The team you'll be working with: SOC Analyst (L2) We are currently recruiting for a Senior Associate level Managed Detection and Response SOC Analyst Level 2 to join our growing Security Operations Centre business. This role will be based on-site in Birmingham, and we need candidates who are able to work in a job that involves 24/7 operations, likely in shift patterns of 4 days on, 4 days off. About Us NTT DATA is one of the world's largest global security services providers with over 7,500 security SMEs and an integration partner to many of the world's most recognized security technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. In a constantly changing world, we work together with our people, clients, and communities to enable them to fulfill their potential and do great things. We believe that by bringing everyone together, we can solve problems using innovative technology to create a sustainable and secure world. This is a great opportunity for you to play a pivotal role in helping to shape our client's transformation journeys. What you'll be doing: What you will be doing; The primary function of the SOC Analyst (L2) is to analyze incidents escalated by the SOC Analyst (L1) and undertake detailed investigation of security events. The Security Analyst (L2) will determine whether a security event qualifies as an incident and will coordinate with the customer's IT and security teams for resolution. Main Duties Security Monitoring & Investigation: Monitor SIEM tools to ensure high levels of security operations delivery. Oversee and enhance security monitoring systems to detect and analyze potential security incidents. Conduct real-time analysis of security events and escalate as needed. Support other teams in incident investigations, determining root cause and impact. Document findings and lessons learned to improve incident response procedures. Ensure runbooks are followed and are fit for purpose. Incident Response: Lead and coordinate incident response activities to contain, eradicate, and recover from security incidents. Develop and maintain incident response plans aligned with industry best practices. Manage escalations during security incidents. Follow major incident processes. Threat Intelligence: Stay updated on cybersecurity threats and vulnerabilities, integrating threat intelligence into monitoring processes. Contribute to threat intelligence feeds for proactive detection. Security Tool Management: Manage and optimize SIEM tools, ensuring proper configuration and updates. Develop and implement SOC use cases. Evaluate new security technologies and recommend infrastructure enhancements. Collaboration: Work with cross-functional teams, including IT, legal, and management, on security incidents and preventive measures. Provide guidance to other analysts. Coordinate with technical teams to monitor new and updated services. Documentation: Maintain accurate documentation of security procedures, incident response plans, and analysis reports. Create post-incident reports for management and stakeholders. Support the creation of monthly reporting packs as per contractual requirements. Document event and incident management processes, runbooks, and playbooks. Other responsibilities: Participate in scoping and establishing new solutions. Assist pre-sales teams with requirements for new opportunities. Demonstrate SOC tools to clients. Recommend continual service improvements based on incident analysis. What experience you'll bring: What you will bring; This role is based on-site in Birmingham; candidates must be able to work in a 24/7 operation, likely in shift patterns of 4 days on, 4 days off. Must be able to obtain or already hold SC clearance. Good understanding of Incident Response approaches. Hands-on experience with Microsoft Sentinel or similar SIEM tools. Strong verbal and written English communication skills. Excellent interpersonal and presentation skills. Strong analytical skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work independently with minimal supervision. Willingness to work in a 24/7 or on-call role. Education & Experience Requirements 3-5 years of experience in IT security, preferably in a SOC/NOC environment. Cybersecurity certifications such as GIAC, ISC2, SC-200 are preferred. Experience with Cloud platforms (AWS and/or Microsoft Azure). Proficiency with Microsoft Office, especially Excel and Word. Reports to Security Director - NTT DATA UK Security Practice Client Delivery Director - NTT DATA UK Managed Services Who we are: We're a global business that empowers local teams, undertaking impactful work that changes the world. Our portfolio includes consulting, applications, cloud, and infrastructure services, offering opportunities to achieve great things with talented colleagues and clients. Our inclusive environment promotes respect, accountability, and continuous learning, fostering collaboration, well-being, growth, and agility. We are proud of our diversity and inclusion initiatives, including various Employee Networks. For more about our diversity efforts, visit: Creating Inclusion Together at NTT DATA UK NTT DATA What we'll offer you: We provide benefits supporting your physical, emotional, and financial well-being. Our Learning and Development team offers continuous growth opportunities. Flexible work options are available. More about NTT DATA UK & Ireland: We are an equal opportunities employer and a Disability Confident employer. We guarantee an interview to applicants with disabilities who meet role requirements and request accommodations during recruitment. Back to search Email to a friend Apply now
Jul 04, 2025
Full time
The team you'll be working with: SOC Analyst (L2) We are currently recruiting for a Senior Associate level Managed Detection and Response SOC Analyst Level 2 to join our growing Security Operations Centre business. This role will be based on-site in Birmingham, and we need candidates who are able to work in a job that involves 24/7 operations, likely in shift patterns of 4 days on, 4 days off. About Us NTT DATA is one of the world's largest global security services providers with over 7,500 security SMEs and an integration partner to many of the world's most recognized security technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. In a constantly changing world, we work together with our people, clients, and communities to enable them to fulfill their potential and do great things. We believe that by bringing everyone together, we can solve problems using innovative technology to create a sustainable and secure world. This is a great opportunity for you to play a pivotal role in helping to shape our client's transformation journeys. What you'll be doing: What you will be doing; The primary function of the SOC Analyst (L2) is to analyze incidents escalated by the SOC Analyst (L1) and undertake detailed investigation of security events. The Security Analyst (L2) will determine whether a security event qualifies as an incident and will coordinate with the customer's IT and security teams for resolution. Main Duties Security Monitoring & Investigation: Monitor SIEM tools to ensure high levels of security operations delivery. Oversee and enhance security monitoring systems to detect and analyze potential security incidents. Conduct real-time analysis of security events and escalate as needed. Support other teams in incident investigations, determining root cause and impact. Document findings and lessons learned to improve incident response procedures. Ensure runbooks are followed and are fit for purpose. Incident Response: Lead and coordinate incident response activities to contain, eradicate, and recover from security incidents. Develop and maintain incident response plans aligned with industry best practices. Manage escalations during security incidents. Follow major incident processes. Threat Intelligence: Stay updated on cybersecurity threats and vulnerabilities, integrating threat intelligence into monitoring processes. Contribute to threat intelligence feeds for proactive detection. Security Tool Management: Manage and optimize SIEM tools, ensuring proper configuration and updates. Develop and implement SOC use cases. Evaluate new security technologies and recommend infrastructure enhancements. Collaboration: Work with cross-functional teams, including IT, legal, and management, on security incidents and preventive measures. Provide guidance to other analysts. Coordinate with technical teams to monitor new and updated services. Documentation: Maintain accurate documentation of security procedures, incident response plans, and analysis reports. Create post-incident reports for management and stakeholders. Support the creation of monthly reporting packs as per contractual requirements. Document event and incident management processes, runbooks, and playbooks. Other responsibilities: Participate in scoping and establishing new solutions. Assist pre-sales teams with requirements for new opportunities. Demonstrate SOC tools to clients. Recommend continual service improvements based on incident analysis. What experience you'll bring: What you will bring; This role is based on-site in Birmingham; candidates must be able to work in a 24/7 operation, likely in shift patterns of 4 days on, 4 days off. Must be able to obtain or already hold SC clearance. Good understanding of Incident Response approaches. Hands-on experience with Microsoft Sentinel or similar SIEM tools. Strong verbal and written English communication skills. Excellent interpersonal and presentation skills. Strong analytical skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work independently with minimal supervision. Willingness to work in a 24/7 or on-call role. Education & Experience Requirements 3-5 years of experience in IT security, preferably in a SOC/NOC environment. Cybersecurity certifications such as GIAC, ISC2, SC-200 are preferred. Experience with Cloud platforms (AWS and/or Microsoft Azure). Proficiency with Microsoft Office, especially Excel and Word. Reports to Security Director - NTT DATA UK Security Practice Client Delivery Director - NTT DATA UK Managed Services Who we are: We're a global business that empowers local teams, undertaking impactful work that changes the world. Our portfolio includes consulting, applications, cloud, and infrastructure services, offering opportunities to achieve great things with talented colleagues and clients. Our inclusive environment promotes respect, accountability, and continuous learning, fostering collaboration, well-being, growth, and agility. We are proud of our diversity and inclusion initiatives, including various Employee Networks. For more about our diversity efforts, visit: Creating Inclusion Together at NTT DATA UK NTT DATA What we'll offer you: We provide benefits supporting your physical, emotional, and financial well-being. Our Learning and Development team offers continuous growth opportunities. Flexible work options are available. More about NTT DATA UK & Ireland: We are an equal opportunities employer and a Disability Confident employer. We guarantee an interview to applicants with disabilities who meet role requirements and request accommodations during recruitment. Back to search Email to a friend Apply now
