Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
leaders in their field. Our new position of SOC Shift Lead will direct a team of SOC Analysts, conduct monitoring and triage of alerts associated with host and network security events for our client’s critical infrastructure and support the SOC through both delivery of client work and adding skills and ideas to this already diverse team. This role … 6PM to 6am, 4 days off. Please note you do need to be eligible for DV Clearance for this role. What you'll be doing: Monitor, triage, and investigate security incidents on critical client infrastructure. In depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Line Management. Maintain, improve and develop … team knowledge of SOC tools, securityoperations and triage. Analyse and improve detection rules and use cases in line with Mitre Att&ck and threat-informed defence. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Represent the SOC within Partners meetings. Ability to work shift from our office in Hemel More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
vertex-it-solutions
Engineer to join the global IT team. The successful candidate will play a key role in designing, implementing, maintaining, and supporting the entire IT infrastructure, which supports the business operations across multiple international locations. This is a practical role requiring a combination of deep technical expertise in Microsoft, VMware, and Cloud technologies, strategic thinking, and the ability to work … and cloud-based systems. Manage and administer our hybrid cloud environment, with a strong focus on Microsoft Azure, Entra ID, and Azure MDM for modern device management. Ensure the security of our infrastructure and data by managing on-premises and cloud security controls and working closely with the SecurityOperationsCentre (SoC) to action vulnerability … as well as core Microsoft services (AD, GPO, DNS, NPS/Radius, CA, SMTP Relay), and our extensive VMware vSphere/vCenter virtualisation platform. Administer and optimise our System Centre Configuration Manager (SCCM) hierarchy, including Primary/Secondary sites, Distribution Points, Cloud Management Gateway (CMG), and Azure integration for global software deployment and updates. Manage and maintain our VDI More ❯
Senior Security Analyst – SOC/Incident Response I’m partnering with a fast-growing Cyber Defence function that’s strengthening its SecurityOperationsCentre and looking for a talented Senior Security Analyst to join the team. You’ll take a leading role in detecting, analysing, and responding to cyber threats across diverse client environments, mentoring … a SOC, CSIRT, or cyber defence environment. Solid knowledge of SIEM and EDR platforms (Sentinel, Splunk, Defender, CrowdStrike, etc.). Understanding of MITRE ATT&CK and network/cloud security principles. Strong analytical and communication skills. Bonus points for: Scripting or automation experience (KQL, PowerShell, Python). Background in threat hunting or vulnerability management. Why apply? Hybrid flexibility, funded More ❯
london, south east england, united kingdom Hybrid / WFH Options
Maxwell Bond
forecasting. Deliver against ambitious new business targets, landing deals typically in the £20k–£40k range . Cybersecurity Services You’ll Sell Penetration Testing & Red Teaming Managed Detection & Response (MDR) SecurityOperationsCentre (SOC) services Threat Intelligence & Risk Advisory Incident Response & Crisis Management Cloud & Endpoint Security Solutions What You Bring Proven track record in new business cybersecurity More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Maxwell Bond
forecasting. Deliver against ambitious new business targets, landing deals typically in the £20k–£40k range . Cybersecurity Services You’ll Sell Penetration Testing & Red Teaming Managed Detection & Response (MDR) SecurityOperationsCentre (SOC) services Threat Intelligence & Risk Advisory Incident Response & Crisis Management Cloud & Endpoint Security Solutions What You Bring Proven track record in new business cybersecurity More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Maxwell Bond
forecasting. Deliver against ambitious new business targets, landing deals typically in the £20k–£40k range . Cybersecurity Services You’ll Sell Penetration Testing & Red Teaming Managed Detection & Response (MDR) SecurityOperationsCentre (SOC) services Threat Intelligence & Risk Advisory Incident Response & Crisis Management Cloud & Endpoint Security Solutions What You Bring Proven track record in new business cybersecurity More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
principles, techniques, and tools. Proficiency in creating Business Change documentation, including policies, standards, processes, procedures, and patterns. Demonstrable experience in risk management and benefits realisation. Experience with changes in SecurityOperations Centers (SOCs) and related monitoring and management technologies and procedures. A background in SecurityOperations Centers within the Defence, Nuclear, or Central Government sectors, or More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
principles, techniques, and tools. Proficiency in creating Business Change documentation, including policies, standards, processes, procedures, and patterns. Demonstrable experience in risk management and benefits realisation. Experience with changes in SecurityOperations Centers (SOCs) and related monitoring and management technologies and procedures. A background in SecurityOperations Centers within the Defence, Nuclear, or Central Government sectors, or More ❯
from day one Im working with a gold-standard IT Managed Service Provider renowned for delivering secure, enterprise-grade solutions across cloud, infrastructure, and cyber domains. Theyre expanding their SecurityOperationsCentre and hiring a hands-on SOC Incident Response & Threat Hunting Manager to lead Tier 3 analysts and drive proactive defence strategies. This is a strategic … mentoring capabilities, and a passion for threat hunting and CTI development. Key Responsibilities: Lead and coordinate high-severity incident response engagements Provide technical oversight and guidance on threat hunting operations Translate threat intelligence into actionable hypotheses and use cases Design and execute advanced threat hunting exercises across varied environments Develop in-house training programmes for SOC analysts Drive CTI More ❯
