Role: Junior Major Incident & Problem Analyst Location: London - (Hybrid) Duration : Permanent Key Essential Skills: 2-3 years experience in a customer-focused, fast-moving IT support or service management environment Solid foundation in IT service delivery and understanding of Major Incident and Problem Management processes Working knowledge of ITIL practices and terminology Strong communication skills, able to … Confident in managing and participating in major incidents and problem investigations with support from senior staff Basic understanding of IT infrastructure and relevant systems Comfortable producing reports and handling incident/problem tracking (Excel basics and ITSM tool navigation) Strong analytical and organizational skills Desirable Skills: Experience supporting or working with senior stakeholders and learning how to drive process … sectors ITIL or other ITSM certifications in progress or completed Experience using ITSM platforms (eg, ServiceNow, Remedy, BMC, Cherwell) Interest in professional development and growing knowledge of ITIL/incident management best practices Overview We are seeking for Junior Major Incident & Problem Analyst to join our team based in central London. This role requires a proactive, detail More ❯
Network Incident Management Quality Assurance Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity : We are seeking a detail-oriented ITIL Network Incident Management Quality Assurance Analyst to support … the continuous improvement of our IT network incident management processes. The ideal candidate will work closely with the QA Lead to ensure network incident management practices align with ITIL standards and contribute to the overall quality of IT service delivery. Responsibilities: Assist in developing and maintaining quality assurance standards and procedures for IT network incident management, aligned … with ITIL framework. Conduct regular audits of incident records, documentation, and resolutions to ensure compliance with ITIL standards and internal procedures. Analyze incident data, metrics, and trends to identify areas for improvement in the incident management process. Support the training of IT staff on ITIL network incident management practices and quality assurance procedures. Participate in incidentMore ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Edge
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation … technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications & Experience Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Edge
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation … technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications & Experience Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA More ❯
Senior Incident Responder SOC Analyst (L3) Birmingham or Glasgow Up to 71,000 + Bonus + Benefits Hybrid SC Clearance Required or Eligible Our client a global technology and services firm is expanding its Managed Security Operations Centre and seeking a Senior Incident Responder (L3 SOC Analyst) to take the lead on complex security incidents, investigations … investigations, and ensure effective containment and eradication of threats. Youll act as the escalation point within the SOC, providing technical expertise, mentoring junior analysts, and driving continuous improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to … threat intelligence into monitoring and detection workflows. Liaise with clients, Service Delivery Managers, and technical teams to manage escalations and coordinate response. Maintain high standards of documentation, including post-incident reports and monthly performance packs. Support presales activities and SOC solution demonstrations when required. What Youll Bring 35 years experience in cybersecurity operations, ideally within a SOC or incidentMore ❯
Senior Incident Responder – SOC Analyst (L3) Birmingham or Glasgow | Up to £71,000 + Bonus + Benefits | Hybrid | SC Clearance Required or Eligible Our client – a global technology and services firm – is expanding its Managed Security Operations Centre and seeking a Senior Incident Responder (L3 SOC Analyst) to take the lead on complex security incidents, investigations … and ensure effective containment and eradication of threats. You’ll act as the escalation point within the SOC, providing technical expertise, mentoring junior analysts, and driving continuous improvement of incident response processes. Key Responsibilities: Lead complex investigations into security incidents and breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to … threat intelligence into monitoring and detection workflows. Liaise with clients, Service Delivery Managers, and technical teams to manage escalations and coordinate response. Maintain high standards of documentation, including post-incident reports and monthly performance packs. Support presales activities and SOC solution demonstrations when required. What You’ll Bring 3–5 years’ experience in cybersecurity operations, ideally within a SOC More ❯
Looking to move away from retail, hospitality or shift work – and build a career that actually gives you long-term stability and flexibility? Cyber Security is one of the fastest-growing industries in the world, and you don’t need More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
tickets, as well as supporting the wider team in maintaining the organisation’s security posture Key skills (essential) Proven experience working in a SOC environment or as a Security Analyst Strong understanding of the Microsoft stack especially the Security piece – Sentinle and Defender. Strong understanding of cybersecurity fundamentals, including malware, phishing, and network attacks Familiarity with endpoint protection, firewalls … and email security systems Knowledge of scripting or automation (e.g., PowerShell, Python) Experience with incident response frameworks and ITIL ticketing systems (e.g. ServiceNow, Jira) Nice to have Any MS365 certifications and CW PSA (nice to have) Relevant security certifications such as CompTIA Security+, CySA+, GSEC, or equivalent (nice to have) Within this role and organisation, there is loads of … operating procedures Collaborate with IT teams and other stakeholders to remediate security issues Participate in continuous improvement initiatives to enhance detection and response capabilities Contribute to periodic reporting on incident trends and metrics More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
tickets, as well as supporting the wider team in maintaining the organisation’s security posture Key skills (essential) Proven experience working in a SOC environment or as a Security Analyst Strong understanding of the Microsoft stack especially the Security piece – Sentinle and Defender. Strong understanding of cybersecurity fundamentals, including malware, phishing, and network attacks Familiarity with endpoint protection, firewalls … and email security systems Knowledge of scripting or automation (e.g., PowerShell, Python) Experience with incident response frameworks and ITIL ticketing systems (e.g. ServiceNow, Jira) Nice to have Any MS365 certifications and CW PSA (nice to have) Relevant security certifications such as CompTIA Security+, CySA+, GSEC, or equivalent (nice to have) Within this role and organisation, there is loads of … operating procedures Collaborate with IT teams and other stakeholders to remediate security issues Participate in continuous improvement initiatives to enhance detection and response capabilities Contribute to periodic reporting on incident trends and metrics More ❯
watford, hertfordshire, east anglia, united kingdom
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
tickets, as well as supporting the wider team in maintaining the organisation’s security posture Key skills (essential) Proven experience working in a SOC environment or as a Security Analyst Strong understanding of the Microsoft stack especially the Security piece – Sentinle and Defender. Strong understanding of cybersecurity fundamentals, including malware, phishing, and network attacks Familiarity with endpoint protection, firewalls … and email security systems Knowledge of scripting or automation (e.g., PowerShell, Python) Experience with incident response frameworks and ITIL ticketing systems (e.g. ServiceNow, Jira) Nice to have Any MS365 certifications and CW PSA (nice to have) Relevant security certifications such as CompTIA Security+, CySA+, GSEC, or equivalent (nice to have) Within this role and organisation, there is loads of … operating procedures Collaborate with IT teams and other stakeholders to remediate security issues Participate in continuous improvement initiatives to enhance detection and response capabilities Contribute to periodic reporting on incident trends and metrics More ❯
incidents, ensuring timely containment, analysis, and remediation. You act as the primary liaison between our business and our global Security Operations Center, ensuring seamless communication and escalation. You translate incident learnings into actionable improvements for the cybersecurity setup within the Coatings division and c ollaborate with SOC analysts to identify and assess threats and support proactive threat hunting initiatives. … Furthermore, you develop and refine incident response playbooks and workflows tailored to the Coatings division's operational needs. You provide clear, structured updates to business units and leadership during and after incidents and s upport internal training and awareness initiatives based on real-world incident scenarios. WHAT YOU OFFER master's degree in computer science, information technology, or … field, with 2-3 years of professional experience in cybersecurity expertise in operative cybersecurity, including threat detection and system hardening as well as experience in developing and executing structured incident response procedures teamplayer with excellent communication skills in both written and spoken German and English strong interpersonal skills and a collaborative approach to working with cross-functional global teams More ❯