London, South East, England, United Kingdom Hybrid / WFH Options
Atrium Workforce Solutions Ltd
Cyber Security SOC Analyst – London/Remote Atrium EMEA is looking for an accomplished Cyber Security SOC Analyst to support the Security Incident Response Team. The team is growing, we require a strong individual contributor that will investigate, analyse, and contain security incidents. This is a fully remote role, with the occasional London office visit. You … controls and/or corrective actions for mitigating technical and business risk. • Integrate and collaborate with other subject matter experts throughout the organization. Essential: • Solid experience of Google Secops/Googlesecops • BS/BA in Computer Science, Computer Engineering, Cyber Security, Forensics and/or equivalent work experience. • Certification in cybersecurity (e.g. Security+, CCNA Cyber Ops, BTL1 and …/or BTL2, GCIH, CEH, CySA+, OSCP, CISSP, CCSP etc.) • IT Security or Cyber Security experience in any of the following areas: Incident Response & Digital Forensics. Cybersecurity Detection Engineering and Threat Hunting or Vulnerability Management • Experience analysing attack vectors, current threats, and security remediation strategies • Experience with SIEM technologies, EDR technologies, and/or Asset isolation tools More ❯
We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing SecurityOperations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI … play a key role in mentoring and developing a high-performing team, leading complex incident response engagements from initial detection through to post-incident review, and significantly enhancing the security posture of our diverse customer base. The role demands a unique blend of strategic leadership, deep technical expertise in digital forensics and incident response (DFIR), and a proactive mindset … to anticipate and neutralise sophisticated and evolving cyber threats. Key Responsibilities: Provide expert guidance and technical oversight on complex security incidents and threat hunting operations. Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making under pressure. Ensure all incident response and More ❯
Hereford, Herefordshire, England, United Kingdom Hybrid / WFH Options
QA
About SPS: Special Projects and Services Limited (SPS) is a UK-based security and risk management company founded in 1991. Operating globally, SPS provides crisis response, risk assessment, medical operations support, and project management in high-risk or complex environments. Known for its expertise in global assistance and specialist securityoperations, SPS was acquired by Concentric … IT services across the UK business, assisting with technical support, device management, and ongoing tech ops projects. This role provides structured, hands-on training in IT systems administration, cyber security, and compliance, contributing to the smooth operation of business technology while developing core professional and technical skills. The apprentice will work closely with the Tech Ops Manager and the … of the company’s technology architecture. Research and suggest service enhancements to improve efficiency and user experience. Support the implementation and maintenance of the company’s ISO 27001 Information Security Management System and ISO 27701 Privacy Information Management System. Assist with cyber security initiatives such as endpoint management, access control, and awareness activities. Assist with privacy and cyber More ❯
of-the-art threat detection, investigation and response (TDIR) capabilities. This role will work with enterprise clients, and internally, to perform threat-informed detection engineering and threat research, implement security data lakes, SIEM and data pipelines strategies and transform response with SOAR and AI-SOC tooling. You will have the opportunity to shape everything from our technical architecture and … actionable, high-fidelity detections Demonstratable experience with detection-as-code using multiple detection languages - Sigma, YAML, SPL, KQL, YARA-L, CoreTIDE. Proficient with Python, Git/GitHub and developing security tooling integrations and automations Hands-on experience with Splunk Cloud, Enterprise Security, and SOAR Deep understanding of MITRE ATT&CK and how to apply it practically Familiarity with … skills Comfortable presenting to technical and non-technical audiences Preferred Requirements Experience in architecting TDIR platforms or leading detection engineering initiatives Expertise with multiple SIEM platforms such as Google SecOps and MS Sentinel Experience using security data lakes and pipelines such as Cribl, Snowflake, Databricks Splunk Certificated Architect (or Enterprise Security Admin) Bonus Points Track record of thought More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
On-site preferred) Salary: Up to £90,000 + Benefits + Bonus Employment Type: Permanent Overview We are seeking a highly skilled Red Team Specialist to join our clients security function. You will lead and execute offensive securityoperations, simulating real-world adversaries to identify weaknesses in our organisation's technology, processes, and human controls. This role … is ideal for an individual with deep technical expertise, strong threat-emulation experience, and the ability to translate complex findings into actionable security improvements. Key Responsibilities Plan, execute, and report on red team engagements including full-scope attack simulations Perform targeted adversary emulation across network, application, cloud, and physical domains Develop exploit chains and bypass advanced detection and security … attacker TTPs, threat actors, and exploit techniques Mentor junior team members and contribute to tooling, methodology, and lab development Required Skills & Experience 3+ years' experience in red teaming, offensive security, or advanced penetration testing Strong knowledge of attacker frameworks (e.g., MITRE ATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz More ❯