Senior DLP - Investigations page is loaded Senior DLP - Investigations Apply locations London, United Kingdom time type Full time posted on Posted 2 Days Ago job requisition id R The CISO organization protects the information assets of LSEG through managing risk, deploying effective security risk framework and ensuring regulatory compliance. This role will sit within the Data Loss Prevention (DLP) Team which is part of Global Security Operations Centre. This team is responsible for ensuring that sensitive and confidential data detection and prevention controls are appropriate and in line with LSEG security policies. It is also responsible for identifying opportunities to streamline our support processes and enhancements that can be made in our systems. The candidate will ideally have a technical background, with a deep understanding of Data Loss Prevention and information classification. Alongside the team, the role involves working with GSOC and other teams. The candidate will have knowledge of the DLP technologies and capabilities used in an enterprise, and increasingly cloud based environment. Key Functions of the role: Hands-on operational experience with O365, Purview, DLP security controls and tools governing data-in-motion, data-in-use, and data-at-rest, as well as knowledge of endpoint protection technology Ample knowledge of technology maintenance requirements for DLP solutions coupled with experience identifying threats Experience with DLP strategy and policy creation and maintenance Demonstrated ability to design holistic DLP capability leveraging multiple technologies across endpoints, web traffic, and email Strong written and verbal communication/presentation skills to represent capabilities to stakeholders, provide direction to DLP team members, and engage with employees on DLP escalations Ability to build strong relationships with business and technology stakeholders, self-motivation, personal drive and high energy are highly valuable for this position Desire and ability to integrate DLP capabilities into a comprehensive Insider Threat program Hands-on experience conducting DLP operations in the Cloud as well as desired knowledge of other solutions like UEBA,CASB etc. Experience utilizing SIEM/SOAR for data analytics and investigations Passionate about innovation and enjoys the challenges of creating something new Ideally having experience leading teams operationally and mentoring technical associates Stays current with evolving technologies via formal training and self-directed education LSEG is a leading global financial markets infrastructure and data provider. Our purpose is driving financial stability, empowering economies and enabling customers to create sustainable growth. Our purpose is the foundation on which our culture is built. Our values of Integrity, Partnership , Excellence and Change underpin our purpose and set the standard for everything we do, every day. They go to the heart of who we are and guide our decision making and everyday actions. Working with us means that you will be part of a dynamic organisation of 25,000 people across 65 countries. However, we will value your individuality and enable you to bring your true self to work so you can help enrich our diverse workforce. You will be part of a collaborative and creative culture where we encourage new ideas and are committed to sustainability across our global business. You will experience the critical role we have in helping to re-engineer the financial ecosystem to support and drive sustainable economic growth. Together, we are aiming to achieve this growth by accelerating the just transition to net zero, enabling growth of the green economy and creating inclusive economic opportunity. LSEG offers a range of tailored benefits and support, including healthcare, retirement planning, paid volunteering days and wellbeing initiatives. We are proud to be an equal opportunities employer. This means that we do not discriminate on the basis of anyone's race, religion, colour, national origin, gender, sexual orientation, gender identity, gender expression, age, marital status, veteran status, pregnancy or disability, or any other basis protected under applicable law. Conforming with applicable law, we can reasonably accommodate applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Please take a moment to read this privacy notice carefully, as it describes what personal information London Stock Exchange Group (LSEG) (we) may hold about you, what it's used for, and how it's obtained, your rights and how to contact us as a data subject . If you are submitting as a Recruitment Agency Partner, it is essential and your responsibility to ensure that candidates applying to LSEG are aware of this privacy notice. Similar Jobs (2) Senior Manager, Penetration Testing locations 2 Locations time type Full time posted on Posted 30+ Days Ago Senior Analyst, Technology and Cyber Security GRC locations London, United Kingdom time type Full time posted on Posted 30+ Days Ago
Jul 04, 2025
Full time
Senior DLP - Investigations page is loaded Senior DLP - Investigations Apply locations London, United Kingdom time type Full time posted on Posted 2 Days Ago job requisition id R The CISO organization protects the information assets of LSEG through managing risk, deploying effective security risk framework and ensuring regulatory compliance. This role will sit within the Data Loss Prevention (DLP) Team which is part of Global Security Operations Centre. This team is responsible for ensuring that sensitive and confidential data detection and prevention controls are appropriate and in line with LSEG security policies. It is also responsible for identifying opportunities to streamline our support processes and enhancements that can be made in our systems. The candidate will ideally have a technical background, with a deep understanding of Data Loss Prevention and information classification. Alongside the team, the role involves working with GSOC and other teams. The candidate will have knowledge of the DLP technologies and capabilities used in an enterprise, and increasingly cloud based environment. Key Functions of the role: Hands-on operational experience with O365, Purview, DLP security controls and tools governing data-in-motion, data-in-use, and data-at-rest, as well as knowledge of endpoint protection technology Ample knowledge of technology maintenance requirements for DLP solutions coupled with experience identifying threats Experience with DLP strategy and policy creation and maintenance Demonstrated ability to design holistic DLP capability leveraging multiple technologies across endpoints, web traffic, and email Strong written and verbal communication/presentation skills to represent capabilities to stakeholders, provide direction to DLP team members, and engage with employees on DLP escalations Ability to build strong relationships with business and technology stakeholders, self-motivation, personal drive and high energy are highly valuable for this position Desire and ability to integrate DLP capabilities into a comprehensive Insider Threat program Hands-on experience conducting DLP operations in the Cloud as well as desired knowledge of other solutions like UEBA,CASB etc. Experience utilizing SIEM/SOAR for data analytics and investigations Passionate about innovation and enjoys the challenges of creating something new Ideally having experience leading teams operationally and mentoring technical associates Stays current with evolving technologies via formal training and self-directed education LSEG is a leading global financial markets infrastructure and data provider. Our purpose is driving financial stability, empowering economies and enabling customers to create sustainable growth. Our purpose is the foundation on which our culture is built. Our values of Integrity, Partnership , Excellence and Change underpin our purpose and set the standard for everything we do, every day. They go to the heart of who we are and guide our decision making and everyday actions. Working with us means that you will be part of a dynamic organisation of 25,000 people across 65 countries. However, we will value your individuality and enable you to bring your true self to work so you can help enrich our diverse workforce. You will be part of a collaborative and creative culture where we encourage new ideas and are committed to sustainability across our global business. You will experience the critical role we have in helping to re-engineer the financial ecosystem to support and drive sustainable economic growth. Together, we are aiming to achieve this growth by accelerating the just transition to net zero, enabling growth of the green economy and creating inclusive economic opportunity. LSEG offers a range of tailored benefits and support, including healthcare, retirement planning, paid volunteering days and wellbeing initiatives. We are proud to be an equal opportunities employer. This means that we do not discriminate on the basis of anyone's race, religion, colour, national origin, gender, sexual orientation, gender identity, gender expression, age, marital status, veteran status, pregnancy or disability, or any other basis protected under applicable law. Conforming with applicable law, we can reasonably accommodate applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Please take a moment to read this privacy notice carefully, as it describes what personal information London Stock Exchange Group (LSEG) (we) may hold about you, what it's used for, and how it's obtained, your rights and how to contact us as a data subject . If you are submitting as a Recruitment Agency Partner, it is essential and your responsibility to ensure that candidates applying to LSEG are aware of this privacy notice. Similar Jobs (2) Senior Manager, Penetration Testing locations 2 Locations time type Full time posted on Posted 30+ Days Ago Senior Analyst, Technology and Cyber Security GRC locations London, United Kingdom time type Full time posted on Posted 30+ Days Ago
On behalf of our client, we are seeking to recruit several SOC Analysts on an initial 6 - month contract. As SOC Analysts you will be assisting Information Management in meeting the challenges and demands of countering the Cyber Threat. You will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Role: SOC Analyst Pay: 45 - 85 per hour via Umbrella Location: Stevenage Contract: 6-month contract on a shift basis IR35 Status: Inside Security Clearance : SC Required to start will be DV cleared. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies Essential Skills: A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Experience Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies Other Shift patterns Blocks of 4-5 days on & 4-5 days off. Either early, lates or nights across the shift blocks (rotating). 2 weekends per 28 days. 28 hours per week If you are interested in applying for this position and you meet the requirements, please send your updated CV to: Natalie Dalkin at Line Up Aviation Line Up Aviation has carved its own place in the recruitment of Aviation and Aerospace personnel all over the world for more than 30 years. We work with some of the industry's best known companies who demand the highest standard of applicants. " on Twitter for all of our latest vacancies, news and pictures from our busy UK Head Office. Interact with us using the tag at anytime! Thank you for your follow!"
Jul 03, 2025
Contractor
On behalf of our client, we are seeking to recruit several SOC Analysts on an initial 6 - month contract. As SOC Analysts you will be assisting Information Management in meeting the challenges and demands of countering the Cyber Threat. You will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Role: SOC Analyst Pay: 45 - 85 per hour via Umbrella Location: Stevenage Contract: 6-month contract on a shift basis IR35 Status: Inside Security Clearance : SC Required to start will be DV cleared. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies Essential Skills: A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Experience Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies Other Shift patterns Blocks of 4-5 days on & 4-5 days off. Either early, lates or nights across the shift blocks (rotating). 2 weekends per 28 days. 28 hours per week If you are interested in applying for this position and you meet the requirements, please send your updated CV to: Natalie Dalkin at Line Up Aviation Line Up Aviation has carved its own place in the recruitment of Aviation and Aerospace personnel all over the world for more than 30 years. We work with some of the industry's best known companies who demand the highest standard of applicants. " on Twitter for all of our latest vacancies, news and pictures from our busy UK Head Office. Interact with us using the tag at anytime! Thank you for your follow!"
Job Title: Senior SOC Analyst Location: Stevenage Rate: 85 p/h - We are booking interviews next week! Please call or email for a slot An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. The Role: So, what will you be doing as a SOC Analyst ? To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What are we looking for in our next SOC Analyst ? A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. My client is keen to get this position filled ASAP, so if you feel you have the skills and desire to provide passion and drive as the next SOC Analyst, this is the opportunity for you! So, if you are interested in joining a well-established, renowned, globally recognised organisation working with experts in their field as the next SOC Analyst, hit that apply button now! PLEASE NOTE Security Clearance (SC) or eligibility to gain is required to be considered for this vacancy Services advertised by Gold Group are those of an Agency and/or an Employment Business. We will contact you within the next 14 days if you are selected for interview. For a copy of our privacy policy please visit our website.
