UKAEA's mission is to lead the delivery of sustainable fusion energy and maximise scientific and economic impact. The Computing Division underpins this mission by delivering secure, scalable, and innovative digital solutions across scientific computing, modelling, simulation, software engineering, business systems, data acquisition, and core IT services. Within the Computing Division, the Enterprise Infrastructure Solutions unit is responsible for the design, delivery, and management of centrally supported IT infrastructure and applications. This includes enterprise compute platforms, data networks, UNIX/Linux/Windows environments, cloud services, data centres, commercial software solutions, and end-user support across all UKAEA sites. The IAM / PAM Specialist will play a pivotal role in designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the Security Information and Event Management (SIEM) and Security Operations Centre (SOC) capabilities. You will lead the IAM/PAM workstreams and provide specialist input into SIEM/SOC implementation, ensuring all solutions align with secure-by-design principles, NIST and ISO 27001 frameworks, and UKAEA's cyber security objectives. This is a hands-on and leadership-focused role that combines technical delivery, strategic oversight, and mentoring of junior members of the cyber team. You will also provide technical oversight where Managed Service Providers (MSPs) are engaged, ensuring solution quality, integration, and compliance with UKAEA standards. Accountabilities: Lead the end-to-end design and delivery of IAM and PAM services as part of a greenfield cyber security programme. Collaborate with architects and SOC leads to integrate IAM/PAM telemetry into SIEM tooling for enhanced visibility and detection. Provide technical oversight and assurance when engaging Managed Service Providers (MSPs) or third-party vendors. Support the development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. Define and maintain IAM and PAM architecture artefacts, roadmaps, and design standards aligned with enterprise governance. Monitor and manage security configurations across Active Directory, Microsoft 365, Azure, and business SaaS platforms (e.g., SharePoint, Teams, Exchange Online, OneDrive). Support secure deployment and access controls in cloud-hosted and hybrid business systems. Administer and optimise IAM policies, Conditional Access, MFA, and privilege escalation controls. Review access permissions for business-critical applications and enforce role-based access control (RBAC). Participate in application onboarding and provide security consultation on app integrations and APIs. Assist in the response and investigation of security alerts and incidents related to cloud environments. Collaborate with enterprise architects, infrastructure engineers, and support teams to embed secure-by-design principles across services. Maintain up-to-date documentation of cloud security controls, procedures, and exception registers. Stay informed of emerging threats in cloud ecosystems and recommend appropriate mitigation strategies. Budget Responsibility: None Specific Qualifications/Experience: Essential o Demonstrable experience in greenfield IAM/PAM implementations, preferably using Entra ID, CyberArk, BeyondTrust, or similar platforms. o Proven ability to lead technical delivery while mentoring junior engineers or analysts. o Experience providing technical oversight for MSPs or third-party security service providers. o Demonstrable hands-on experience with Microsoft Entra ID (Azure AD), Conditional Access, and Identity Protection. o Understanding of modern authentication protocols (OAuth2.0, SAML, OpenID Connect). o Familiarity with SaaS security, user lifecycle management, and enterprise access models. o Working knowledge of security and compliance frameworks such as CAF, ISO 27001, NIST CSF, and GDPR. o Analytical and investigative skills with the ability to identify risk patterns and remediation actions. o Knowledge of Privileged Identity Management (PIM), Just-In-Time (JIT) access, or PAM solutions. o Strong documentation and communication skills to support audits and security reviews. o Ability to obtain SC-level national security clearance Desirable o At least a HND in Information Security, Computer Science, or a related STEM field, or equivalent experience. Degree Preferred o Understanding of SIEM/SOC integration and the relationship between IAM telemetry and security monitoring. o Familiarity with ITSM workflows and change control procedures. o Experience conducting security risk assessments for third-party SaaS solutions. o Experience supporting greenfield security architecture or SOC build programmes. o Familiarity with tools such as Microsoft Sentinel, Splunk, or Elastic SIEM. Additional Duties: May be requested to represent the Group in meetings , act as an SME in Projects and may hold internal appointments. May also provide technical oversight to managed service providers and contribute to team capability development through coaching and mentoring. Rullion celebrates and supports diversity and is committed to ensuring equal opportunities for both employees and applicants.