of-the-art threat detection, investigation and response (TDIR) capabilities. This role will work with enterprise clients, and internally, to perform threat-informed detection engineering and threat research, implement security data lakes, SIEM and data pipelines strategies and transform response with SOAR and AI-SOC tooling. You will have the opportunity to shape everything from our technical architecture and … actionable, high-delity detections Demonstratable experience with detection-as-code using multiple detection languages - Sigma, YAML, SPL, KQL, YARA-L, CoreTIDE. Procient with Python, Git/GitHub and developing security tooling integrations and automations Hands-on experience with Splunk Cloud, Enterprise Security, and SOAR Deep understanding of MITRE ATT&CK and how to apply it practically Familiarity with … skills Comfortable presenting to technical and non-technical audiences Preferred Requirements Experience in architecting TDIR platforms or leading detection engineering initiatives Expertise with multiple SIEM platforms such as Google SecOps and MS Sentinel Experience using security data lakes and pipelines such as Cribl, Snowake, Databricks Splunk Certicated Architect (or Enterprise Security Admin) Bonus Points Track record of thought More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding SecurityOperations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and a More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding SecurityOperations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and a More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding SecurityOperations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and a More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding SecurityOperations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and a More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; securityoperations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non … security technical SMEs at a comfortable level • Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies • Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity • Experience and understanding of both the roles and interlock between enterprise & solution architecture • Experience … business outcomes • Ensures the design of the solutions are efficient, timely and cost effective throughout the project lifecycle • Clear understanding of both the motivations of the business and technical security • Promote strong documentation and clerkship Governance: • Ensures all high-level designs, architecture patterns, decision records, deviation requests, and technical risks or issue records undergo architectural and project governance processes More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; securityoperations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non … security technical SMEs at a comfortable level • Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies • Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity • Experience and understanding of both the roles and interlock between enterprise & solution architecture • Experience … business outcomes • Ensures the design of the solutions are efficient, timely and cost effective throughout the project lifecycle • Clear understanding of both the motivations of the business and technical security • Promote strong documentation and clerkship Governance: • Ensures all high-level designs, architecture patterns, decision records, deviation requests, and technical risks or issue records undergo architectural and project governance processes More ❯
high-quality threat briefings, risk assessments, and operational recommendations Participate in incident response, providing context, attributions, and support as required Required Skills & Experience: Extensive experience in threat intelligence, cybersecurity operations, or penetration testing Proven ability to work collaboratively with Red/Blue teams and SecurityOperations Centres (SOC) Hands-on experience with TIPs (Threat Intelligence Platforms), SIEM More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Solus Accident Repair Centres
our team on a 12-Month Fixed Term Basis. You will be responsible for the development, configuration, and optimisation of the Zellis HR and Payroll systems which supports business operations by ensuring the systems are tailored to meet organisational needs: Configure ResourceLink to meet specific HR and payroll requirements, customising User Defined Fields, Screens, workflows etc to align with … infrastructure Lead or support IT Change Enablement and Problem Management processes following ITIL v4 standards, working closely with internal teams and external partners Help maintain strong IT governance, including security best practices and disaster recovery planning Create and maintain clear documentation for system setups, processes, and troubleshooting guides Provide training and support to colleagues in HR, Payroll, Recruitment, and … requirements and translate them into effective technical solutions Manage system upgrades, patches, and testing cycles Provide technical support and troubleshooting for ResourceLink and Compensate-related issues Ensure data integrity, security, and compliance with GDPR and payroll regulations. Integrate ResourceLink with other enterprise systems (e.g. Soluss bespoke workshop management system, MS Fabric, Power Automate) Analyse risks and implications associated with More ❯
days office) £40-45k Our client are looking for a Level 2 SOC Engineer. This is a key role in the detection and response lifecycle within our SecurityOperations Centre. The role You will be responsible for triaging, investigating, and responding to cybersecurity incidents across customer environments using tools such as Microsoft Sentinel and Defender XDR. The More ❯
respond to an attack. Our services include Attack Surface Management, Penetration Testing, and Red Teaming. We're Hiring: Red Team Specialist UK (Remote) | BreachLock Inc. Join BreachLocks elite offensive security team, where we dont just simulate threats we emulate real adversaries. As aRed Team Specialist , you'll be at the frontlines of BreachLocks offensive securityoperations, conducting … Work closely with Blue Teams for purple teaming and adversarial validation Deliver executive reports and technical debriefs with precision What You Bring: 3+ years in red teaming or offensive security Proficiency with C2 frameworks (Cobalt Strike, Sliver, Mythic) Deep understanding of Windows/Linux internals, AD, and cloud (AWS/Azure) Knowledge of OPSEC, evasive TTPs, and threat intelligence … Cutting-edge work in PTaaS, AEV, and CTEM Clients include global enterprises and governments Fast-paced, growth-focused, no-BS environment Why are we a Global Leader in Offensive Security Analyst Endorsements: Recognized again by Gartner , GigaOm , and SANS for advancing automated, AI-enhanced offensive security testing. CTEM & AEV Leadership: Launched industry-first AI-powered CTEM and Adversarial More ❯
