L2 SOCAnalyst London based (1-3 days office) £40-45k Our client are looking for a Level 2 SOC Engineer. This is a key role in the detection and response lifecycle within our SecurityOperations Centre. The role You will be responsible for triaging, investigating, and responding to cybersecurity incidents across customer environments using … Threat monitoring and detection Threat intelligence and hunting SOAR and automation Skills MS Sentinel/Defender for Endpoint Understanding Mitre Att&ck framework Required 2+ years exp in a SOC environment Experience from MSSP/MSP supporting multiple clients British Citizen SC Clearance More ❯
Junior SOCAnalyst Up to 34kHybrid (London) Overview: We are seeking an enthusiastic Junior Cyber SecurityAnalyst to join our client's dedicated SOC team. In this role, you will help monitor and defend networks, systems, and applications against evolving threats. You'll work as part of a team that provides 24/… in Computer Science, Cybersecurity, or a related field (or equivalent experience) Evidence of self-learning and continual development outside of a university degree 1+ years of experience in cybersecurity (SOC or MSSP experience preferred) is advantageous but not required. Familiarity with monitoring tools such as SIEM, IDS/IPS, EDR, and threat intelligence platforms. Basic understanding of networking, operating … to offer sponsorship for this role. In order to be considered you must have full, unrestricted right to work in the UK. Keywords: Cyber Security/Incident Response/SOC/SecurityOperationsCentre/Detect and Response/Blue Team/Junior/London Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn More ❯
Job Title: L1 SOCAnalyst Our client is a well-established Managed Security Service Provider (MSSP) and a leading Fortinet and Microsoft partner, delivering high-impact cybersecurity solutions to clients in the defense, government, and financial services industries. Committed to nurturing talent, our client offers a comprehensive training and development program to help you advance from entry … level to a fully-fledged SOC Analyst. As an L1 SOCAnalyst, you’ll be at the frontline of cybersecurity defense. You’ll handle real-time triaging of 80-100 security alerts per shift, utilizing Fortinet and Microsoft SIEM/EDR technologies to detect and mitigate threats. This is an excellent opportunity for those passionate about … alerts to identify potential threats and escalate as needed. Provide rapid response to incidents and maintain a high level of vigilance across multiple security events. Collaborate closely with the SOC team to ensure seamless threat detection and incident management. Skills/Must have: Passion for cybersecurity and a desire to grow in the field. Relevant cybersecurity certifications (e.g., CompTIA More ❯
Job Title: L1 SOCAnalyst Our client is a well-established Managed Security Service Provider (MSSP) and a leading Fortinet and Microsoft partner, delivering high-impact cybersecurity solutions to clients in the defense, government, and financial services industries. Committed to nurturing talent, our client offers a comprehensive training and development program to help you advance from entry … level to a fully-fledged SOC Analyst. As an L1 SOCAnalyst, you’ll be at the frontline of cybersecurity defense. You’ll handle real-time triaging of 80-100 security alerts per shift, utilizing Fortinet and Microsoft SIEM/EDR technologies to detect and mitigate threats. This is an excellent opportunity for those passionate about … alerts to identify potential threats and escalate as needed. Provide rapid response to incidents and maintain a high level of vigilance across multiple security events. Collaborate closely with the SOC team to ensure seamless threat detection and incident management. Skills/Must have: Passion for cybersecurity and a desire to grow in the field. Relevant cybersecurity certifications (e.g., CompTIA More ❯
Cheltenham, Gloucestershire, England, United Kingdom
Accenture
SOCAnalyst Location: Cheltenham Please Note: Due to the nature of client work you will be undertaking, you will need to be willing to go through a Security Clearance process as part of this role, which requires 5+ years UK address history at the point of application. Accenture is a leading global professional services company, providing a More ❯
Essential Roles & Responsibilities (Full job description on Claranet careers site) As a Senior SOCAnalyst (Team Leader), you apply your advanced securityoperations expertise to lead a team of SOC Analysts while performing advanced investigations and, when required, first-line triage to maintain queue health and SLA compliance. You are responsible for high-quality service delivery … when necessary, stepping into first-line triage to guarantee prompt alert handling and escalation. • Team Leadership - You provide day-to-day leadership and line management for a team of SOC Analysts, conducting performance reviews, appraisals, one-to-one meetings, and development planning. • Quality Assurance - You own QA for the team’s outputs, ensuring consistency, accuracy, and completeness of incident … documentation across the team. • Training and Onboarding - You lead knowledge-transfer sessions, support structured onboarding of new team members, and coordinate internal training to drive skill development and reinforce SOC best practices. • Continual Improvement - You identify opportunities to optimise workflows, enhance detection logic, and contribute to service-improvement initiatives across the SOC, including backlog reduction, knowledge-base expansion More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Anson McCade
SOCAnalyst (L3) - Senior Incident Responder Location: Birmingham (Hybrid) Salary: Up to £70,000 (depending on experience) + bonus NOTE: Candidates for this role must be eligible for UK Security Clearance (SC). We’re looking for a hands-on L3 Senior Incident Responder who can lead on complex security investigations, manage high-severity incidents, and bring … real expertise in Splunk and wider SIEM technologies. This is a critical role within the SOC, where you’ll be the escalation point for L1 and L2 analysts and take ownership of incident containment, remediation, and post-incident review. What you’ll do: Act as the L3 escalation point , leading investigations into complex incidents escalated by L1/L2 … to security events. Perform detailed forensic analysis, root cause analysis, and malware investigation. Lead incident response activities end-to-end, ensuring containment, eradication, and recovery. Develop, refine, and own SOC use cases, runbooks, and playbooks to drive continual service improvement. Liaise directly with clients, providing clear guidance and recommendations. Mentor and support junior SOC analysts, ensuring best practice More ❯
Cheltenham, Gloucestershire, England, United Kingdom
Accenture