09/10/2025
Contractor
UKAEA's mission is to lead the delivery of sustainable fusion energy and maximise scientific and economic impact. The Computing Division underpins this mission by delivering secure, scalable, and innovative digital solutions across scientific computing, modelling, simulation, software engineering, business systems, data acquisition, and core IT services. Within the Computing Division, the Enterprise Infrastructure Solutions unit is responsible for the design, delivery, and management of centrally supported IT infrastructure and applications. This includes enterprise compute platforms, data networks, UNIX/Linux/Windows environments, cloud services, data centres, commercial software solutions, and end-user support across all UKAEA sites. The IAM / PAM Specialist will play a pivotal role in designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the Security Information and Event Management (SIEM) and Security Operations Centre (SOC) capabilities. You will lead the IAM/PAM workstreams and provide specialist input into SIEM/SOC implementation, ensuring all solutions align with secure-by-design principles, NIST and ISO 27001 frameworks, and UKAEA's cyber security objectives. This is a hands-on and leadership-focused role that combines technical delivery, strategic oversight, and mentoring of junior members of the cyber team. You will also provide technical oversight where Managed Service Providers (MSPs) are engaged, ensuring solution quality, integration, and compliance with UKAEA standards. Accountabilities: Lead the end-to-end design and delivery of IAM and PAM services as part of a greenfield cyber security programme. Collaborate with architects and SOC leads to integrate IAM/PAM telemetry into SIEM tooling for enhanced visibility and detection. Provide technical oversight and assurance when engaging Managed Service Providers (MSPs) or third-party vendors. Support the development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. Define and maintain IAM and PAM architecture artefacts, roadmaps, and design standards aligned with enterprise governance. Monitor and manage security configurations across Active Directory, Microsoft 365, Azure, and business SaaS platforms (e.g., SharePoint, Teams, Exchange Online, OneDrive). Support secure deployment and access controls in cloud-hosted and hybrid business systems. Administer and optimise IAM policies, Conditional Access, MFA, and privilege escalation controls. Review access permissions for business-critical applications and enforce role-based access control (RBAC). Participate in application onboarding and provide security consultation on app integrations and APIs. Assist in the response and investigation of security alerts and incidents related to cloud environments. Collaborate with enterprise architects, infrastructure engineers, and support teams to embed secure-by-design principles across services. Maintain up-to-date documentation of cloud security controls, procedures, and exception registers. Stay informed of emerging threats in cloud ecosystems and recommend appropriate mitigation strategies. Budget Responsibility: None Specific Qualifications/Experience: Essential o Demonstrable experience in greenfield IAM/PAM implementations, preferably using Entra ID, CyberArk, BeyondTrust, or similar platforms. o Proven ability to lead technical delivery while mentoring junior engineers or analysts. o Experience providing technical oversight for MSPs or third-party security service providers. o Demonstrable hands-on experience with Microsoft Entra ID (Azure AD), Conditional Access, and Identity Protection. o Understanding of modern authentication protocols (OAuth2.0, SAML, OpenID Connect). o Familiarity with SaaS security, user lifecycle management, and enterprise access models. o Working knowledge of security and compliance frameworks such as CAF, ISO 27001, NIST CSF, and GDPR. o Analytical and investigative skills with the ability to identify risk patterns and remediation actions. o Knowledge of Privileged Identity Management (PIM), Just-In-Time (JIT) access, or PAM solutions. o Strong documentation and communication skills to support audits and security reviews. o Ability to obtain SC-level national security clearance Desirable o At least a HND in Information Security, Computer Science, or a related STEM field, or equivalent experience. Degree Preferred o Understanding of SIEM/SOC integration and the relationship between IAM telemetry and security monitoring. o Familiarity with ITSM workflows and change control procedures. o Experience conducting security risk assessments for third-party SaaS solutions. o Experience supporting greenfield security architecture or SOC build programmes. o Familiarity with tools such as Microsoft Sentinel, Splunk, or Elastic SIEM. Additional Duties: May be requested to represent the Group in meetings , act as an SME in Projects and may hold internal appointments. May also provide technical oversight to managed service providers and contribute to team capability development through coaching and mentoring. Rullion celebrates and supports diversity and is committed to ensuring equal opportunities for both employees and applicants.
