SOCAnalyst - 1st UK Hire! Want to be part of the founding UK team for a $300m Global Cyber group? If you're a driven SOCAnalyst who wants more than just "another ops role" and want autonomy to shape a new function with global backing, this could be the role for you! You … growth across Europe, this is a rare opportunity to join early & help shape a new security capability. Why join? You'll play a key role establishing & scaling UK & EU SOC capability. You'll be backed by a $300m global organisation, with proven SOC frameworks & tooling in place. You'll report to the CISO, a recognised industry voice, frequently … are shaped. You'll be positioned for fast progression as the UK cyber practice scales, with forward growth for your role already scoped The Role You'll support US SOC across UK/EU timezones and UK/EU customers with autonomy to shape local processes, tools & culture. Monitor, investigate and respond to security alerts (Tier 2-level responsibility More ❯
of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent (Open) Position Status: Full Time Position Title: Security Operation Center (SOC) Analyst 2 Location: Colorado Spring, CO Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph Duties and Responsibilities The Air Force (AF … operations, processes, mechanisms, and management. This support provides multi- disciplinary security support, including specialized analytical/program protection support, while being responsive and flexible to dynamic SAP security situations. SOCAnalyst's primary function is to provide comprehensive Computer Network Defense and Response support through 24 7 365 monitoring and analysis of potential threat activity targeting the More ❯
Threat Hunter/Threat Detector/SOCAnalyst/TTP/Threats/Monitoring/Detection/ZTNA/Sentinel/Splunk. Superb London based client have an Urgent role, Inside IR35, Hybrid Remote and Onsite for an experienced SOCAnalyst/TTP/Threats Monitoring/Detection/ZTNA/Sentinel/Splunk. … This role, working across Cloud (AWS/Azure and GCP) will see you focusing on threat detection and threat hunting as part of a busy SOC Team. This role isn't about dealing with threats when they happen, it is about hunting them out. Thinking ahead of the curve and providing direction, thoughts and strategy as to how the More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
Senior SOCAnalyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Respond to and resolve cybersecurity incidents and proactively prevent reoccurrence of these incidents. Apply leading-edge principles, theories, and concepts. Contribute to the development of new principles and concepts. Work on unusually complex problems and provide highly innovative solutions. Operate with substantial latitude … company and technical competencies. Qualifications 8+ years of experience supporting Information Technology or Intelligence Operations Experience supporting a Computer Incident Response Team, Cyber Network Operations, or SecurityOperations Center (SOC) operations for a large and complex enterprise Experience with Intelligence Driven Defense, Cyber Kill Chain methodology, or MITRE ATT&CK framework Knowledge of industry-accepted standards for incident response … actions and best practices for SOCoperations Knowledge of security operation tools, including SIMs or DCAP analysis Knowledge of intrusion set tactics, techniques, and procedures Top Secret clearance Bachelor's degree Additional Qualifications Experience with Microsoft Sentinel Experience with Splunk TS/SCI clearance GIAC Continuous Monitoring (GMON) Certification GIAC Certified Incident Handler (GCIH) Certification GIAC Certified Forensic AnalystMore ❯
L2 SOCAnalyst London based (1-3 days office) £40-45k Our client are looking for a Level 2 SOC Engineer. This is a key role in the detection and response lifecycle within our SecurityOperations Centre. The role You will be responsible for triaging, investigating, and responding to cybersecurity incidents across customer environments using … Threat monitoring and detection Threat intelligence and hunting SOAR and automation Skills MS Sentinel/Defender for Endpoint Understanding Mitre Att&ck framework Required 2+ years exp in a SOC environment Experience from MSSP/MSP supporting multiple clients British Citizen SC Clearance More ❯
Job Title: SOCAnalyst Location: Huntsville, AL (On-site) Openings: Junior - Mid Level - Senior Clearance: Top Secret with the ability to sit for a CI Poly after hire Salary: $75,000-$140,000 depending on years of experience Shifts Available: Sun-Wed: 12pm-10pm Wed-Sat: 12pm-10pm Sun-Wed: 9pm-7am Wed-Sat: 9pm-7am Responsibilities … R) Preferred Skills: Having the following tools experience and/or certifications: Microsoft Sentinel (P) GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) System One, and its subsidiaries including Joulé, ALTA IT Services, and Mountain Ltd., are More ❯
Cheltenham, Gloucestershire, England, United Kingdom
Accenture
SOCAnalyst Location: Cheltenham Please Note: Due to the nature of client work you will be undertaking, you will need to be willing to go through a Security Clearance process as part of this role, which requires 5+ years UK address history at the point of application. Accenture is a leading global professional services company, providing a More ❯
As a Sr. SOCAnalyst, you'll be responsible for monitoring, detecting, and responding to cybersecurity threats within an organization's IT environment. You'll analyze security alerts, investigate suspicious activities, and implement measures to mitigate risks. You will also document incidents, improve security protocols, and collaborate with other teams to strengthen overall cybersecurity defenses. We know … implement remediation strategies. Conduct threat intelligence analysis to identify and mitigate emerging cyber threats. Perform real-time analysis of security logs and network traffic for anomalies. Develop and update SOC processes, playbooks, and incident response plans. Provide reports and recommendations to enhance security posture. What you'll need to succeed: 7+ years of experience in a SOC environment. More ❯