Birmingham or Glasgow Up to £71,000 + Bonus + Benefits Hybrid SC Clearance Required or Eligible Our client - a global technology and services firm - is expanding its Managed SecurityOperationsCentre and seeking a Senior Incident Re click apply for full job details More ❯
SOC Operations Manager - Azure, ISO27001, Energy Up to £800 per day - Inside IR35 Primarily remote - Occasional travel 3 - 6 months My client is an instantly recognisable consultancy who require a SOC Operations Manager to lead the day-to-day operations of a SecurityOperations Centre. This is a hands-on leadership role where you'll … within Energy/Construction/Utilities Hands on leadership and team management skills. Proven experience with Enterprise Technologies (SOC/SIEM/XDR). Strong working knowledge of M365 security features. Familiarity with cloud platforms, in particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through clear and efficient reporting. Clear knowledge of current More ❯
strategic ownership of the organisation's core infrastructure and network operations. You will manage relationships with external service providers, lead internal infrastructure initiatives and ensure the stability, scalability and security of IT systems across multiple sites, whilst leading the infrastructure team. Key Responsibilities * Lead and manage the delivery of infrastructure and network services across offices and project sites, aligning … providers, ensuring performance, SLAs and service quality * Provide leadership to technical staff * Plan and coordinate infrastructure upgrades, migrations and integrations across a growing business portfolio * Manage network and server operations, ensuring uptime, resilience and business continuity. * Oversee the design and deployment of new site networks and connectivity solutions, ensuring standardisation and efficiency * Collaborate with the SecurityOperations Center and compliance teams to maintain a robust security posture * Develop and enforce infrastructure policies, processes and documentation to support consistent operations and future scalability * Maintain oversight of infrastructure assets, configuration management and software licensing * Contribute strategically to IT budgeting, vendor management and continuous service improvement initiatives * Provide high-level technical oversight and guidance in areas including More ❯
bonus and 6k car allowance Mon Fri as well as an on-call rota - 1 week in 4. Candidates must be willing and eligible to go through SC security clearance for this role Job Description: We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing SecurityOperations Centre. This … pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI) capability. This is a hands-on leadership position requiring a strong technical background, exceptional management skills, and a strategic vision for cybersecurity. You will … play a key role in mentoring and developing a high-performing team, leading complex incident response engagements from initial detection through to post-incident review, and significantly enhancing the security posture of our diverse customer base. The role demands a unique blend of strategic leadership, deep technical expertise in digital forensics and incident response (DFIR), and a proactive mindset More ❯
We are seeking experienced Cybersecurity Specialists to join a high-impact consultancy project. This role requires deep expertise across Identity and Access Management (IAM), Governance, Risk & Compliance (GRC), or SecurityOperations Center (SOC) functions. You will work closely with client teams to strengthen security posture and deliver strategic and operational improvements. Responsibilities Design and implement IAM solutions … identity governance. Support GRC activities, including risk assessments, compliance frameworks, and policy development. Enhance SOC capabilities through threat detection, incident response, and continuous monitoring. Collaborate with stakeholders to align security initiatives with business objectives. Provide expert guidance on best practices and emerging cybersecurity trends. Requirements Must have security clearance (SC) Proven experience in IAM, GRC, or SOC domains. … Strong understanding of cybersecurity frameworks (e.g., ISO 27001, NIST, CIS). Hands-on experience with security tools and technologies. Excellent problem-solving and stakeholder management skills. Ability to work independently and deliver results within tight timelines. Details TBC depending on role. More ❯
We are seeking experienced Cybersecurity Specialists to join a high-impact consultancy project. This role requires deep expertise across Identity and Access Management (IAM), Governance, Risk & Compliance (GRC), or SecurityOperations Center (SOC) functions. You will work closely with client teams to strengthen security posture and deliver strategic and operational improvements. Responsibilities Design and implement IAM solutions … identity governance. Support GRC activities, including risk assessments, compliance frameworks, and policy development. Enhance SOC capabilities through threat detection, incident response, and continuous monitoring. Collaborate with stakeholders to align security initiatives with business objectives. Provide expert guidance on best practices and emerging cybersecurity trends. Requirements Must have security clearance (SC) Proven experience in IAM, GRC, or SOC domains. … Strong understanding of cybersecurity frameworks (e.g., ISO 27001, NIST, CIS). Hands-on experience with security tools and technologies. Excellent problem-solving and stakeholder management skills. Ability to work independently and deliver results within tight timelines. Details TBC depending on role. More ❯
on a full-time permanent basis. Ideally looking for someone with previous and relevant experience, our client will also consider candidates looking to move in to CSOC/Cyber Security, providing you have the passion and enthusiasm for Cyber Security. This role is part of a rotating shift-pattern (once you are up and running) and operates on a … basis of 8am-8pm/8pm-8am with 4 days on and 4 days off (rotating day/nights). Key Responsibilities: Oversee and maintain visibility across the full security technology suite. Actively engage in threat hinting activities during periods without active alerts. Contribute to the design and configuration of security alerting. Remain informed on emerging threats, attack … methods, and the evolving cyber landscape. Investigate alerts originating from any of the deployed security systems or solutions. Prepare detailed incident reports for escalation. Create, maintain, and document detailed security processes and procedural workflows. Key Requirements: Previous experience in a similar CSOC/Cyber role (desired). Knowledge in Cyber Security with a desire to work and More ❯