Job Title: Security Analyst / Detection Engineer Location: Corsham, Wiltshire - 60% Onsite / 40% remote Duration: 3 Months Rate: 550 per day Clearance Required: Active SC and ideally Active DV clearance. Nationality: Sole UK Nationality is a requirement for this role Role overview: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. About the role: Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs. Your skills and experience: Experienced Tier 2 SOC analyst. Knowledge of Data networks. Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.). Ideally have some experience with UK MOD Your security clearance To be successfully appointed to this role, it is a requirement to obtain a minimum of Security Check (SC) clearance, with Developed vetting required for full time employment. To obtain SC clearance, the successful applicant must have resided continuously within the United Kingdom for the last 5 years, along with other criteria and requirements. If you are successfully offered this position, you will go through a series of pre-employment checks, including identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service)
06/10/2025
Contractor
Job Title: Security Analyst / Detection Engineer Location: Corsham, Wiltshire - 60% Onsite / 40% remote Duration: 3 Months Rate: 550 per day Clearance Required: Active SC and ideally Active DV clearance. Nationality: Sole UK Nationality is a requirement for this role Role overview: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. About the role: Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs. Your skills and experience: Experienced Tier 2 SOC analyst. Knowledge of Data networks. Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.). Ideally have some experience with UK MOD Your security clearance To be successfully appointed to this role, it is a requirement to obtain a minimum of Security Check (SC) clearance, with Developed vetting required for full time employment. To obtain SC clearance, the successful applicant must have resided continuously within the United Kingdom for the last 5 years, along with other criteria and requirements. If you are successfully offered this position, you will go through a series of pre-employment checks, including identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service)
Security Analyst/Detection Engineer Whitehall Resources are looking for a Security Analyst/Detection Engineer. This role is hybrid working with 3 days per week onsite in Wiltshire and the remainder remote working, for an initial 3 month contract. *Must hold active SC clearance or DV clearance* *Inside IR35* Job Description: . Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. . Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. . Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. . Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Your skills and experience: . Experienced Tier 2 SOC analyst . Knowledge of Data networks . Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) All of our opportunities require that applicants are eligible to work in the specified country/location, unless otherwise stated in the job description. Whitehall Resources are an equal opportunities employer who value a diverse and inclusive working environment. All qualified applicants will receive consideration for employment without regard to race, religion, gender identity or expression, sexual orientation, national origin, pregnancy, disability, age, veteran status, or other characteristics.
06/10/2025
Contractor
Security Analyst/Detection Engineer Whitehall Resources are looking for a Security Analyst/Detection Engineer. This role is hybrid working with 3 days per week onsite in Wiltshire and the remainder remote working, for an initial 3 month contract. *Must hold active SC clearance or DV clearance* *Inside IR35* Job Description: . Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. . Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. . Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. . Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Your skills and experience: . Experienced Tier 2 SOC analyst . Knowledge of Data networks . Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) All of our opportunities require that applicants are eligible to work in the specified country/location, unless otherwise stated in the job description. Whitehall Resources are an equal opportunities employer who value a diverse and inclusive working environment. All qualified applicants will receive consideration for employment without regard to race, religion, gender identity or expression, sexual orientation, national origin, pregnancy, disability, age, veteran status, or other characteristics.