The SOCAnalyst's primary function is to provide comprehensive Computer Network Defense and Response support through 247365 monitoring and analysis of potential threat activity targeting the enterprise. This position will conduct security event monitoring, advanced analytics and response activities in support of the government's mission. This position requires a solid understanding of cyber threats and … desired Education: Bachelor's degree in a related area OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years) Certifications: CSSP Analyst - within 6 months of date of hire (CEH, CFR, CCNA Cyber Ops, CySA+ , GCIA, GCIH, GIC SP, SCYBER) Clearance Required to Start: TS/SCI required Must be able More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Anson McCade
SOCAnalyst (L3) - Senior Incident Responder Location: Birmingham (Hybrid) Salary: Up to £70,000 (depending on experience) + bonus NOTE: Candidates for this role must be eligible for UK Security Clearance (SC). We’re looking for a hands-on L3 Senior Incident Responder who can lead on complex security investigations, manage high-severity incidents, and bring … real expertise in Splunk and wider SIEM technologies. This is a critical role within the SOC, where you’ll be the escalation point for L1 and L2 analysts and take ownership of incident containment, remediation, and post-incident review. What you’ll do: Act as the L3 escalation point , leading investigations into complex incidents escalated by L1/L2 … to security events. Perform detailed forensic analysis, root cause analysis, and malware investigation. Lead incident response activities end-to-end, ensuring containment, eradication, and recovery. Develop, refine, and own SOC use cases, runbooks, and playbooks to drive continual service improvement. Liaise directly with clients, providing clear guidance and recommendations. Mentor and support junior SOC analysts, ensuring best practice More ❯
elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests. Requisition: # 1204 Job Title: Tier 1 SOCAnalyst Location: Onsite 5x/week - 2070 Chain Bridge Road in Vienna, VA, OR 1750 Pennsylvania Avenue, NW, Washington, DC. Clearance Level: Active DoD - Secret SUMMARY We … development opportunities in a culture tailored to the individuals technical and professional growth. We are seeking a Tier 1 Analyst for a potential opportunity to support enterprise SOC operations. This role reviews, triages and investigates alerts under direct supervision, contributing to improved incident detection. The Tier 1 Analyst position is designed for individuals starting their … RESPONSIBILITIES • Review, triage and investigate alerts to support incident detection. • Escalate issues to Tier 2 analysts when appropriate. • Perform initial analysis of security events to identify potential threats. • Support SOC monitoring activities under supervision. • Assist in documenting findings and maintaining SOC records. • Apply basic technical knowledge to resolve straightforward problems. • Participate in training and skill development to build More ❯
Cheltenham, Gloucestershire, England, United Kingdom
Accenture
Lead SOCAnalyst - Cheltenham Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) and declaration of being a British passport holder with no dual nationalism at the point More ❯
Primary Details Time Type: Full time Worker Type: Employee SOC Principal Analyst Permanent London/Hybrid At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The Opportunity QBE Europe is currently recruiting a SOC Principal Analyst to join … our cyber security team in our London Office. Reporting to regional team leads, the SOC Principal Analyst will be a key member of our rapidly growing Global SecurityOperations team. Your new role This is an exciting hands-on technical role in which the specialist will use their security skills and knowledge to perform advanced analysis on … response to cyber security-related incidents to prevent QBE from becoming compromised by modern attack methods and techniques. Main responsibilities: Act as point of escalation and mentor to junior SOC analysts. Translates business objectives into security objectives by providing support in design/architecture for new security applications to improve the current security posture globally for QBE. Recommends and More ❯
Security Operation Center (SOC) Analyst 1 primary function is to provide comprehensive Computer Network Defense and Response support through 24 7 365 monitoring and analysis of potential threat activity targeting the enterprise. This position will conduct security event monitoring, advanced analytics and response activities in support of the government's mission. This position requires a solid understanding … Prior performance in roles such as ISSO or ISSM Desired: SAP Experience Training: IAT Level 1 CSSP Auditor or CSSP Incident Responder (in lieu of Cybersecurity Service Provider Analyst). Combatting Trafficking in Persons (CTIP). Security Clearance: Active TS/SCI and the willingness to sit for a polygraph, if needed IC-CAP provides equal employment opportunities More ❯
Blu Omega, a Woman Owned Small Business, is looking for an experienced SOCAnalyst to join our team! In this role, you will be operating in a rotating, 24x7 environment in Herndon, VA. Responsibilities: Investigate suspicious or malicious activity, or other cyber events which could violate policy. Monitor and analyze security events and alerts on a 24x7x365 … . Experience with various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise environments. Minimum of 4 years of experience working in a SecurityOperations Center (SOC) or Network Operations Center (NOC) performing security event monitoring and analysis. Experience using EDR and SIEM technologies. Strong Incident response (IR) framework experience. Working knowledge of network communications and More ❯
rich heritage of technological excellence and a strong focus on digital transformation, they empower organisations worldwide to solve complex challenges and achieve sustainable growth. Your new role As a SOCAnalyst, you will be responsible for providing Protective Monitoring Services across a range of Secure Customers. You will be responsible for the day-to-day monitoring using … following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement The role involves working alongside other team members including SOC engineers and Service Managers. The role acts as part of a 24/7 shift team and shift work will be required. This role is based in Hursley and … to succeed Must be prepared to work on shift as part of a 24/7 shift team based onsite - 4 days on - 4 days off.Microsoft Certified: SecurityOperationsAnalyst Associate Certification (SC200) is a mandatory requirement for role fulfilmentExperience working with SIEM technologies and security toolingAn understanding of IT Infrastructure and NetworkingAn understanding of vulnerability and threat More ❯
