Role: Lead SOC Analyst Location: London Salary: Competitive salary and package dependent on experience Career Level: Specialist Please Note: Any offer of employment is subject to satisfactory BPSS and the candidate being granted a level of security clearance which typically requires 10 years continuous UK address history, usually including no periods of 30 consecutive days or more spent outside of the UK, and a declaration of being a British passport holder with no dual nationalism at the point of application. Note: The above information relates to a specific client requirement Role Description The Lead SOC Analyst (L3) provides advanced investigation and analysis, acting as the escalation point for complex or high-severity incidents. They conduct root cause analysis, guide L1 analysts, and support incident containment and remediation efforts. Accenture are partnering with scaled UK AI compute pioneers to lead the charge on next-generation infrastructure. To support this endeavour, we're building a high-performance compute operations team in London. Our work will be sensitive, secure, 24x7 and on the most up-to-date high density compute stacks available. Shift teams will be setup and operate 24x7 and successful candidates working on shift will be paid a shift premium for the non-standard unsociable shift hours that will be part of that rota.? Accenture is a leading global professional services company, providing a broad range of services in strategy and consulting, interactive, technology and operations, with digital capabilities across all of these services. With our thought leadership and culture of innovation, we apply industry expertise, diverse skill sets and next-generation technology to each business challenge. We believe in inclusion and diversity and supporting the whole person. Our core values comprise of Stewardship, Best People, Client Value Creation, One Global Network, Respect for the Individual and Integrity. Year after year, Accenture is recognized worldwide not just for business performance but for inclusion and diversity too. "Across the globe, one thing is universally true of the people of Accenture: We care deeply about what we do and the impact we have with our clients and with the communities in which we work and live. It is personal to all of us." - Julie Sweet, Accenture CEO
03/04/2026
Full time
Role: Lead SOC Analyst Location: London Salary: Competitive salary and package dependent on experience Career Level: Specialist Please Note: Any offer of employment is subject to satisfactory BPSS and the candidate being granted a level of security clearance which typically requires 10 years continuous UK address history, usually including no periods of 30 consecutive days or more spent outside of the UK, and a declaration of being a British passport holder with no dual nationalism at the point of application. Note: The above information relates to a specific client requirement Role Description The Lead SOC Analyst (L3) provides advanced investigation and analysis, acting as the escalation point for complex or high-severity incidents. They conduct root cause analysis, guide L1 analysts, and support incident containment and remediation efforts. Accenture are partnering with scaled UK AI compute pioneers to lead the charge on next-generation infrastructure. To support this endeavour, we're building a high-performance compute operations team in London. Our work will be sensitive, secure, 24x7 and on the most up-to-date high density compute stacks available. Shift teams will be setup and operate 24x7 and successful candidates working on shift will be paid a shift premium for the non-standard unsociable shift hours that will be part of that rota.? Accenture is a leading global professional services company, providing a broad range of services in strategy and consulting, interactive, technology and operations, with digital capabilities across all of these services. With our thought leadership and culture of innovation, we apply industry expertise, diverse skill sets and next-generation technology to each business challenge. We believe in inclusion and diversity and supporting the whole person. Our core values comprise of Stewardship, Best People, Client Value Creation, One Global Network, Respect for the Individual and Integrity. Year after year, Accenture is recognized worldwide not just for business performance but for inclusion and diversity too. "Across the globe, one thing is universally true of the people of Accenture: We care deeply about what we do and the impact we have with our clients and with the communities in which we work and live. It is personal to all of us." - Julie Sweet, Accenture CEO
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
03/04/2026
Full time
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
About the opportunity Are you ready to launch a career in cyber security? Netcom Training's fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you'll gain hands-on experience that prepares you for today's fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 30/03 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you'll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer. Starting Salaries: Typically £22,000 - £35,000 (role dependent). Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees - complete the training, gain essential cyber security skills.
02/04/2026
Full time
About the opportunity Are you ready to launch a career in cyber security? Netcom Training's fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you'll gain hands-on experience that prepares you for today's fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 30/03 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you'll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer. Starting Salaries: Typically £22,000 - £35,000 (role dependent). Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees - complete the training, gain essential cyber security skills.