Jul 03, 2025
Contractor
Job Title: Senior SOC Analyst Location: Stevenage Rate: 85 p/h - We are booking interviews next week! Please call or email for a slot An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. The Role: So, what will you be doing as a SOC Analyst ? To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What are we looking for in our next SOC Analyst ? A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. My client is keen to get this position filled ASAP, so if you feel you have the skills and desire to provide passion and drive as the next SOC Analyst, this is the opportunity for you! So, if you are interested in joining a well-established, renowned, globally recognised organisation working with experts in their field as the next SOC Analyst, hit that apply button now! PLEASE NOTE Security Clearance (SC) or eligibility to gain is required to be considered for this vacancy Services advertised by Gold Group are those of an Agency and/or an Employment Business. We will contact you within the next 14 days if you are selected for interview. For a copy of our privacy policy please visit our website.
Job Title: SOC Analyst Location: Stevenage Rate: 45 p/h - We are booking interviews next week! Please call or email for a slot An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. The Role: So, what will you be doing as a SOC Analyst ? To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What are we looking for in our next SOC Analyst ? A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. My client is keen to get this position filled ASAP, so if you feel you have the skills and desire to provide passion and drive as the next SOC Analyst, this is the opportunity for you! So, if you are interested in joining a well-established, renowned, globally recognised organisation working with experts in their field as the next SOC Analyst, hit that apply button now! PLEASE NOTE Security Clearance (SC) or eligibility to gain is required to be considered for this vacancy Services advertised by Gold Group are those of an Agency and/or an Employment Business. We will contact you within the next 14 days if you are selected for interview. For a copy of our privacy policy please visit our website.
Jul 03, 2025
Contractor
Job Title: SOC Analyst Location: Stevenage Rate: 45 p/h - We are booking interviews next week! Please call or email for a slot An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. The Role: So, what will you be doing as a SOC Analyst ? To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What are we looking for in our next SOC Analyst ? A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. My client is keen to get this position filled ASAP, so if you feel you have the skills and desire to provide passion and drive as the next SOC Analyst, this is the opportunity for you! So, if you are interested in joining a well-established, renowned, globally recognised organisation working with experts in their field as the next SOC Analyst, hit that apply button now! PLEASE NOTE Security Clearance (SC) or eligibility to gain is required to be considered for this vacancy Services advertised by Gold Group are those of an Agency and/or an Employment Business. We will contact you within the next 14 days if you are selected for interview. For a copy of our privacy policy please visit our website.
Location: Stevenage (shift pattern - detailed below) Duration: 6 month initial contract Rate for Mid-Level: 45ph UMB (Inside IR35) Hours: 28 hours per week. Role details: Our client, a leading defence company, are looking to bring in multiple SOC Analysts due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the most dynamic fields in defence. Key Responsibilities: The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What we are looking for in you: Experience in Cyber Security with a focus on Network Security, Infrastructure and Operating Systems & Applications Knowledge of IT Security standard methodologies Understanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat hunting activities Strong analytical skills and a keen mindset Experience within Defensive Cyber-attack methodologies and frameworks Understanding of Malware capabilities, attack vectors, propagation and impact Good communication skills for liaising with business units and suppliers Desirable Skills for Senior grade: Root cause analysis and leadership in T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and hunting methodologies Additional information: These roles are fully site based in Stevenage Shift Pattern: Blocks on 4-5 days on, and 4-5 das off with either early, lates or nights across the shift blocks (rotating pattern). 2 weekend per 28 days will also be required These roles are 28 hours per week SC will be required prior to starting the role, with a view of applying candidates for DV clearance (bonus if you already hold this!) If you have the required experience and skills and are looking for a challenging role in the Defence & Security sector, we encourage you to apply now!
Jul 03, 2025
Contractor
Location: Stevenage (shift pattern - detailed below) Duration: 6 month initial contract Rate for Mid-Level: 45ph UMB (Inside IR35) Hours: 28 hours per week. Role details: Our client, a leading defence company, are looking to bring in multiple SOC Analysts due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the most dynamic fields in defence. Key Responsibilities: The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What we are looking for in you: Experience in Cyber Security with a focus on Network Security, Infrastructure and Operating Systems & Applications Knowledge of IT Security standard methodologies Understanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat hunting activities Strong analytical skills and a keen mindset Experience within Defensive Cyber-attack methodologies and frameworks Understanding of Malware capabilities, attack vectors, propagation and impact Good communication skills for liaising with business units and suppliers Desirable Skills for Senior grade: Root cause analysis and leadership in T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and hunting methodologies Additional information: These roles are fully site based in Stevenage Shift Pattern: Blocks on 4-5 days on, and 4-5 das off with either early, lates or nights across the shift blocks (rotating pattern). 2 weekend per 28 days will also be required These roles are 28 hours per week SC will be required prior to starting the role, with a view of applying candidates for DV clearance (bonus if you already hold this!) If you have the required experience and skills and are looking for a challenging role in the Defence & Security sector, we encourage you to apply now!
Senior SOC Analyst 6 month contract Based in Stevenage Offering 85ph Inside IR35 Are you an experienced SOC Analyst? Do you have hands-on experience with IDS/IPS technologies? Do you want to work with an industry-leading company? If your answer to these is yes, then this could be the role for you! As the Full Senior SOC Analyst, you will be working alongside a market-leading Defence and Aerospace company who are constantly growing and developing. They are always looking to bring on new talents such as yourself and further develop your skills to enable you to grow within the company and industry. You will be involved in: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Conduct activities in line with SOC Maturity and continuous improvement Your skillset may include: Background in Cyber Security Security awareness Experience in Network Security, Infrastructure, and Operating Systems & Applications Knowledge of IT Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat-hunting activities Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation, and impact. Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further! Senior SOC Analyst 6 month contract Based in Stevenage Offering 85ph Inside IR35 Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission. Where the role is marked as Outside IR35 in the advertisement this is subject to receipt of a final Status Determination Statement from the end Client and may be subject to change.
Jul 03, 2025
Contractor
Senior SOC Analyst 6 month contract Based in Stevenage Offering 85ph Inside IR35 Are you an experienced SOC Analyst? Do you have hands-on experience with IDS/IPS technologies? Do you want to work with an industry-leading company? If your answer to these is yes, then this could be the role for you! As the Full Senior SOC Analyst, you will be working alongside a market-leading Defence and Aerospace company who are constantly growing and developing. They are always looking to bring on new talents such as yourself and further develop your skills to enable you to grow within the company and industry. You will be involved in: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Conduct activities in line with SOC Maturity and continuous improvement Your skillset may include: Background in Cyber Security Security awareness Experience in Network Security, Infrastructure, and Operating Systems & Applications Knowledge of IT Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat-hunting activities Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation, and impact. Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further! Senior SOC Analyst 6 month contract Based in Stevenage Offering 85ph Inside IR35 Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission. Where the role is marked as Outside IR35 in the advertisement this is subject to receipt of a final Status Determination Statement from the end Client and may be subject to change.
Location: Stevenage (shift pattern - detailed below) Duration: 6 month initial contract Rate for Senior-Level: 85ph UMB (Inside IR35) Hours: 28 hours per week. Role details: Our client, a leading defence company, are looking to bring in multiple SOC Analysts due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the most dynamic fields in defence. Key Responsibilities: The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What we are looking for in you: Experience in Cyber Security with a focus on Network Security, Infrastructure and Operating Systems & Applications Knowledge of IT Security standard methodologies Understanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat hunting activities Strong analytical skills and a keen mindset Experience within Defensive Cyber-attack methodologies and frameworks Understanding of Malware capabilities, attack vectors, propagation and impact Good communication skills for liaising with business units and suppliers Desirable Skills for Senior grade: Root cause analysis and leadership in T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and hunting methodologies Additional information: These roles are fully site based in Stevenage Shift Pattern: Blocks on 4-5 days on, and 4-5 das off with either early, lates or nights across the shift blocks (rotating pattern). 2 weekend per 28 days will also be required These roles are 28 hours per week SC will be required prior to starting the role, with a view of applying candidates for DV clearance (bonus if you already hold this!) If you have the required experience and skills and are looking for a challenging role in the Defence & Security sector, we encourage you to apply now!
Jul 03, 2025
Contractor
Location: Stevenage (shift pattern - detailed below) Duration: 6 month initial contract Rate for Senior-Level: 85ph UMB (Inside IR35) Hours: 28 hours per week. Role details: Our client, a leading defence company, are looking to bring in multiple SOC Analysts due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the most dynamic fields in defence. Key Responsibilities: The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement What we are looking for in you: Experience in Cyber Security with a focus on Network Security, Infrastructure and Operating Systems & Applications Knowledge of IT Security standard methodologies Understanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat hunting activities Strong analytical skills and a keen mindset Experience within Defensive Cyber-attack methodologies and frameworks Understanding of Malware capabilities, attack vectors, propagation and impact Good communication skills for liaising with business units and suppliers Desirable Skills for Senior grade: Root cause analysis and leadership in T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and hunting methodologies Additional information: These roles are fully site based in Stevenage Shift Pattern: Blocks on 4-5 days on, and 4-5 das off with either early, lates or nights across the shift blocks (rotating pattern). 2 weekend per 28 days will also be required These roles are 28 hours per week SC will be required prior to starting the role, with a view of applying candidates for DV clearance (bonus if you already hold this!) If you have the required experience and skills and are looking for a challenging role in the Defence & Security sector, we encourage you to apply now!