Lead SOCAnalyst - Cheltenham Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) and declaration of being a British passport holder with no dual nationalism at the point More ❯
Primary Details Time Type: Full time Worker Type: Employee SOC Principal Analyst Permanent London/Hybrid At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity QBE Europe is currently recruiting a SOC Principal Analyst to join … our cyber security team in our London Office. Reporting to regional team leads, the SOC Principal Analyst will be a key member of our rapidly growing Global SecurityOperations team. Your new role This is an exciting hands-on technical role in which the specialist will use their security skills and knowledge to perform advanced analysis on … response to cyber security-related incidents to prevent QBE from becoming compromised by modern attack methods and techniques. Main responsibilities: Act as point of escalation and mentor to junior SOC analysts. Translates business objectives into security objectives by providing support in design/architecture for new security applications to improve the current security posture globally for QBE. Recommends and More ❯
At CGI, we empower our people to make a real impact in securing the digital future of our clients. As a SOCAnalyst, you’ll be at the forefront of protecting critical systems, working within a CGI team to strengthen defence operations and respond to evolving cyber threats. Based on-site in Chippenham, this role is central … responsibilities In this role, you will be a key member of the SecurityOperationsCentre, monitoring, analysing, and resolving incidents in partnership with senior engineers. You’ll enhance the SOC’s capability by continually improving configuration and automation, adding new detection rules, and ensuring services remain resilient against emerging threats. Working in a mixed CGI and client environment, you … ownership of solutions is encouraged, and where support and training are available to help you grow. Key responsibilities include: • Monitor, analyse, and respond to security incidents • Develop & deliver new SOC rules and automation to meet client priorities • Support test, assurance, and compliance activities • Optimise & improve SOC configuration and service delivery • Collaborate in a mixed CGI/client team More ❯
SOCAnalyst (Level 2) | Birmingham | On-site | DV-Clear | 24/7 rota, 8 hr shifts | £500 a day outside IR35 Pigment Consulting is a bold and disruptive digitally-enabled transformation consultancy delivering impactful change across Central Government & Defence. Due to continued success across our Cyber Security portfolio, we are currently seeking DV-Cleared SOC Analysts … to work closely with others, empowering the wider team through knowledge transfer and teamwork. If you are passionate about making a difference to the public sector while leveraging your SOC expertise, then we would love to hear from you! Please apply promptly and one of our team will be in touch to discuss. More ❯
rich heritage of technological excellence and a strong focus on digital transformation, they empower organisations worldwide to solve complex challenges and achieve sustainable growth. Your new role As a SOCAnalyst, you will be responsible for providing Protective Monitoring Services across a range of Secure Customers. You will be responsible for the day-to-day monitoring using … following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. The role acts as part of a 24/7 shift team and shift work will be required. This role is based in Hursley and … to succeed Must be prepared to work on shift as part of a 24/7 shift team based onsite - 4 days on - 4 days off.Microsoft Certified: SecurityOperationsAnalyst Associate Certification (SC200) is a mandatory requirement for role fulfilmentExperience working with SIEM technologies and security toolingAn understanding of IT Infrastructure and NetworkingAn understanding of vulnerability and threat More ❯
Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst 2-3 Days onsite - Crawley 6-9 Month duration Reporting line: The Analyst will report to the Cyber Security Response Manager and work within the Information Systems directorate, based in the Crawley office. Job purpose: The role of an Incident Response (CSIRT)/SOC … protect network systems and customer data from cyber threats. Dimensions People – Work collaboratively in a team of around 14 cyber securityoperations staff. Mentor Level 1 and Level 2 SOC Analysts, providing guidance and training. Suppliers – Regular interaction with technical resources from outsourced Managed Security Service Providers (MSSPs) and cyber security tooling vendors. Communication – Communicate technical cybersecurity concepts to … vulnerabilities, and anomalies, then use this intelligence and tooling to uncover and remove hidden threats that may have bypassed existing defences across IT and OT environments. Policy Development: Develop SOC policies, technical standards, and procedure documentation aligned to industry best practice. Log Management: Work with MSSPs and service owners to ensure log sources are onboarded into the SIEM solution. More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria
that there is no boredom in our role. We have a growing Cyber practice in our Defence sector and support enterprise scale clients. Now we have opportunities for L2 SOC Analysts to join in our success and work with multiple, high profile clients. You must have proven experience working in a busy SOC with a tech-first approach … infrastructure. In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Provide Incident Response support. Maintain, improve and develop team knowledge of SOC tools, securityoperations and triage. Prepare reports for managed clients to both technical and non-technical audiences and continuously improve their content and presentation. Maintain and update security incident More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
CYBER SECURITYANALYST | SECURITYOPERATIONS CENTER (SOC). Summer-Browning Associates is supporting our client in the Central Government who is seeking a Cyber SecurityAnalyst for an initial 12-month assignment, with the possibility of extension. Location: London | Hybrid| Remote The ideal candidates will hold active DV clearance and have a proven background in … Cyber Security, with the following skills and experience: Experience in SOCoperations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority More ❯
CYBER SECURITYANALYST | SECURITYOPERATIONS CENTER (SOC). Summer-Browning Associates is supporting our client in the Central Government who is seeking a Cyber SecurityAnalyst for an initial 12-month assignment, with the possibility of extension. Location: London | Hybrid| Remote The ideal candidates will hold active DV clearance and have a proven background in … Cyber Security, with the following skills and experience: Experience in SOCoperations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority More ❯