incident response and watchfloor operations. This senior role requires deep expertise in detecting, analyzing, and responding to sophisticated cyber threats, with responsibilities that include mentoring junior staff and enhancing SOC processes. Key Responsibilities: • Advanced Threat Monitoring and Analysis: Lead threat monitoring activities to detect and analyze complex security incidents using SIEM tools, IDS/IPS, EDR, and other advanced … inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes. • Documentation and Process Improvement: Ensure thorough documentation of incidents and contribute to the continuous improvement of SOC playbooks and response protocols. • Watchfloor Operations Leadership: Oversee shift-based SOCoperations, ensuring 24/7 coverage and adherence to established incident response procedures. • Cross-Functional Collaboration: Work … closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization's overall security posture. Qualifications: Educational Background: - Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Equivalent experience and certifications may be considered. Technical Expertise: - Extensive experience with cybersecurity tools, including SIEM (e.g., Splunk, Sentinel), EDR, IDS/IPS, firewalls More ❯
Position Summary: We are seeking a Senior SOCOperationsAnalyst to support Watch-Floor Operations on a rotating shift schedule. The ideal candidate will possess strong analytical skills and a foundational understanding of cybersecurity operations, with specific exposure to threat detection and incident response. This role is critical to our SecurityOperations Center (SOC), providing … Preferred Qualifications: Experience with Microsoft Sentinel (SIEM). One or more of the following certifications: GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Education: Bachelor's Degree (B.S. or B.A.) in Cybersecurity, Information Technology, Computer Science, or More ❯
Position Summary: We are seeking a Junior SOCOperationsAnalyst to support Watch-Floor Operations on a rotating shift schedule. The ideal candidate will possess strong analytical skills and a foundational understanding of cybersecurity operations, with specific exposure to threat detection and incident response. This role is critical to our SecurityOperations Center (SOC), providing … Preferred Qualifications: Experience with Microsoft Sentinel (SIEM). One or more of the following certifications: GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Education: Bachelor's Degree (B.S. or B.A.) in Cybersecurity, Information Technology, Computer Science, or More ❯
Position Summary: We are seeking a Mid Level SOCOperationsAnalyst to support Watch-Floor Operations on a rotating shift schedule. The ideal candidate will possess strong analytical skills and a foundational understanding of cybersecurity operations, with specific exposure to threat detection and incident response. This role is critical to our SecurityOperations Center (SOC), providing … Preferred Qualifications: Experience with Microsoft Sentinel (SIEM). One or more of the following certifications: GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Education: Bachelor's Degree (B.S. or B.A.) in Cybersecurity, Information Technology, Computer Science, or More ❯
The Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission … endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Responsibilities Support SOC team in operating and performing duties in a SecurityOperations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. … gather data to identify and respond to network intrusions. Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency. Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and More ❯
Opportunity PeopleTec is currently seeking a SOCOperationsAnalyst to support our Huntsville, AL location. Job Functions: Responsible for monitoring computer networks for security issues. Investigating security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. … of clearance during their employment. Education Requirements : BS or B.A. Degree Preferred Qualifications: Microsoft Sentinel GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Overview People First. Technology Always. PeopleTec, Inc. is an employee-owned small business founded More ❯
Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst 2-3 Days onsite - Crawley 6-9 Month duration Reporting line: The Analyst will report to the Cyber Security Response Manager and work within the Information Systems directorate, based in the Crawley office. Job purpose: The role of an Incident Response (CSIRT)/SOC … protect network systems and customer data from cyber threats. Dimensions People – Work collaboratively in a team of around 14 cyber securityoperations staff. Mentor Level 1 and Level 2 SOC Analysts, providing guidance and training. Suppliers – Regular interaction with technical resources from outsourced Managed Security Service Providers (MSSPs) and cyber security tooling vendors. Communication – Communicate technical cybersecurity concepts to … vulnerabilities, and anomalies, then use this intelligence and tooling to uncover and remove hidden threats that may have bypassed existing defences across IT and OT environments. Policy Development: Develop SOC policies, technical standards, and procedure documentation aligned to industry best practice. Log Management: Work with MSSPs and service owners to ensure log sources are onboarded into the SIEM solution. More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/SecurityOperationsCentre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you … escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration … simulation exercises and continuous improvement initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications More ❯