Meritus are recruiting for a leading Defence company in Stevenage who are looking for multiple SOC analysts to develop their in house cyber security function. SOC ANALYST - 45 TO 85PH INSIDE IR35 - ONSITE IN STEVENAGE - SC TO DV CLEARANCE - 6 MONTHS WILL BE EXTENDED Overview of department: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
Jul 03, 2025
Contractor
Meritus are recruiting for a leading Defence company in Stevenage who are looking for multiple SOC analysts to develop their in house cyber security function. SOC ANALYST - 45 TO 85PH INSIDE IR35 - ONSITE IN STEVENAGE - SC TO DV CLEARANCE - 6 MONTHS WILL BE EXTENDED Overview of department: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
I am looking for a highly skilled Security Operations & Threat Intelligence Analyst to join a cybersecurity provider dedicated to protecting organizations from cyber threats. With global reach and deep technical expertise, the company delivers advanced threat detection, response, and intelligence services. Its mission is to build a safer digital society by helping businesses stay resilient through proactive security solutions and trusted partnerships. Responsibilities: As a Security Operations & Threat Intelligence Analyst, you will monitor and investigate security alerts using SIEM tools, conduct threat hunting, and analyze suspicious activity. You ll gather and report threat intelligence, update detection rules and response playbooks, and collaborate across teams to improve security. You ll also track threat actor tactics using MITRE ATT&CK and assist with incident response and reviews. Key skills required: • 3+ years of experience in Security Operations, Threat Intelligence, or Incident Response roles • Proficient in analyzing logs, network traffic, malware behavior, and attack vectors • Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) and EDR solutions • Familiar with threat intelligence platforms (e.g., MISP, Recorded Future, ThreatConnect) • Scripting experience in Python, Bash, or similar for automation and analysis • Must hold or be eligible for a top-secret security clearance Why Join? • Join a mission-driven team focused on proactive defense and cyber resilience • Tackle real-world threats using modern tools and techniques • Enjoy competitive compensation, benefits, and professional development opportunities Security Operations & Threat Intelligence Analyst - up to $250k - USA (Multiple offices across the country)
Jun 29, 2025
Full time
I am looking for a highly skilled Security Operations & Threat Intelligence Analyst to join a cybersecurity provider dedicated to protecting organizations from cyber threats. With global reach and deep technical expertise, the company delivers advanced threat detection, response, and intelligence services. Its mission is to build a safer digital society by helping businesses stay resilient through proactive security solutions and trusted partnerships. Responsibilities: As a Security Operations & Threat Intelligence Analyst, you will monitor and investigate security alerts using SIEM tools, conduct threat hunting, and analyze suspicious activity. You ll gather and report threat intelligence, update detection rules and response playbooks, and collaborate across teams to improve security. You ll also track threat actor tactics using MITRE ATT&CK and assist with incident response and reviews. Key skills required: • 3+ years of experience in Security Operations, Threat Intelligence, or Incident Response roles • Proficient in analyzing logs, network traffic, malware behavior, and attack vectors • Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) and EDR solutions • Familiar with threat intelligence platforms (e.g., MISP, Recorded Future, ThreatConnect) • Scripting experience in Python, Bash, or similar for automation and analysis • Must hold or be eligible for a top-secret security clearance Why Join? • Join a mission-driven team focused on proactive defense and cyber resilience • Tackle real-world threats using modern tools and techniques • Enjoy competitive compensation, benefits, and professional development opportunities Security Operations & Threat Intelligence Analyst - up to $250k - USA (Multiple offices across the country)
IT Security Analyst - Permanent role - £41000 - £44000 per annum + Benefits - Central London - Hybrid Job purpose: Monitor security logs across the organisation. Assist the IT Security Manager to investigate security breaches and other cyber security incidents. Install effective security measures and operate software to protect systems and information infrastructure, including firewalls and data encryptions. Key Accountabilities: Effectively monitor the companies estate computer networks for security issues. Ability to learn and apply new security concepts. Investigate security breaches and other cyber security incidents, resolving them efficiently. Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs. Clearly document security breaches and assess the damage they cause, whilst also making well-considered recommendations to avoid similar security breaches. Collaborate well with the IT Security Manager to perform tests and uncover network vulnerabilities. Assist with resolving detected vulnerabilities to maintain a high-security standard. Research security enhancements and make well-considered and informed recommendations to IT Security Manager. Examine security systems and web applications. Monitor security access across the organisation. Assist with conducting security assessments through vulnerability testing and risk analysis within good time and to a high standard. Assist with performing both internal and external security audits. Analyse security logs from various systems for breaches and make recommendations as appropriate. Assist in verifying the security of third-party vendors and collaborating with them to fulfill security requirements. Review daily security logs for abnormal events and escalate them to the IT Security teams in a timely manner. Conduct technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation. Knowledge, skills and experience Essential skills: BSc in Cyber Security, Computer Science, or equivalent practical experience. Demonstrable technical knowledge of hybrid estate. Relevant experience of reviewing technical security events. Skilled in implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorized access and potential threats. Substantial experience of testing and reviewing security solutions. Practical experience of effectively managing cyber incidents. Strong reasoning and advisory skills, with the ability to effectively engage with and influence senior management. Able to communicate confidently and effectively with staff at all levels in the organisation. Able to collaborate well with third parties to understand critical security bottlenecks. Strong knowledge of Microsoft Defender and network architecture. Substantial experience in a Security Operations Centre (SoC), Network Operations Centre (NoC). Strong understanding of Incident Response processes and methodologies and experience with MITRE ATT&CK framework to map and analyse threats. Knowledge of Endpoint Detection and Response (EDR) platforms. Familiarity with threat hunting techniques and processes.
Jun 28, 2025
Full time
IT Security Analyst - Permanent role - £41000 - £44000 per annum + Benefits - Central London - Hybrid Job purpose: Monitor security logs across the organisation. Assist the IT Security Manager to investigate security breaches and other cyber security incidents. Install effective security measures and operate software to protect systems and information infrastructure, including firewalls and data encryptions. Key Accountabilities: Effectively monitor the companies estate computer networks for security issues. Ability to learn and apply new security concepts. Investigate security breaches and other cyber security incidents, resolving them efficiently. Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs. Clearly document security breaches and assess the damage they cause, whilst also making well-considered recommendations to avoid similar security breaches. Collaborate well with the IT Security Manager to perform tests and uncover network vulnerabilities. Assist with resolving detected vulnerabilities to maintain a high-security standard. Research security enhancements and make well-considered and informed recommendations to IT Security Manager. Examine security systems and web applications. Monitor security access across the organisation. Assist with conducting security assessments through vulnerability testing and risk analysis within good time and to a high standard. Assist with performing both internal and external security audits. Analyse security logs from various systems for breaches and make recommendations as appropriate. Assist in verifying the security of third-party vendors and collaborating with them to fulfill security requirements. Review daily security logs for abnormal events and escalate them to the IT Security teams in a timely manner. Conduct technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation. Knowledge, skills and experience Essential skills: BSc in Cyber Security, Computer Science, or equivalent practical experience. Demonstrable technical knowledge of hybrid estate. Relevant experience of reviewing technical security events. Skilled in implementing a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorized access and potential threats. Substantial experience of testing and reviewing security solutions. Practical experience of effectively managing cyber incidents. Strong reasoning and advisory skills, with the ability to effectively engage with and influence senior management. Able to communicate confidently and effectively with staff at all levels in the organisation. Able to collaborate well with third parties to understand critical security bottlenecks. Strong knowledge of Microsoft Defender and network architecture. Substantial experience in a Security Operations Centre (SoC), Network Operations Centre (NoC). Strong understanding of Incident Response processes and methodologies and experience with MITRE ATT&CK framework to map and analyse threats. Knowledge of Endpoint Detection and Response (EDR) platforms. Familiarity with threat hunting techniques and processes.