LA International Computer Consultants Ltd
Corsham, Wiltshire
*SC CLEARED* Security Analyst/Detection Engineer 4 Month contract initially Based: Remote/Corsham - Max 3 days p/w onsite Rate: £500 - £537 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We have a great opportunity for a Security Analyst/Detection Engineer to join the team for an initial 4 month contract. The ideal candidate will have good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge of defence environment and culture. You will have the ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC. Key Responsibilities: * Conduct reactive monitoring of the networks to deliver a layered, agile cyber defence capability across all security domains. * Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. * Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. * Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Key Skills & Experience: * Experienced Tier 2 SOC analyst * Knowledge of Data networks * Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications: * CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc. * Ideally have some experience with UK defence or military space. This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 10 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
06/10/2025
Contractor
*SC CLEARED* Security Analyst/Detection Engineer 4 Month contract initially Based: Remote/Corsham - Max 3 days p/w onsite Rate: £500 - £537 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We have a great opportunity for a Security Analyst/Detection Engineer to join the team for an initial 4 month contract. The ideal candidate will have good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge of defence environment and culture. You will have the ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC. Key Responsibilities: * Conduct reactive monitoring of the networks to deliver a layered, agile cyber defence capability across all security domains. * Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. * Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. * Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Key Skills & Experience: * Experienced Tier 2 SOC analyst * Knowledge of Data networks * Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications: * CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc. * Ideally have some experience with UK defence or military space. This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 10 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
Security Analyst/Detection Engineer Location: Corsham, 60% on site Duration: 20/02/2026 MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive for a global consultancy that require an SC or DV cleared Security Analyst/Detection Engineer to join them on a major defence project that's based in Corsham. Role description: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. Must be a sole British National. Hybrid working: The position is office based, with a local agreement with the customer that allows for a limited amount of Working from Home, based around your role, your needs, and those of the business. The current agreement requires 60% attendance in the office. If you are successfully offered this position, you will go through a series of pre-employment checks, including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At Capgemini, striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK MOD Your security clearance
06/10/2025
Contractor
Security Analyst/Detection Engineer Location: Corsham, 60% on site Duration: 20/02/2026 MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive for a global consultancy that require an SC or DV cleared Security Analyst/Detection Engineer to join them on a major defence project that's based in Corsham. Role description: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. Must be a sole British National. Hybrid working: The position is office based, with a local agreement with the customer that allows for a limited amount of Working from Home, based around your role, your needs, and those of the business. The current agreement requires 60% attendance in the office. If you are successfully offered this position, you will go through a series of pre-employment checks, including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At Capgemini, striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK MOD Your security clearance
Job Title: Security Analyst/Detection Engineer Location: Corsham, Wiltshire - 60% Onsite/40% remote Duration: 3 months Rate: £550 per day Clearance Required: Active SC and ideally Active DV clearance. Nationality: Sole UK Nationality is a requirement for this role Role overview: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. About the role: Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs. Your skills and experience: Experienced Tier 2 SOC analyst. Knowledge of Data networks. Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.). Ideally have some experience with UK MOD Your security clearance To be successfully appointed to this role, it is a requirement to obtain a minimum of Security Check (SC) clearance, with Developed vetting required for full time employment. To obtain SC clearance, the successful applicant must have resided continuously within the United Kingdom for the last 5 years, along with other criteria and requirements. If you are successfully offered this position, you will go through a series of pre-employment checks, including identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service)
06/10/2025
Contractor
Job Title: Security Analyst/Detection Engineer Location: Corsham, Wiltshire - 60% Onsite/40% remote Duration: 3 months Rate: £550 per day Clearance Required: Active SC and ideally Active DV clearance. Nationality: Sole UK Nationality is a requirement for this role Role overview: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. About the role: Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs. Your skills and experience: Experienced Tier 2 SOC analyst. Knowledge of Data networks. Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.). Ideally have some experience with UK MOD Your security clearance To be successfully appointed to this role, it is a requirement to obtain a minimum of Security Check (SC) clearance, with Developed vetting required for full time employment. To obtain SC clearance, the successful applicant must have resided continuously within the United Kingdom for the last 5 years, along with other criteria and requirements. If you are successfully offered this position, you will go through a series of pre-employment checks, including identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service)