SOC Analyst 75.48 p/hr (Inside IR35) Onsite Hereford 12 months Level 1 SOC Cyber Analyst to join the TMCT security team to serve as the first internal responder to alerts generated by our outsourced SOC provider. In this role the individual will perform initial triage, conduct low level investigations, interact directly with end users and asset owners, and escalate verified incidents for advanced analysis and response. The level 1 SOC analyst will act as a key link between our internal security team and the external SOC, ensuring that potential threats are quickly validated, documented, and routed through appropriate channels for resolution. Duties: Alert Triage: Review and assess alerts escalated by the outsourced SOC; validate their accuracy and determine potential impact. Initial Investigation: Perform first-line investigation using available tools (SIEM, Device Logs, firewall logs and SIEM alerts). User Interaction: Engage with affected end users or asset owners to collect additional information, verify events, or guide immediate containment steps (e.g.asset isolation, password reset). Escalation: Escalate confirmed or high severity incidents to the Level 2 SOC (outsourced) or internal incident response teams, ensuring complete and accurate handoff documentation. Incident Documentation: Create and maintain detailed case notes, timelines, and evidence within the case management system to support investigations and compliance requirements. Collaboration: Serve as the coordination point between the security team and the external SOC partner, maintaining strong communication and situational awareness. Playbook Execution: follow established triage and escalation playbooks; suggest improvements based on recurring issues or inefficiencies. Threat Awareness: Maintain awareness of current cyber threats, attacker techniques (MITRE ATT&CK), and industry trends relevant to the organisations threat landscape. Essential: 2-4 years of experience in a SOC, IT Operations, or security support role. Understanding of key security concepts including malware, phishing, lateral movement and privilege escalation. Working knowledge of network fundamentals, windows/Linux system logs and authentication systems. Working knowledge of SIEM platforms (e.g. Microsoft sentinel, Splunk, Elastic, QRadar). Desirable: Awareness of security frameworks and methodologies (NIST CSF, MITRE ATT&CK, ISO27001). Qualifications: Desirable: CompTIA Security+, CySA+ or other entry level certification.
01/04/2026
Contractor
SOC Analyst 75.48 p/hr (Inside IR35) Onsite Hereford 12 months Level 1 SOC Cyber Analyst to join the TMCT security team to serve as the first internal responder to alerts generated by our outsourced SOC provider. In this role the individual will perform initial triage, conduct low level investigations, interact directly with end users and asset owners, and escalate verified incidents for advanced analysis and response. The level 1 SOC analyst will act as a key link between our internal security team and the external SOC, ensuring that potential threats are quickly validated, documented, and routed through appropriate channels for resolution. Duties: Alert Triage: Review and assess alerts escalated by the outsourced SOC; validate their accuracy and determine potential impact. Initial Investigation: Perform first-line investigation using available tools (SIEM, Device Logs, firewall logs and SIEM alerts). User Interaction: Engage with affected end users or asset owners to collect additional information, verify events, or guide immediate containment steps (e.g.asset isolation, password reset). Escalation: Escalate confirmed or high severity incidents to the Level 2 SOC (outsourced) or internal incident response teams, ensuring complete and accurate handoff documentation. Incident Documentation: Create and maintain detailed case notes, timelines, and evidence within the case management system to support investigations and compliance requirements. Collaboration: Serve as the coordination point between the security team and the external SOC partner, maintaining strong communication and situational awareness. Playbook Execution: follow established triage and escalation playbooks; suggest improvements based on recurring issues or inefficiencies. Threat Awareness: Maintain awareness of current cyber threats, attacker techniques (MITRE ATT&CK), and industry trends relevant to the organisations threat landscape. Essential: 2-4 years of experience in a SOC, IT Operations, or security support role. Understanding of key security concepts including malware, phishing, lateral movement and privilege escalation. Working knowledge of network fundamentals, windows/Linux system logs and authentication systems. Working knowledge of SIEM platforms (e.g. Microsoft sentinel, Splunk, Elastic, QRadar). Desirable: Awareness of security frameworks and methodologies (NIST CSF, MITRE ATT&CK, ISO27001). Qualifications: Desirable: CompTIA Security+, CySA+ or other entry level certification.