Role overview: Working for a security vendor, you'll be responsible for supporting the Head of SecOps in overseeing the company's Security Operations activity, improving and challenging existing processes and procedures in a very agile and fast moving information security environment. Main tasks and responsibilities: Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerability management team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and vulnerability management incl incident response Understand security incidents and the likely impact these will have on the business Define and report on KPIs with recommendations for improvement Identify security risks, threats and vulnerabilities of the company's network, systems, applications and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerability scanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection and vulnerability management systems/solutions Detailed understanding of Security Monitoring, Threat Intelligence, Vulnerability management and Incident Response Experience managing security incidents within a complex environment. Strong foundation in network security and common attack methodologies Exposure to user behaviour analytical tools is preferable Good understanding of common protocols such as HTTP, SMTP, SSL/TLS, SSH, DNS Must demonstrate strong analytical and problem-solving skills to enable effective security incident and problem resolution Knowledge of latest threat trends and security landscape Pre-requisites: Excellent analytical skills with the ability to see the bigger picture Excellent communication skills with the ability to influence multiple stakeholders Willingness to learn and adapt to new technologies coupled with a passion for cyber security Ability to self-motivate and define priorities to meet deadlines Good team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles Further info: Competitive salary & flex bens Flexible locations / remote To apply: Please either register your CV and complete the information fields requested or send your CV to referencing WDA154 and your current salary
Jun 28, 2025
Full time
Role overview: Working for a security vendor, you'll be responsible for supporting the Head of SecOps in overseeing the company's Security Operations activity, improving and challenging existing processes and procedures in a very agile and fast moving information security environment. Main tasks and responsibilities: Operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate Lead and manage a team of Security Analysts & the Vulnerability management team Comfortable operating in a technical capacity performing hands-on incident response and supporting/managing SOC analysts Act as a SME in matters related threat and vulnerability management incl incident response Understand security incidents and the likely impact these will have on the business Define and report on KPIs with recommendations for improvement Identify security risks, threats and vulnerabilities of the company's network, systems, applications and new technology initiatives Implement and maintain operating run books, operating processes and procedures Help to develop and configure use cases, and alerting rules within SIEM technologies Mange the vulnerability management programme that includes vulnerability scanning, security testing, threat monitoring and data loss and leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusion detection and vulnerability management systems/solutions Detailed understanding of Security Monitoring, Threat Intelligence, Vulnerability management and Incident Response Experience managing security incidents within a complex environment. Strong foundation in network security and common attack methodologies Exposure to user behaviour analytical tools is preferable Good understanding of common protocols such as HTTP, SMTP, SSL/TLS, SSH, DNS Must demonstrate strong analytical and problem-solving skills to enable effective security incident and problem resolution Knowledge of latest threat trends and security landscape Pre-requisites: Excellent analytical skills with the ability to see the bigger picture Excellent communication skills with the ability to influence multiple stakeholders Willingness to learn and adapt to new technologies coupled with a passion for cyber security Ability to self-motivate and define priorities to meet deadlines Good team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles Further info: Competitive salary & flex bens Flexible locations / remote To apply: Please either register your CV and complete the information fields requested or send your CV to referencing WDA154 and your current salary
Benefits Pulled from the full job description Car scheme Cycle to work scheme Private medical insurance Season ticket loan Sick pay Unlimited paid holidays Full job description A bit about us Our main focus at Waterstons is to help our customers build a better business by blending technology and strategy. We have offices in the UK and Australia. Our team also work across the globe to provide unique business solutions that directly adds value to our clients' businesses. Our clients tell us our people are our greatest strength, and who are we to disagree? We believe in our colleagues, and we make it a priority to reward their hard work.Unlimited holidays, flexible working, and private medical healthcare. These are only some of the amazing things we offer. Did we also mention that we've been awarded Gold Investors in People for a fourth consecutive time? About the role As a SOC Analyst within our Cyber Division, you will build relationships with prospective and active clients across the business and act as their trusted advisor, helping them to secure their business through the pragmatic use of technology and protect them from incoming threats. If you enjoy a varied environment, sharing your knowledge and experience to support, coach and mentor your colleagues, then we want to hear from you. Day to day responsibilities Lead threat detection and incident response across modern security platforms Monitor and analyse alerts from EDR/XDR platforms, cloud services (M365, AWS, Azure), SIEM systems and more. Manage and optimise security tools and detection rules. Create and deliver comprehensive client security reports. Respond to and analyse cyber incidents at all severity levels. Implement and maintain security best practices. Participate in threat hunting initiatives. Act of a point of escalation for Junior Analysts. Stay up to date on the latest security trends. Some of the skills we are looking for Essential A Strong understanding of IT and Cybersecurity Experience working in a SOC or Helpdesk role Analytical and problem-solving abilities Customer service mindset Passion for continuous learning Waterstons perks As well as offering a competitive salary, we have an attractive benefits package including: A healthy work life balance with flexible and agile working being the norm Unlimited holiday allowance EV car scheme (salary sacrifice) Rest days Room to grow with supported development opportunities and sponsored training Enhanced family policies If you ever need it, company sick pay and life assurance Supported wellbeing with regular initiatives, an employee assistance programme and private medical insurance Flexible benefits such as a dental scheme, eye care support, season ticket loan and cycle to work We require a security check to be carried out on all colleagues due to the nature of some of our clients' industries. Waterstons is committed to creating and an inclusive, understanding, and flexible place to work. We value diversity, equality and inclusion and encourage everyone to 'bring their whole selves' to work. We believe that a company that works to truly embrace and value diversity, create an environment where everyone from any background can do their best work, and feel valued and appreciated is a better company to work for. Privacy Statement Waterstons are gathering the data in this application for the purpose of recruitment and to ensure we can contact you regarding this application. For information about what we do with your personal data see our Privacy Notice.
Jun 27, 2025
Full time
Benefits Pulled from the full job description Car scheme Cycle to work scheme Private medical insurance Season ticket loan Sick pay Unlimited paid holidays Full job description A bit about us Our main focus at Waterstons is to help our customers build a better business by blending technology and strategy. We have offices in the UK and Australia. Our team also work across the globe to provide unique business solutions that directly adds value to our clients' businesses. Our clients tell us our people are our greatest strength, and who are we to disagree? We believe in our colleagues, and we make it a priority to reward their hard work.Unlimited holidays, flexible working, and private medical healthcare. These are only some of the amazing things we offer. Did we also mention that we've been awarded Gold Investors in People for a fourth consecutive time? About the role As a SOC Analyst within our Cyber Division, you will build relationships with prospective and active clients across the business and act as their trusted advisor, helping them to secure their business through the pragmatic use of technology and protect them from incoming threats. If you enjoy a varied environment, sharing your knowledge and experience to support, coach and mentor your colleagues, then we want to hear from you. Day to day responsibilities Lead threat detection and incident response across modern security platforms Monitor and analyse alerts from EDR/XDR platforms, cloud services (M365, AWS, Azure), SIEM systems and more. Manage and optimise security tools and detection rules. Create and deliver comprehensive client security reports. Respond to and analyse cyber incidents at all severity levels. Implement and maintain security best practices. Participate in threat hunting initiatives. Act of a point of escalation for Junior Analysts. Stay up to date on the latest security trends. Some of the skills we are looking for Essential A Strong understanding of IT and Cybersecurity Experience working in a SOC or Helpdesk role Analytical and problem-solving abilities Customer service mindset Passion for continuous learning Waterstons perks As well as offering a competitive salary, we have an attractive benefits package including: A healthy work life balance with flexible and agile working being the norm Unlimited holiday allowance EV car scheme (salary sacrifice) Rest days Room to grow with supported development opportunities and sponsored training Enhanced family policies If you ever need it, company sick pay and life assurance Supported wellbeing with regular initiatives, an employee assistance programme and private medical insurance Flexible benefits such as a dental scheme, eye care support, season ticket loan and cycle to work We require a security check to be carried out on all colleagues due to the nature of some of our clients' industries. Waterstons is committed to creating and an inclusive, understanding, and flexible place to work. We value diversity, equality and inclusion and encourage everyone to 'bring their whole selves' to work. We believe that a company that works to truly embrace and value diversity, create an environment where everyone from any background can do their best work, and feel valued and appreciated is a better company to work for. Privacy Statement Waterstons are gathering the data in this application for the purpose of recruitment and to ensure we can contact you regarding this application. For information about what we do with your personal data see our Privacy Notice.
Essential Duties and Responsibilities The Cyber Security Command Center (CSCC) provides the most timely and comprehensive intelligence on external threats to the Security Operations Center (SOC) for detection, continuous monitoring of multiple security-related information sources, threat hunting, and, when needed, manage incident response related to cyber, privacy, and data protection for Gates data, infrastructure, and networks. The CSCC team will take disparate data sets and combine it with threat information and other enrichment to conduct analysis and identify incidents and drive appropriate responses to contain and minimize impact the threats and restore normal operations. Key responsibilities: Actively monitor security threats and risks, provide in-depth incident analysis, evaluate security incidents, will provide proactive threat research, and recommend mitigation strategies. Utilize the latest in security technology and be at the forefront of incident response to support operations at Gates locations around the world. Act as a core member of the Incident Response Team, triaging, responding to and reporting incidents and providing cyber security metrics. Evaluating and determining if/when information security violations have occurred through examination of network or device logs, open-source research, vulnerability and configuration scan data, and user provided reports. Demonstrate a strong understanding of information security policies and doctrine, ability to draft, modify and create SOPs for use of other team members. Keys to Success Requires in-depth knowledge and experience Requires conceptual and practical expertise in own area and general knowledge of related areas Has knowledge of best practices and how own area integrates with others; is aware of the competition and the factors that differentiate the company in the market Supervisory Responsibilities Acts as a resource for other team members; may lead projects with limited risks and resource requirements Acts as a resource for colleagues with less experience Requirements and Preferred Skills 5-7 years of experience Degree in Computer Science, Cybersecurity, IT, or equivalent experience (min. 4 years). 2-4 years in a cybersecurity or SOC environment. Strong understanding of OSI model, incident response, and threat analysis. Proficient in SIEM tools (e.g., Splunk), IAM, server/network security, and vulnerability management. Familiarity with ISO 27001, NIST CSF, and general security frameworks. Effective communicator across all organizational levels; strong multitasking and organization skills. Experience with Linux systems; cloud knowledge is a plus