on a full-time permanent basis. Ideally looking for someone with previous and relevant experience, our client will also consider candidates looking to move in to CSOC/Cyber Security, providing you have the passion and enthusiasm for Cyber Security. This role is part of a rotating shift-pattern (once you are up and running) and operates on a … basis of 8am-8pm/8pm-8am with 4 days on and 4 days off (rotating day/nights). Key Responsibilities: Oversee and maintain visibility across the full security technology suite. Actively engage in threat hinting activities during periods without active alerts. Contribute to the design and configuration of security alerting. Remain informed on emerging threats, attack … methods, and the evolving cyber landscape. Investigate alerts originating from any of the deployed security systems or solutions. Prepare detailed incident reports for escalation. Create, maintain, and document detailed security processes and procedural workflows. Key Requirements: Previous experience in a similar CSOC/Cyber role (desired). Knowledge in Cyber Security with a desire to work and More ❯
on a full-time permanent basis. Ideally looking for someone with previous and relevant experience, our client will also consider candidates looking to move in to CSOC/Cyber Security, providing you have the passion and enthusiasm for Cyber Security. This role is part of a rotating shift-pattern (once you are up and running) and operates on a … basis of 8am-8pm/8pm-8am with 4 days on and 4 days off (rotating day/nights). Key Responsibilities: Oversee and maintain visibility across the full security technology suite. Actively engage in threat hinting activities during periods without active alerts. Contribute to the design and configuration of security alerting. Remain informed on emerging threats, attack … methods, and the evolving cyber landscape. Investigate alerts originating from any of the deployed security systems or solutions. Prepare detailed incident reports for escalation. Create, maintain, and document detailed security processes and procedural workflows. Key Requirements: Previous experience in a similar CSOC/Cyber role (desired). Knowledge in Cyber Security with a desire to work and More ❯
on a full-time permanent basis. Ideally looking for someone with previous and relevant experience, our client will also consider candidates looking to move in to CSOC/Cyber Security, providing you have the passion and enthusiasm for Cyber Security. This role is part of a rotating shift-pattern (once you are up and running) and operates on a … basis of 8am-8pm/8pm-8am with 4 days on and 4 days off (rotating day/nights). Key Responsibilities: Oversee and maintain visibility across the full security technology suite. Actively engage in threat hinting activities during periods without active alerts. Contribute to the design and configuration of security alerting. Remain informed on emerging threats, attack … methods, and the evolving cyber landscape. Investigate alerts originating from any of the deployed security systems or solutions. Prepare detailed incident reports for escalation. Create, maintain, and document detailed security processes and procedural workflows. Key Requirements: Previous experience in a similar CSOC/Cyber role (desired). Knowledge in Cyber Security with a desire to work and More ❯
on a full-time permanent basis. Ideally looking for someone with previous and relevant experience, our client will also consider candidates looking to move in to CSOC/Cyber Security, providing you have the passion and enthusiasm for Cyber Security. This role is part of a rotating shift-pattern (once you are up and running) and operates on a … basis of 8am-8pm/8pm-8am with 4 days on and 4 days off (rotating day/nights). Key Responsibilities: Oversee and maintain visibility across the full security technology suite. Actively engage in threat hinting activities during periods without active alerts. Contribute to the design and configuration of security alerting. Remain informed on emerging threats, attack … methods, and the evolving cyber landscape. Investigate alerts originating from any of the deployed security systems or solutions. Prepare detailed incident reports for escalation. Create, maintain, and document detailed security processes and procedural workflows. Key Requirements: Previous experience in a similar CSOC/Cyber role (desired). Knowledge in Cyber Security with a desire to work and More ❯
on a full-time permanent basis. Ideally looking for someone with previous and relevant experience, our client will also consider candidates looking to move in to CSOC/Cyber Security, providing you have the passion and enthusiasm for Cyber Security. This role is part of a rotating shift-pattern (once you are up and running) and operates on a … basis of 8am-8pm/8pm-8am with 4 days on and 4 days off (rotating day/nights). Key Responsibilities: Oversee and maintain visibility across the full security technology suite. Actively engage in threat hinting activities during periods without active alerts. Contribute to the design and configuration of security alerting. Remain informed on emerging threats, attack … methods, and the evolving cyber landscape. Investigate alerts originating from any of the deployed security systems or solutions. Prepare detailed incident reports for escalation. Create, maintain, and document detailed security processes and procedural workflows. Key Requirements: Previous experience in a similar CSOC/Cyber role (desired). Knowledge in Cyber Security with a desire to work and More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding SecurityOperations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and a More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding SecurityOperations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and a More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding SecurityOperations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and a More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding SecurityOperations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and a More ❯