Azure CLI, and PowerShell. Contribute to CI/CD integration for infrastructure as code. Ensure compliance with ISO27001 standards and Zero Trust principles. Manage firewalls, access controls, and threat detection. Maintain accurate documentation and mentor junior engineers. This role gives you the opportunity to deliver secure, modern cloud infrastructure on projects with national impact. What We’re Looking More ❯
Analysing, prioritising, and escalating potential threats to keep clients secure. Responding rapidly to incidents and maintaining vigilance across multiple environments. Collaborating closely with your SOC teammates to ensure seamless threatdetection and incident response. 🧠 What You’ll Bring A genuine passion for cybersecurity and the drive to grow in the field. Relevant certifications such as CompTIA Security+ or More ❯
Analysing, prioritising, and escalating potential threats to keep clients secure. Responding rapidly to incidents and maintaining vigilance across multiple environments. Collaborating closely with your SOC teammates to ensure seamless threatdetection and incident response. 🧠 What You’ll Bring A genuine passion for cybersecurity and the drive to grow in the field. Relevant certifications such as CompTIA Security+ or More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ryder Reid Legal Ltd
and platforms Maintain and enhance the ISO 27001-aligned Information Security Management System (ISMS) Ensure compliance with frameworks including CIS Controls, NIST, ISO 27701, and GDPR Oversee incident response, threatdetection, and access governance across systems such as iManage, Intapp, Aderant, Microsoft 365, and Azure Drive firm-wide security awareness and training initiatives Monitor regulatory changes and emerging More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Ryder Reid Legal
and platforms Maintain and enhance the ISO 27001-aligned Information Security Management System (ISMS) Ensure compliance with frameworks including CIS Controls, NIST, ISO 27701, and GDPR Oversee incident response, threatdetection, and access governance across systems such as iManage, Intapp, Aderant, Microsoft 365, and Azure Drive firm-wide security awareness and training initiatives Monitor regulatory changes and emerging More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Ryder Reid Legal
and platforms Maintain and enhance the ISO 27001-aligned Information Security Management System (ISMS) Ensure compliance with frameworks including CIS Controls, NIST, ISO 27701, and GDPR Oversee incident response, threatdetection, and access governance across systems such as iManage, Intapp, Aderant, Microsoft 365, and Azure Drive firm-wide security awareness and training initiatives Monitor regulatory changes and emerging More ❯
equivalent) required Hands-on knowledge of ISO27001 and supporting an ISMS (audit experience useful but not central) Familiarity with security tools: Azure security, cloud IAM, Defender, web proxy, endpoint detection (CrowdStrike or equivalents) Understanding of zero trust networks, SSO, and network segregation principles Strong communicator: able to advise IT teams on practical security steps, not just theory Experience mentoring … Azure (and AWS) – IAM, monitoring, encryption Defender, web proxy, CrowdStrike-equivalent – Endpoint & email protection Panorays – Third-party risk Protecht – Enterprise risk & audit management Rapid7/Armis – Vulnerability management and threatdetection Why this role? Hands-on, high-impact role in a dynamic SME environment Influence across security operations, governance, and data management Work alongside experienced InfoSec leadership in More ❯
london (city of london), south east england, united kingdom
Prism Digital
equivalent) required Hands-on knowledge of ISO27001 and supporting an ISMS (audit experience useful but not central) Familiarity with security tools: Azure security, cloud IAM, Defender, web proxy, endpoint detection (CrowdStrike or equivalents) Understanding of zero trust networks, SSO, and network segregation principles Strong communicator: able to advise IT teams on practical security steps, not just theory Experience mentoring … Azure (and AWS) – IAM, monitoring, encryption Defender, web proxy, CrowdStrike-equivalent – Endpoint & email protection Panorays – Third-party risk Protecht – Enterprise risk & audit management Rapid7/Armis – Vulnerability management and threatdetection Why this role? Hands-on, high-impact role in a dynamic SME environment Influence across security operations, governance, and data management Work alongside experienced InfoSec leadership in More ❯