Jun 27, 2025
Full time
Essential Duties and Responsibilities The Cyber Security Command Center (CSCC) provides the most timely and comprehensive intelligence on external threats to the Security Operations Center (SOC) for detection, continuous monitoring of multiple security-related information sources, threat hunting, and, when needed, manage incident response related to cyber, privacy, and data protection for Gates data, infrastructure, and networks. The CSCC team will take disparate data sets and combine it with threat information and other enrichment to conduct analysis and identify incidents and drive appropriate responses to contain and minimize impact the threats and restore normal operations. Key responsibilities: Actively monitor security threats and risks, provide in-depth incident analysis, evaluate security incidents, will provide proactive threat research, and recommend mitigation strategies. Utilize the latest in security technology and be at the forefront of incident response to support operations at Gates locations around the world. Act as a core member of the Incident Response Team, triaging, responding to and reporting incidents and providing cyber security metrics. Evaluating and determining if/when information security violations have occurred through examination of network or device logs, open-source research, vulnerability and configuration scan data, and user provided reports. Demonstrate a strong understanding of information security policies and doctrine, ability to draft, modify and create SOPs for use of other team members. Keys to Success Requires in-depth knowledge and experience Requires conceptual and practical expertise in own area and general knowledge of related areas Has knowledge of best practices and how own area integrates with others; is aware of the competition and the factors that differentiate the company in the market Supervisory Responsibilities Acts as a resource for other team members; may lead projects with limited risks and resource requirements Acts as a resource for colleagues with less experience Requirements and Preferred Skills 5-7 years of experience Degree in Computer Science, Cybersecurity, IT, or equivalent experience (min. 4 years). 2-4 years in a cybersecurity or SOC environment. Strong understanding of OSI model, incident response, and threat analysis. Proficient in SIEM tools (e.g., Splunk), IAM, server/network security, and vulnerability management. Familiarity with ISO 27001, NIST CSF, and general security frameworks. Effective communicator across all organizational levels; strong multitasking and organization skills. Experience with Linux systems; cloud knowledge is a plus
Job Role: Security Operations Center Consultant Location: Bradford (Hybrid) Salary: 75,000 - 80,000 Are you an experienced cybersecurity professional looking for your next challenge? We are currently seeking a Level 3 SOC and Incident Response Consultant to join an established and dynamic security operations team. This role involves supporting global clients in real-time threat monitoring, incident response, and security enhancement. About the Role: As an SOC and Incident Response L3 Consultant, you'll be a critical part of the cyber defence team, working closely with offshore colleagues to monitor, analyse, and respond to security alerts and incidents. You'll take ownership of investigations, coordinate responses, and help refine security operations through automation and continuous improvement. Key Responsibilities: Analyse data from endpoints, networks, and logs to detect potential threats and vulnerabilities. Lead detailed investigations into security alerts and incidents, identifying root causes and impacts. Support MDR analysts and contribute to SIEM administration, including use-case development and log integration. Implement response actions to contain threats and restore secure system states. Stay ahead of emerging threats and evolving attack vectors. Collaborate with clients, internal teams, and vendors during incident handling. Enhance SOC processes and contribute to training initiatives. Advise on effective, cost-conscious cyber defenses. Utilize SOAR platforms to streamline detection and response processes. Develop risk mitigation plans and recommend security controls. Essential Experience: Demonstrated experience in alert/threat investigation. Proven capability in leading major incident responses. Desirable Skills: Proficiency in SOC operations and workflows. Solid understanding of incident response principles. What's in It for You Competitive salary with comprehensive benefits including pension, healthcare, life assurance, laptop, and phone. Access to extensive training resources and global discounts. Health and wellness initiatives, plus participation in sponsored sports events. Diversity, Inclusion & Accessibility: We are committed to building an inclusive and diverse workforce that reflects the communities we serve. We encourage applications from individuals of all backgrounds, including those with disabilities or long-term conditions. If you need adjustments during the recruitment process, please contact us at (url removed) or call (phone number removed) with the subject line "Adjustment Request." In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
Jun 12, 2025
Full time
Job Role: Security Operations Center Consultant Location: Bradford (Hybrid) Salary: 75,000 - 80,000 Are you an experienced cybersecurity professional looking for your next challenge? We are currently seeking a Level 3 SOC and Incident Response Consultant to join an established and dynamic security operations team. This role involves supporting global clients in real-time threat monitoring, incident response, and security enhancement. About the Role: As an SOC and Incident Response L3 Consultant, you'll be a critical part of the cyber defence team, working closely with offshore colleagues to monitor, analyse, and respond to security alerts and incidents. You'll take ownership of investigations, coordinate responses, and help refine security operations through automation and continuous improvement. Key Responsibilities: Analyse data from endpoints, networks, and logs to detect potential threats and vulnerabilities. Lead detailed investigations into security alerts and incidents, identifying root causes and impacts. Support MDR analysts and contribute to SIEM administration, including use-case development and log integration. Implement response actions to contain threats and restore secure system states. Stay ahead of emerging threats and evolving attack vectors. Collaborate with clients, internal teams, and vendors during incident handling. Enhance SOC processes and contribute to training initiatives. Advise on effective, cost-conscious cyber defenses. Utilize SOAR platforms to streamline detection and response processes. Develop risk mitigation plans and recommend security controls. Essential Experience: Demonstrated experience in alert/threat investigation. Proven capability in leading major incident responses. Desirable Skills: Proficiency in SOC operations and workflows. Solid understanding of incident response principles. What's in It for You Competitive salary with comprehensive benefits including pension, healthcare, life assurance, laptop, and phone. Access to extensive training resources and global discounts. Health and wellness initiatives, plus participation in sponsored sports events. Diversity, Inclusion & Accessibility: We are committed to building an inclusive and diverse workforce that reflects the communities we serve. We encourage applications from individuals of all backgrounds, including those with disabilities or long-term conditions. If you need adjustments during the recruitment process, please contact us at (url removed) or call (phone number removed) with the subject line "Adjustment Request." In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy.
Location: Stevenage (Fully onsite - Monday to Friday - Weekly/BiWeekly Shift pattern of 6am-2pm & 2pm-10pm) Duration: 12 month initial contract Rate: 81ph UMB (Inside IR35) Role details: Our client, a leading player in the Defence and Security sector, is currently seeking two SOC Threat Detection Analysts to support their operations in Stevenage on a contract basis. These roles are essential to the proactive management of cyber threats and play a crucial role in safeguarding sensitive information. Key Responsibilities: Conduct proactive threat hunting in collaboration with the CTI function. Lead optimisation of threat detection rulesets working with the ISR function. Assist with the maintenance of security technologies. Support the SOC team with project activities. Support incident responders with HR and InfoSec related investigations. Attend routine security meetings. Analyse and assist the incident response team with escalated investigations. What we are looking for in you: Experience in threat analysis, hunting, and detection. Knowledge of IT security best practices and standards. Strong understanding of network communication protocols and the OSI model. Experience with Security Information Event Monitoring tools and network packet capture tools. Hands-on experience with IDS/IPS technologies and threat hunting activities. Strong analytical skills and mind-set. Understanding of malware capabilities, attack vectors, propagation, and impact. Good communication skills for liaising with business and suppliers. Additional Information: Active DV clearance is desirable Work pattern: Shift pattern of 6am-2pm & 2pm-10pm, 5 days a week on site. Travel: Rare, primarily to other UK sites if required. If you are a skilled Cyber Analyst with a background in threat detection and analysis, our client would be delighted to hear from you. Apply now to join a dynamic team committed to protecting critical information and infrastructure.
Mar 18, 2025
Contractor
Location: Stevenage (Fully onsite - Monday to Friday - Weekly/BiWeekly Shift pattern of 6am-2pm & 2pm-10pm) Duration: 12 month initial contract Rate: 81ph UMB (Inside IR35) Role details: Our client, a leading player in the Defence and Security sector, is currently seeking two SOC Threat Detection Analysts to support their operations in Stevenage on a contract basis. These roles are essential to the proactive management of cyber threats and play a crucial role in safeguarding sensitive information. Key Responsibilities: Conduct proactive threat hunting in collaboration with the CTI function. Lead optimisation of threat detection rulesets working with the ISR function. Assist with the maintenance of security technologies. Support the SOC team with project activities. Support incident responders with HR and InfoSec related investigations. Attend routine security meetings. Analyse and assist the incident response team with escalated investigations. What we are looking for in you: Experience in threat analysis, hunting, and detection. Knowledge of IT security best practices and standards. Strong understanding of network communication protocols and the OSI model. Experience with Security Information Event Monitoring tools and network packet capture tools. Hands-on experience with IDS/IPS technologies and threat hunting activities. Strong analytical skills and mind-set. Understanding of malware capabilities, attack vectors, propagation, and impact. Good communication skills for liaising with business and suppliers. Additional Information: Active DV clearance is desirable Work pattern: Shift pattern of 6am-2pm & 2pm-10pm, 5 days a week on site. Travel: Rare, primarily to other UK sites if required. If you are a skilled Cyber Analyst with a background in threat detection and analysis, our client would be delighted to hear from you. Apply now to join a dynamic team committed to protecting critical information and infrastructure.
Senior SOC Analyst London/Hybrid/ Up To £50K Pro Rata (DOE)/ 3-6 Months FTC We are excited to partner with a financial client based in central London that prides itself in delivering complex projects in fast-paced moving organisations. They are looking to onboard an ambitious and goal-oriented Senior SOC Analyst to join their growing security team. The person will be accountable for delivery of SOC and SIEM to existing and helping to sell capabilities to potential customers. KEY RESPONSIBILITIES: Manage coach and lead the SOC 1st line analyst teams. Quickly assess incidents for their impact and severity. Establish procedures, containing threats, and mitigating potential damage. Ensuring that evidence is collected in a proper organised manner. Implement the latest detection capabilities to Microsoft Sentinel. Prepare and maintain detailed incident reports and provide post-incident analysis to improve security measures. Work closely with the team members, such as service desk or projects team, to address security issues and implement solutions. Proactively search for signs of advanced threats and vulnerabilities within the network. SKILL REQUIREMENTS: Strong understanding of cybersecurity principles, including knowledge of common threats and vulnerabilities. Capabilities which include Kubernetes, AWS, GCP, Windows Endpoints, Carbon Black and Elastic SIEM, and an understanding on Powershell. Advanced understanding of cybersecurity principles, attack vectors, threat actors, and the threat landscape. Strong knowledge on the CIA triad. Skilled in triaging alerts, performing root cause analysis, and implementing remediation actions. Deep understanding of network protocols (e.g., TCP/IP, DNS, HTTP/HTTPS, SMTP) and their role in cybersecurity. Familiarity with network devices (e.g., routers, switches, firewalls) and concepts like VPNs and VLANs. Ownership of EDR (Endpoint Detection and Response) solutions, such as MS Defender for Endpoint, CrowdStrike, Carbon Black, or SentinelOne. Knowledge of IDS/IPS is a plus. Experience in managing incidents from identification through containment, eradication, recovery, and lessons learned. Familiarity with cybersecurity frameworks and regulations, such as: NIST Cybersecurity Framework (CSF). ISO/IEC 27001. GDPR, HIPAA, PCI DSS, or other compliance standards. PREFERRED CERTIFICATIONS: Microsoft Azure Sentinel 200. Microsoft Azure Sentinel 400 to be obtained.