to an attack. Our services include Attack Surface Management, Penetration Testing, and Red Teaming. 🚨 We're Hiring: Red Team Specialist – UK (Remote) | BreachLock Inc. Join BreachLock’s elite offensive security team, where we don’t just simulate threats — we emulate real adversaries. As a Red Team Specialist , you'll be at the frontlines of BreachLock’s offensive securityoperations, conducting advanced adversary emulation, bypassing modern defenses, and helping Fortune 500 clients improve their cyber resilience. 🔧 What You’ll Do: Plan and execute full-scope red team engagements (TIBER-style, MITRE ATT&CK aligned) Perform focused penetration tests on web applications, mobile apps (iOS/Android), APIs, and backend services , as well as traditional network/cloud … Work closely with Blue Teams for purple teaming and adversarial validation Deliver executive reports and technical debriefs with precision 🧠 What You Bring: 3+ years in red teaming or offensive security Proficiency with C2 frameworks (Cobalt Strike, Sliver, Mythic) Deep understanding of Windows/Linux internals, AD, and cloud (AWS/Azure) Knowledge of OPSEC, evasive TTPs, and threat intelligence More ❯
Essential Roles & Responsibilities (Full job description on Claranet careers site) As a Senior SOC Analyst (Team Leader), you apply your advanced securityoperations expertise to lead a team of SOC Analysts while performing advanced investigations and, when required, first-line triage to maintain queue health and SLA compliance. You are responsible for high-quality service delivery through detailed … incident handling and analyst onboarding. Position Specification Required Qualifications and Experience • You may be required to hold or obtain UK Non-Police Personnel Vetting (NPPV) and/or a Security Check (SC) clearance as part of this role. • A minimum of 4+ years of SOC operational experience, with demonstrated ability across security analysis, incident response, and working escalated … capability with experience line managing analysts, conducting performance reviews, and overseeing HR-related duties. • Experience providing ticket quality assurance and training delivery. • Familiarity with leading SIEM, endpoint and XDR security platforms, in multi-tenant MSSP environments. • Willingness to obtain or hold relevant security certifications, such as SBT BTL2 and CREST CRIA. More ❯
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global SecurityOperations Center team providing 24/7 threat detection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range of More ❯
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global SecurityOperations Center team providing 24/7 threat detection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range of More ❯
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global SecurityOperations Center team providing 24/7 threat detection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range of More ❯
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global SecurityOperations Center team providing 24/7 threat detection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range of More ❯
london (city of london), south east england, united kingdom
McGregor Boyall
SOC Specialist | London based 2-3x a week | £85,000 + Benefits Role Brief Join a global SecurityOperations Center team providing 24/7 threat detection and incident response. As a SOC Specialist, you’ll act as a frontline defender—monitoring alerts, leading investigations, and conducting proactive threat hunts. You'll work with a range of More ❯
one of Europe’s most respected financial organizations, a cornerstone of the continent’s financial stability and infrastructure. This is your opportunity to step into a mature, high-performing SecurityOperations Centre that plays a pivotal role in protecting the backbone of Europe’s financial systems. You’ll be part of a mission-driven environment where precision, innovation … SIEM use cases that strengthen the organization’s detection framework. Lead and guide technical initiatives within the Threat Detection team to ensure continuous improvement. Advise on SIEM architecture and security tooling, bringing deep technical insight to detection strategies. Manage and prioritize detection tasks, balancing proactive threat hunting with operational response needs. What You Bring Proven experience as a Threat … Detection Engineer or similar role within a SOC environment. Advanced hands-on experience with Splunk, including SPL development and Enterprise Security (ES). Demonstrated ability to create and enhance use cases that detect and mitigate evolving threats. Solid understanding of cybersecurity principles, frameworks, and best practices. Strong communication skills in English — you can translate technical detection logic into actionable More ❯
one of Europe’s most respected financial organizations, a cornerstone of the continent’s financial stability and infrastructure. This is your opportunity to step into a mature, high-performing SecurityOperations Centre that plays a pivotal role in protecting the backbone of Europe’s financial systems. You’ll be part of a mission-driven environment where precision, innovation … SIEM use cases that strengthen the organization’s detection framework. Lead and guide technical initiatives within the Threat Detection team to ensure continuous improvement. Advise on SIEM architecture and security tooling, bringing deep technical insight to detection strategies. Manage and prioritize detection tasks, balancing proactive threat hunting with operational response needs. What You Bring Proven experience as a Threat … Detection Engineer or similar role within a SOC environment. Advanced hands-on experience with Splunk, including SPL development and Enterprise Security (ES). Demonstrated ability to create and enhance use cases that detect and mitigate evolving threats. Solid understanding of cybersecurity principles, frameworks, and best practices. Strong communication skills in English — you can translate technical detection logic into actionable More ❯