About the role This is a fantastic opportunity to join Southern Water's Cyber Risk & Assurance team, the organisation's second line of defence within the wider Cyber Security function. As a Cyber Risk & Assurance Analyst, you'll play a central role in helping the business understand, manage and reduce cyber risk across critical operations. You'll be responsible for developing and improving cyber risk insights in your area of specialism, driving process and tooling enhancements, and supporting stakeholders across Technology, Legal and the wider business. This is a role for someone who enjoys tackling complex problems, breaking them down into actionable solutions, and collaborating with a wide range of experts. You'll also act as a trusted advisor helping colleagues understand cyber threats, risks and controls, and supporting the wider team in embedding strong cyber risk management practices across Southern Water. What you will be responsible for: You will conduct complex cyber risk assessments, strengthen key controls, deliver clear risk insights, and drive improvements across cyber domains - all while building collaborative relationships across Technology, Security, Legal and the business. Key Responsibilities Maintain an up-to-date understanding of the cyber threat landscape, relevant regulations (including NIS1/NIS2 and GDPR), and emerging risks. Lead, plan and perform complex cyber risk assessments aligned to industry-recognised frameworks, testing the design and effectiveness of cyber controls. Produce high-quality risk assessment reports with clear, actionable conclusions that support timely risk-based decision-making. Identify and deliver improvements across domains such as identity & access management, application security, endpoint security, and network security. Work closely with stakeholders across Security, Technology, Legal, Internal Audit and the wider business to assess control gaps, prioritise remediation actions and track progress to completion. Build strong working relationships across teams to influence, support and strengthen cyber risk management practices. Drive process improvements and enhancements across the Cyber Risk & Assurance function. Additional requirements specific to the role Will work closely with both technical teams and non-technical stakeholders, requiring an ability to communicate complex concepts clearly. Must be comfortable operating in an environment with regulatory, operational and cyber security obligations. Occasional engagement with internal or external audit teams may be required. What you'll bring to the role: Essential Degree-level education or equivalent experience. Strong knowledge of cyber security and information security control best practice. Proven experience in cyber security, risk management or security assessment (10+ years, or advanced degree with 8+ years). In-depth understanding of key frameworks such as NIST (800-37, 800-30, 800-53), ISO 27001/27005, SOC 2, PCI or MITRE ATT&CK. Solid understanding of cloud models, application security, vulnerability and patch management. Experience in regulated and/or unionised environments. Excellent communication skills with the ability to simplify complex findings for senior management. Strong attention to detail and a proactive, positive, innovative mindset. Desirable GRC or security certifications (e.g., CISSP, CISM, CRISC, CISA, GCFE, GSEC, CCSP). Experience with cyber risk modelling (e.g., CyberCube, RMS, Cyence). Hands-on experience with frameworks such as ISO 27001, NIST CSF, NCSC CAF or CIS Controls. Understanding of ICS/OT environments. Southern Water is at the forefront of transforming Britain's water industry, investing significantly to enhance resilience, sustainability, and service excellence. With £7.8bn planned investment for 2025-30, this is an unparalleled opportunity to join a business committed to delivering a generational shift in the way water services are managed. You will be joining at a time of significant change, working alongside a highly skilled leadership team with a clear vision for the future. We offer an environment where senior professionals can make a meaningful impact, influence major strategic decisions, and drive long-term value creation . At Southern Water, we believe diverse perspectives drive innovation. If you're passionate about making a positive impact and think you can bring value to our team, we'd love to hear from you-even if you don't tick every box. Your unique skills and experiences could be exactly what we need. Our Commitment to Diversity We welcome applicants from all backgrounds, identities, and experiences. We do not discriminate based on race, ethnicity, gender, sexual orientation, age, disability, religion, or any other protected characteristic. If you need reasonable adjustments during the recruitment process, please let us know. Additional information: In line with Southern Water's security requirements, successful candidates will be required to provide evidence of their identity, eligibility to work in the UK, criminal record check (DBS) and verification of their employment and/or education history for the past three years. Appointment to this role is subject to the successful completion of all preemployment checks, including security vetting. Please note that if a candidate does not meet the required security standards or fails to pass the vetting process, Southern Water reserves the right to withdraw the offer of employment. Some positions may also require higher levels of security vetting, which may involve providing additional documentation.