Mar 09, 2025
Contractor
Senior SOC Analyst London/Hybrid/ Up To £50K Pro Rata (DOE)/ 3-6 Months FTC We are excited to partner with a financial client based in central London that prides itself in delivering complex projects in fast-paced moving organisations. They are looking to onboard an ambitious and goal-oriented Senior SOC Analyst to join their growing security team. The person will be accountable for delivery of SOC and SIEM to existing and helping to sell capabilities to potential customers. KEY RESPONSIBILITIES: Manage coach and lead the SOC 1st line analyst teams. Quickly assess incidents for their impact and severity. Establish procedures, containing threats, and mitigating potential damage. Ensuring that evidence is collected in a proper organised manner. Implement the latest detection capabilities to Microsoft Sentinel. Prepare and maintain detailed incident reports and provide post-incident analysis to improve security measures. Work closely with the team members, such as service desk or projects team, to address security issues and implement solutions. Proactively search for signs of advanced threats and vulnerabilities within the network. SKILL REQUIREMENTS: Strong understanding of cybersecurity principles, including knowledge of common threats and vulnerabilities. Capabilities which include Kubernetes, AWS, GCP, Windows Endpoints, Carbon Black and Elastic SIEM, and an understanding on Powershell. Advanced understanding of cybersecurity principles, attack vectors, threat actors, and the threat landscape. Strong knowledge on the CIA triad. Skilled in triaging alerts, performing root cause analysis, and implementing remediation actions. Deep understanding of network protocols (e.g., TCP/IP, DNS, HTTP/HTTPS, SMTP) and their role in cybersecurity. Familiarity with network devices (e.g., routers, switches, firewalls) and concepts like VPNs and VLANs. Ownership of EDR (Endpoint Detection and Response) solutions, such as MS Defender for Endpoint, CrowdStrike, Carbon Black, or SentinelOne. Knowledge of IDS/IPS is a plus. Experience in managing incidents from identification through containment, eradication, recovery, and lessons learned. Familiarity with cybersecurity frameworks and regulations, such as: NIST Cybersecurity Framework (CSF). ISO/IEC 27001. GDPR, HIPAA, PCI DSS, or other compliance standards. PREFERRED CERTIFICATIONS: Microsoft Azure Sentinel 200. Microsoft Azure Sentinel 400 to be obtained.
Job Title: Junior SOC Analyst Location: Stevenage (On-site, Secure Site) Clearance: SC Cleared Contract Type: Inside IR35 Salary/Rate: Competitive (Based on Experience) Shift Pattern: 24/7 Shift Rotation About the Role: We are seeking a motivated Junior SOC Analyst to join our Security Operations Centre (SOC) based on-site in Stevenage . This is an exciting opportunity to work within a secure environment , supporting cyber security operations and responding to security threats in a dynamic and challenging setting. The role operates on a 24/7 shift pattern , ensuring continuous monitoring and incident response. Key Responsibilities: Monitor and analyze security alerts from various security tools and technologies. Investigate and escalate security incidents in line with established protocols. Conduct initial threat analysis and provide recommendations for remediation. Work closely with senior analysts to support the implementation of security measures. Maintain and update security documentation, incident reports, and compliance records. Support continuous improvement initiatives within the SOC environment. Key Skills & Experience: Understanding of security monitoring tools (SIEM, IDS/IPS, endpoint security solutions). Knowledge of cyber security principles and best practices. Experience in threat detection, analysis, and incident response (preferred but not essential). Ability to follow processes and work effectively within a secure environment. Strong communication and analytical skills. Relevant certifications such as CompTIA Security+ , CISSP , or GCIA are advantageous. Requirements: Must hold active SC Clearance Must be able to work on-site in Stevenage within a secure facility. Ability to work on a 24/7 shift rotation. Previous experience in a SOC or cyber security role is desirable but not essential. A strong willingness to learn and develop within the field of cyber security. Why Join Us? Work in a cutting-edge secure environment with access to the latest cyber security technologies. Career progression opportunities within a growing security team. Gain exposure to real-world cyber threats and contribute to national security initiatives. Competitive contract rates inside IR35. If you are a passionate Junior SOC Analyst looking to take the next step in your cyber security career, apply today!
Mar 08, 2025
Contractor
Job Title: Junior SOC Analyst Location: Stevenage (On-site, Secure Site) Clearance: SC Cleared Contract Type: Inside IR35 Salary/Rate: Competitive (Based on Experience) Shift Pattern: 24/7 Shift Rotation About the Role: We are seeking a motivated Junior SOC Analyst to join our Security Operations Centre (SOC) based on-site in Stevenage . This is an exciting opportunity to work within a secure environment , supporting cyber security operations and responding to security threats in a dynamic and challenging setting. The role operates on a 24/7 shift pattern , ensuring continuous monitoring and incident response. Key Responsibilities: Monitor and analyze security alerts from various security tools and technologies. Investigate and escalate security incidents in line with established protocols. Conduct initial threat analysis and provide recommendations for remediation. Work closely with senior analysts to support the implementation of security measures. Maintain and update security documentation, incident reports, and compliance records. Support continuous improvement initiatives within the SOC environment. Key Skills & Experience: Understanding of security monitoring tools (SIEM, IDS/IPS, endpoint security solutions). Knowledge of cyber security principles and best practices. Experience in threat detection, analysis, and incident response (preferred but not essential). Ability to follow processes and work effectively within a secure environment. Strong communication and analytical skills. Relevant certifications such as CompTIA Security+ , CISSP , or GCIA are advantageous. Requirements: Must hold active SC Clearance Must be able to work on-site in Stevenage within a secure facility. Ability to work on a 24/7 shift rotation. Previous experience in a SOC or cyber security role is desirable but not essential. A strong willingness to learn and develop within the field of cyber security. Why Join Us? Work in a cutting-edge secure environment with access to the latest cyber security technologies. Career progression opportunities within a growing security team. Gain exposure to real-world cyber threats and contribute to national security initiatives. Competitive contract rates inside IR35. If you are a passionate Junior SOC Analyst looking to take the next step in your cyber security career, apply today!
A multinational semiconductor and software design company is seeking a Security Automation & Detection Engineer for a 6-month contract to start ASAP, based in Cambridge (Hybrid), Inside IR35. Role Overview: Utilising knowledge of security operations, incident response, and detection engineering, you will be responsible for the delivery of SIEM detections and security automations. The successful candidate will be proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Responsibilities: Build security automations, logging, and SIEM detections to improve the Cyber Defence Operation's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to leverage automation opportunities and ensure successful integrations. Lead technical migration of log sources into Microsoft Sentinel SIEM. Required Skills and Experience: Demonstrated ability in cybersecurity, with at least 3 years in a technical role in security operations and/or security software development. Solid understanding of security operations, automation standard processes, detection engineering and SIEM management. Experience with cloud security tools and platforms (e.g. Azure, AWS Google Cloud) and their integration into SOC operations. Vendor-specific certifications for Security orchestration, automation, and response (SOAR) platforms (e.g., Sentinel SOAR, Splunk SOAR, Palo Alto Cortex XSOAR). Experience contributing to large-scale, sprint-based, security automation and detection engineering projects. Desirable Skills and Experience: Ability to develop and implement long-term automation strategies aligned with security operation objectives. Ability to translate technical concepts into clear, actionable insights for technical and non-technical partners. Meticulous focus on ensuring accuracy, reliability, and security in automation workflows Consistent record of implementing automation and integration solutions in a SOC or similar environment Hays Talent Solutions is a trading division of Hays Specialist Recruitment Limited and acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Mar 08, 2025
Contractor
A multinational semiconductor and software design company is seeking a Security Automation & Detection Engineer for a 6-month contract to start ASAP, based in Cambridge (Hybrid), Inside IR35. Role Overview: Utilising knowledge of security operations, incident response, and detection engineering, you will be responsible for the delivery of SIEM detections and security automations. The successful candidate will be proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment. Responsibilities: Build security automations, logging, and SIEM detections to improve the Cyber Defence Operation's efficiency, scalability, and incident response capabilities. Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management. Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency. Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions. Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary. Collaborate with third-party vendors and service providers to leverage automation opportunities and ensure successful integrations. Lead technical migration of log sources into Microsoft Sentinel SIEM. Required Skills and Experience: Demonstrated ability in cybersecurity, with at least 3 years in a technical role in security operations and/or security software development. Solid understanding of security operations, automation standard processes, detection engineering and SIEM management. Experience with cloud security tools and platforms (e.g. Azure, AWS Google Cloud) and their integration into SOC operations. Vendor-specific certifications for Security orchestration, automation, and response (SOAR) platforms (e.g., Sentinel SOAR, Splunk SOAR, Palo Alto Cortex XSOAR). Experience contributing to large-scale, sprint-based, security automation and detection engineering projects. Desirable Skills and Experience: Ability to develop and implement long-term automation strategies aligned with security operation objectives. Ability to translate technical concepts into clear, actionable insights for technical and non-technical partners. Meticulous focus on ensuring accuracy, reliability, and security in automation workflows Consistent record of implementing automation and integration solutions in a SOC or similar environment Hays Talent Solutions is a trading division of Hays Specialist Recruitment Limited and acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