Cyber Security Analyst Permanent - 40k - 43k + strong benefits Location: Hybrid - South Wales Your new company I am looking to recruit a Cyber Security Analyst to join a leader in the utilities space. The business has been investing in its cyber security and IT estate and is continuing to grow and enhance its security posture. The company has a strong reputation, and we have placed numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity where you will work with the cyber resilience team and assist with the Security Operations function, including EDR, SIEM, gathering security control framework evidence and general day to day assistance with security tasks. You will help deliver strategy which will enhance the organisations security resilience, proactively contributing to mitigating threats, at a good time when the company is expanding and investing in its IT and cyber security estate. Key parts of the role: You will require knowledge and understanding of attack and exploitation techniques and adversarial TTP's. Help to provide resilience to our threat monitoring and response capabilities. Handle security incident response with internal teams and other third parties to ensure that the incident response lifecycle is undertaken to a high standard. Monitor and respond to security incidents, alerts and breaches Monitor and track remediation to all identified vulnerabilities Monitor the risks using security tooling to carry out routine checks. Monitor and report on user behavioural analysis such as awareness training and social engineering campaigns. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Good knowledge and understanding of SOC processes and procedures. Basic experience using SIEM systems such as MS Sentinel, LogRhythm, AlienVault, Splunk Good understanding of incident response stages and handling. Basic knowledge and experience using leading endpoint detection and threat management products and managing their operation. Good knowledge and awareness of global Information Security Standards including ISO27002, CIS, NCSE CAF, NIST CSF. Ability to work independently and as part of a team. Excellent communication and interpersonal skills. Ability to obtain UK Security Clearance What you'll get in return Salary of between 40k- 43k Hybrid working 2/3 days in South Wales per week Possible bonus 5% pension contribution from you, the company pays 10% Enhanced pay for parental leave And more! What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
30/09/2025
Full time
Cyber Security Analyst Permanent - 40k - 43k + strong benefits Location: Hybrid - South Wales Your new company I am looking to recruit a Cyber Security Analyst to join a leader in the utilities space. The business has been investing in its cyber security and IT estate and is continuing to grow and enhance its security posture. The company has a strong reputation, and we have placed numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity where you will work with the cyber resilience team and assist with the Security Operations function, including EDR, SIEM, gathering security control framework evidence and general day to day assistance with security tasks. You will help deliver strategy which will enhance the organisations security resilience, proactively contributing to mitigating threats, at a good time when the company is expanding and investing in its IT and cyber security estate. Key parts of the role: You will require knowledge and understanding of attack and exploitation techniques and adversarial TTP's. Help to provide resilience to our threat monitoring and response capabilities. Handle security incident response with internal teams and other third parties to ensure that the incident response lifecycle is undertaken to a high standard. Monitor and respond to security incidents, alerts and breaches Monitor and track remediation to all identified vulnerabilities Monitor the risks using security tooling to carry out routine checks. Monitor and report on user behavioural analysis such as awareness training and social engineering campaigns. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Good knowledge and understanding of SOC processes and procedures. Basic experience using SIEM systems such as MS Sentinel, LogRhythm, AlienVault, Splunk Good understanding of incident response stages and handling. Basic knowledge and experience using leading endpoint detection and threat management products and managing their operation. Good knowledge and awareness of global Information Security Standards including ISO27002, CIS, NCSE CAF, NIST CSF. Ability to work independently and as part of a team. Excellent communication and interpersonal skills. Ability to obtain UK Security Clearance What you'll get in return Salary of between 40k- 43k Hybrid working 2/3 days in South Wales per week Possible bonus 5% pension contribution from you, the company pays 10% Enhanced pay for parental leave And more! What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV. If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Jobs - Frequently Asked Questions
Use the location filter to find IT jobs in cities like London, Manchester, Birmingham, and across the UK.
Entry-level roles include IT support technician, junior developer, QA tester, and helpdesk analyst.
New jobs are posted daily. Set up alerts to be notified as soon as new roles match your preferences.
Key skills include problem-solving, coding, cloud computing, networking, and familiarity with tools like AWS or SQL.
Yes, many employers offer training or junior roles. Focus on building a strong CV with relevant coursework or personal projects.