01/04/2026
Full time
About the role This is a fantastic opportunity to join Southern Water's Cyber Risk & Assurance team, the organisation's second line of defence within the wider Cyber Security function. As a Cyber Risk & Assurance Analyst, you'll play a central role in helping the business understand, manage and reduce cyber risk across critical operations. You'll be responsible for developing and improving cyber risk insights in your area of specialism, driving process and tooling enhancements, and supporting stakeholders across Technology, Legal and the wider business. This is a role for someone who enjoys tackling complex problems, breaking them down into actionable solutions, and collaborating with a wide range of experts. You'll also act as a trusted advisor helping colleagues understand cyber threats, risks and controls, and supporting the wider team in embedding strong cyber risk management practices across Southern Water. What you will be responsible for: You will conduct complex cyber risk assessments, strengthen key controls, deliver clear risk insights, and drive improvements across cyber domains - all while building collaborative relationships across Technology, Security, Legal and the business. Key Responsibilities Maintain an up-to-date understanding of the cyber threat landscape, relevant regulations (including NIS1/NIS2 and GDPR), and emerging risks. Lead, plan and perform complex cyber risk assessments aligned to industry-recognised frameworks, testing the design and effectiveness of cyber controls. Produce high-quality risk assessment reports with clear, actionable conclusions that support timely risk-based decision-making. Identify and deliver improvements across domains such as identity & access management, application security, endpoint security, and network security. Work closely with stakeholders across Security, Technology, Legal, Internal Audit and the wider business to assess control gaps, prioritise remediation actions and track progress to completion. Build strong working relationships across teams to influence, support and strengthen cyber risk management practices. Drive process improvements and enhancements across the Cyber Risk & Assurance function. Additional requirements specific to the role Will work closely with both technical teams and non-technical stakeholders, requiring an ability to communicate complex concepts clearly. Must be comfortable operating in an environment with regulatory, operational and cyber security obligations. Occasional engagement with internal or external audit teams may be required. What you'll bring to the role: Essential Degree-level education or equivalent experience. Strong knowledge of cyber security and information security control best practice. Proven experience in cyber security, risk management or security assessment (10+ years, or advanced degree with 8+ years). In-depth understanding of key frameworks such as NIST (800-37, 800-30, 800-53), ISO 27001/27005, SOC 2, PCI or MITRE ATT&CK. Solid understanding of cloud models, application security, vulnerability and patch management. Experience in regulated and/or unionised environments. Excellent communication skills with the ability to simplify complex findings for senior management. Strong attention to detail and a proactive, positive, innovative mindset. Desirable GRC or security certifications (e.g., CISSP, CISM, CRISC, CISA, GCFE, GSEC, CCSP). Experience with cyber risk modelling (e.g., CyberCube, RMS, Cyence). Hands-on experience with frameworks such as ISO 27001, NIST CSF, NCSC CAF or CIS Controls. Understanding of ICS/OT environments. Southern Water is at the forefront of transforming Britain's water industry, investing significantly to enhance resilience, sustainability, and service excellence. With £7.8bn planned investment for 2025-30, this is an unparalleled opportunity to join a business committed to delivering a generational shift in the way water services are managed. You will be joining at a time of significant change, working alongside a highly skilled leadership team with a clear vision for the future. We offer an environment where senior professionals can make a meaningful impact, influence major strategic decisions, and drive long-term value creation . At Southern Water, we believe diverse perspectives drive innovation. If you're passionate about making a positive impact and think you can bring value to our team, we'd love to hear from you-even if you don't tick every box. Your unique skills and experiences could be exactly what we need. Our Commitment to Diversity We welcome applicants from all backgrounds, identities, and experiences. We do not discriminate based on race, ethnicity, gender, sexual orientation, age, disability, religion, or any other protected characteristic. If you need reasonable adjustments during the recruitment process, please let us know. Additional information: In line with Southern Water's security requirements, successful candidates will be required to provide evidence of their identity, eligibility to work in the UK, criminal record check (DBS) and verification of their employment and/or education history for the past three years. Appointment to this role is subject to the successful completion of all preemployment checks, including security vetting. Please note that if a candidate does not meet the required security standards or fails to pass the vetting process, Southern Water reserves the right to withdraw the offer of employment. Some positions may also require higher levels of security vetting, which may involve providing additional documentation.