We're growing and want you to be a part of our journey. Information Security Manager This role will lead the Information Security team, manage the security controls to keep Isio's data, people and clients safe and ensure that work is delivered effectively. The role will report into the Head of IT Governance and will have overall responsibility for the Information Security. Our IT team operates a hybrid workstyle nationwide; there is a preference for this role to be based in Isio's Belfast or Birmingham office, however, there is flexibility to be based in any of Isio's UK offices for this position. Role and Responsibilities Collaborate with senior stakeholders Line manage the Information Security Analyst Manage the information security programme across Isio Maintain your knowledge of current and emerging cyber threats as well as risk mitigations Manage and maintain: Information Security risk register Information Security policies Information Security training Information Security related communications Own the relationship with key Information Security 3 rd parties (e.g. SOC, ISO related, email security) Conduct regular service reviews with our key Information Security providers Develop and manage Information Security protocols that maintain Isio's (and our clients') environments Own and improve Isio's cyber incident response capability, including reviewing and enhancing our Cyber Security Incident Response Plan (CSIRP) Design and execute cyber-attack simulation exercises Own the Information Security incidents raised in the Service Desk by Isio users/suppliers Actively monitor for security alerts announced by professional Information Security bodies Lead cyber incident response activities, including coordinating incident investigation, containment and remediation actions Conduct due diligence (including risk assessing) on proposed new solutions for Isio. Be responsible for and use Isio's enterprise tools to identify, assess and resolve security vulnerabilities Manage all penetration testing and arrange these for new and present solutions as required Manage and develop the Information Security team ensuring that it has the expertise and resources needed to address both current and emerging threats. Provide guidance and coaching to direct report, including professional development Key Skills & Experience Excellent knowledge of Information Security systems and solutions Significant experience of cyber security frameworks, methodologies, and best practices, such as ISO 27001, Cyber Essentials, NIST, CIS and OWASP Top10 The ability to articulate complex security concepts to both technical and non-technical audiences Experience of leading security-based projects Good understanding of attack vectors, and defensive and detection cyber technologies Ability to balance security priorities with the business' objectives, values and risk appetite Proven people management and leadership Great people management skills Proven track record of delivering solutions Excellent communicator Well organised and structured Qualifications (Desirable) CISM (Certified Information Security Manager) CISSP (Certified Information System Security Professional) GDPR / Data Privacy qualification Microsoft / CompTIA / Cisco / AWS or other technical cyber security qualification Demonstrated Commitment to our Core Purpose Power in Partnership : We work in partnership with our clients & each other - building open and trusted relationships. Working together allows us to deliver the best for our clients. Future Focus : We want to push our industry forward by solving problems in better ways that benefit both our clients & society. Strength in Difference : We work with diverse perspectives to find better solutions. Working with differences makes us stronger. People First : We recognise that pensions is a people business. People are the source of Isio's expertise and it is people's lives that we affect through our advice. What we offer you Isio is a people business, and we're committed to helping our great colleagues gain a wide variety of experience, significant development opportunities and progression through the business . The variety of work that'll be available to you will enable you to do this. On top, we also offer: A competitive remuneration package , including a bonus scheme. A defined contribution pension scheme . Life insurance . Healthcare benefits . Income protection benefits . 25 days annual leave (plus bank holidays) as standard with the option to purchase additional days of holiday. As well as two additional 'Company' days - a celebration day for your birthday and an extra day over Christmas. Corporate Social Responsibility (CSR) allowance Flexible working opportunities. A flexible benefits package. Internal development programmes including (technical and non-technical) training support and mentor programmes. Where required study support including study days, materials and exam entry support. What's next? Click on the 'apply' and follow the simple application process online. If you think you may require a reasonable adjustment to be made for any reason at any stage of your recruitment process, please email About Isio Isio was 'born' in 2020 from the sale of KPMG UK's Pension Practice to a private equity firm. An industry-leading challenger, we provide diverse expertise spanning Pensions, Investment, Benefits and Wealth to give clients an integrated experience. Isio is built by challengers, innovators and forward-thinkers, grounded around a vision which strives to deliver greater financial confidence for everyone. We empower and develop those who join us - valuing curious minds and giving people the freedom to outperform. Known and respected for our agility, we harness specialist experience, bold thinking and the desire to push the boundaries of what we can achieve for our clients, from small to blue chip, public to private. Isio is growing and we are looking for people who share our purpose and behaviours to join us on this journey, as we continue driving exceptional results for both our clients and people. At Isio, we are committed to fostering an inclusive, equitable and diverse workplace, in which our colleagues feel they belong, regardless of background or difference. We uphold the values of respect, fairness, and inclusion in our actions and decisions. We believe that by adhering to these principles, we will create a stronger, more innovative, and supportive environment for all, as well as ensuring that the advice and support we provide to our clients is more creative, more insightful and leaves a lasting impact. We have offices across the UK and many of our roles offer a hybrid, flexible approach to work to help create a work-life balance that works for you. Isio Group is an equal opportunities employer and we welcome applications from all suitably qualified candidates.
Feb 21, 2025
Full time
We're growing and want you to be a part of our journey. Information Security Manager This role will lead the Information Security team, manage the security controls to keep Isio's data, people and clients safe and ensure that work is delivered effectively. The role will report into the Head of IT Governance and will have overall responsibility for the Information Security. Our IT team operates a hybrid workstyle nationwide; there is a preference for this role to be based in Isio's Belfast or Birmingham office, however, there is flexibility to be based in any of Isio's UK offices for this position. Role and Responsibilities Collaborate with senior stakeholders Line manage the Information Security Analyst Manage the information security programme across Isio Maintain your knowledge of current and emerging cyber threats as well as risk mitigations Manage and maintain: Information Security risk register Information Security policies Information Security training Information Security related communications Own the relationship with key Information Security 3 rd parties (e.g. SOC, ISO related, email security) Conduct regular service reviews with our key Information Security providers Develop and manage Information Security protocols that maintain Isio's (and our clients') environments Own and improve Isio's cyber incident response capability, including reviewing and enhancing our Cyber Security Incident Response Plan (CSIRP) Design and execute cyber-attack simulation exercises Own the Information Security incidents raised in the Service Desk by Isio users/suppliers Actively monitor for security alerts announced by professional Information Security bodies Lead cyber incident response activities, including coordinating incident investigation, containment and remediation actions Conduct due diligence (including risk assessing) on proposed new solutions for Isio. Be responsible for and use Isio's enterprise tools to identify, assess and resolve security vulnerabilities Manage all penetration testing and arrange these for new and present solutions as required Manage and develop the Information Security team ensuring that it has the expertise and resources needed to address both current and emerging threats. Provide guidance and coaching to direct report, including professional development Key Skills & Experience Excellent knowledge of Information Security systems and solutions Significant experience of cyber security frameworks, methodologies, and best practices, such as ISO 27001, Cyber Essentials, NIST, CIS and OWASP Top10 The ability to articulate complex security concepts to both technical and non-technical audiences Experience of leading security-based projects Good understanding of attack vectors, and defensive and detection cyber technologies Ability to balance security priorities with the business' objectives, values and risk appetite Proven people management and leadership Great people management skills Proven track record of delivering solutions Excellent communicator Well organised and structured Qualifications (Desirable) CISM (Certified Information Security Manager) CISSP (Certified Information System Security Professional) GDPR / Data Privacy qualification Microsoft / CompTIA / Cisco / AWS or other technical cyber security qualification Demonstrated Commitment to our Core Purpose Power in Partnership : We work in partnership with our clients & each other - building open and trusted relationships. Working together allows us to deliver the best for our clients. Future Focus : We want to push our industry forward by solving problems in better ways that benefit both our clients & society. Strength in Difference : We work with diverse perspectives to find better solutions. Working with differences makes us stronger. People First : We recognise that pensions is a people business. People are the source of Isio's expertise and it is people's lives that we affect through our advice. What we offer you Isio is a people business, and we're committed to helping our great colleagues gain a wide variety of experience, significant development opportunities and progression through the business . The variety of work that'll be available to you will enable you to do this. On top, we also offer: A competitive remuneration package , including a bonus scheme. A defined contribution pension scheme . Life insurance . Healthcare benefits . Income protection benefits . 25 days annual leave (plus bank holidays) as standard with the option to purchase additional days of holiday. As well as two additional 'Company' days - a celebration day for your birthday and an extra day over Christmas. Corporate Social Responsibility (CSR) allowance Flexible working opportunities. A flexible benefits package. Internal development programmes including (technical and non-technical) training support and mentor programmes. Where required study support including study days, materials and exam entry support. What's next? Click on the 'apply' and follow the simple application process online. If you think you may require a reasonable adjustment to be made for any reason at any stage of your recruitment process, please email About Isio Isio was 'born' in 2020 from the sale of KPMG UK's Pension Practice to a private equity firm. An industry-leading challenger, we provide diverse expertise spanning Pensions, Investment, Benefits and Wealth to give clients an integrated experience. Isio is built by challengers, innovators and forward-thinkers, grounded around a vision which strives to deliver greater financial confidence for everyone. We empower and develop those who join us - valuing curious minds and giving people the freedom to outperform. Known and respected for our agility, we harness specialist experience, bold thinking and the desire to push the boundaries of what we can achieve for our clients, from small to blue chip, public to private. Isio is growing and we are looking for people who share our purpose and behaviours to join us on this journey, as we continue driving exceptional results for both our clients and people. At Isio, we are committed to fostering an inclusive, equitable and diverse workplace, in which our colleagues feel they belong, regardless of background or difference. We uphold the values of respect, fairness, and inclusion in our actions and decisions. We believe that by adhering to these principles, we will create a stronger, more innovative, and supportive environment for all, as well as ensuring that the advice and support we provide to our clients is more creative, more insightful and leaves a lasting impact. We have offices across the UK and many of our roles offer a hybrid, flexible approach to work to help create a work-life balance that works for you. Isio Group is an equal opportunities employer and we welcome applications from all suitably qualified candidates.