SOC Engineer - Farnborough or Hemel Hempstead, UK Up to £65,000 Depending on Experience + Night Shift allowance Onsite in Farnborough or Hemel Hempstead Active SC required, with willingness to go through DV ABOUT THE CLIENT Our client is a highly respected technology consultancy working across complex and security critical environments. They deliver cutting edge digital and cybersecurity solutions to major public sector organisations. Due to continued growth, they are looking to appoint a SOC Engineer to strengthen their security capability. THE BENEFITS 25 days annual leave Health cash plan Life assurance Pension scheme Structured training and development Career progression opportunities Collaborative and supportive environment THE SOC ENGINEER ROLE: As a SOC Engineer, you will play a key role in ensuring security monitoring and protective tooling is deployed and operating effectively. You will support SOC operations by enabling analysts to detect and respond to threats quickly and efficiently. Install, configure and maintain security monitoring tools Ensure SOC tooling is optimised and operating effectively Support SIEM platforms and threat intelligence tooling Work with teams to assess risk and design security controls Apply updates, patches and follow change processes Stay current with emerging threats and recommend improvements SOC ENGINEER ESSENTIAL SKILLS Strong understanding of information security fundamentals Experience with SIEM tools such as Sentinel or Splunk Familiarity with security monitoring technologies Analytical mindset with strong problem solving skills Ability to manage multiple priorities and meet deadlines Strong communication and collaboration skills TO BE CONSIDERED: Please either apply through this advert or email me directly to discuss. By applying for this role, you give consent for your application to be submitted to our client in connection with this vacancy. KEY SKILLS SOC Engineer, SIEM, Sentinel, Splunk, Cyber Security, Security Monitoring, Threat Detection, Azure, AWS, Network Security, NSD
01/04/2026
Full time
SOC Engineer - Farnborough or Hemel Hempstead, UK Up to £65,000 Depending on Experience + Night Shift allowance Onsite in Farnborough or Hemel Hempstead Active SC required, with willingness to go through DV ABOUT THE CLIENT Our client is a highly respected technology consultancy working across complex and security critical environments. They deliver cutting edge digital and cybersecurity solutions to major public sector organisations. Due to continued growth, they are looking to appoint a SOC Engineer to strengthen their security capability. THE BENEFITS 25 days annual leave Health cash plan Life assurance Pension scheme Structured training and development Career progression opportunities Collaborative and supportive environment THE SOC ENGINEER ROLE: As a SOC Engineer, you will play a key role in ensuring security monitoring and protective tooling is deployed and operating effectively. You will support SOC operations by enabling analysts to detect and respond to threats quickly and efficiently. Install, configure and maintain security monitoring tools Ensure SOC tooling is optimised and operating effectively Support SIEM platforms and threat intelligence tooling Work with teams to assess risk and design security controls Apply updates, patches and follow change processes Stay current with emerging threats and recommend improvements SOC ENGINEER ESSENTIAL SKILLS Strong understanding of information security fundamentals Experience with SIEM tools such as Sentinel or Splunk Familiarity with security monitoring technologies Analytical mindset with strong problem solving skills Ability to manage multiple priorities and meet deadlines Strong communication and collaboration skills TO BE CONSIDERED: Please either apply through this advert or email me directly to discuss. By applying for this role, you give consent for your application to be submitted to our client in connection with this vacancy. KEY SKILLS SOC Engineer, SIEM, Sentinel, Splunk, Cyber Security, Security Monitoring, Threat Detection, Azure, AWS, Network Security, NSD
At Sopra Steria, our Security Operations Centre (SOC) protects some of the UK's most critical organisations. As a SOC Engineer, you'll make sure the right monitoring and protective tooling is in place-so our analysts can detect, investigate and respond at pace. It's a hands-on role with real impact and plenty of scope to grow your cybersecurity career. This is meaningful work across high-impact client environments in a culture that backs your growth-learn from specialists across engineering, architecture and operations. Based on Site in Farnborough OR Hemel Hempstead. You do need to be eligible for SC Clearance. What you will be doing: Install, configure and support security monitoring tools feeding into the SOC Ensure tooling is operating effectively to protect client environments. Work with teams to assess risks, design controls and define testing requirements. Support senior engineers with SIEM, threat intelligence and malware analysis platforms. Apply patches/updates, raise changes and follow agreed processes. Keep up to date with threats and recommend improvements. What you will bring: ? Clear understanding of Information Security fundamentals Sentinel OR Splunk experience. Familiarity with security monitoring/protective technologies. Good project-management skills; able to juggle multiple priorities. Analytical and systematic problem-solving approach; able to absorb and apply technical information. Ability to plan work to objectives and influence peers and specialist teams. Able to manage competing tasks, meet deadlines and collaborate in a busy environment. ompTIA Network+ (or similar) or equivalent knowledge. It would be great if you had: Experience with Azure or AWS security features. SIEM experience-especially Sentinel or Splunk. If you are interested in this role but not sure if your skills and experience are exactly what we're looking for, please do apply, we'd love to hear from you! Employment Type: Full-time Location: Office based Hemel Hempstead OR Farnborough. Security Clearance Level: Eligible for SC Clearance. Internal Recruiter: Jane Salary: £To be discussed Benefits: 25 days annual leave with the option to buy additional days, Health Shields, life assurance, pension. Loved reading about this job and want to know more about us? Sopra Steria's Aerospace, Defence and Security business designs, develops and deploys digital solutions to Central Government clients. The work we do makes a real difference to the client's goal of National Security, and we operate in a unique and privileged environment. We are given time for professional development activities, and we coach and mentor our colleagues, sharing knowledge and learning from each other. We foster a culture in which employees feel valued and supported and have pride in their work for the customer, delivering outstanding rates of customer satisfaction in the UK's most complex safety- and security-critical markets.
01/04/2026
Full time
At Sopra Steria, our Security Operations Centre (SOC) protects some of the UK's most critical organisations. As a SOC Engineer, you'll make sure the right monitoring and protective tooling is in place-so our analysts can detect, investigate and respond at pace. It's a hands-on role with real impact and plenty of scope to grow your cybersecurity career. This is meaningful work across high-impact client environments in a culture that backs your growth-learn from specialists across engineering, architecture and operations. Based on Site in Farnborough OR Hemel Hempstead. You do need to be eligible for SC Clearance. What you will be doing: Install, configure and support security monitoring tools feeding into the SOC Ensure tooling is operating effectively to protect client environments. Work with teams to assess risks, design controls and define testing requirements. Support senior engineers with SIEM, threat intelligence and malware analysis platforms. Apply patches/updates, raise changes and follow agreed processes. Keep up to date with threats and recommend improvements. What you will bring: ? Clear understanding of Information Security fundamentals Sentinel OR Splunk experience. Familiarity with security monitoring/protective technologies. Good project-management skills; able to juggle multiple priorities. Analytical and systematic problem-solving approach; able to absorb and apply technical information. Ability to plan work to objectives and influence peers and specialist teams. Able to manage competing tasks, meet deadlines and collaborate in a busy environment. ompTIA Network+ (or similar) or equivalent knowledge. It would be great if you had: Experience with Azure or AWS security features. SIEM experience-especially Sentinel or Splunk. If you are interested in this role but not sure if your skills and experience are exactly what we're looking for, please do apply, we'd love to hear from you! Employment Type: Full-time Location: Office based Hemel Hempstead OR Farnborough. Security Clearance Level: Eligible for SC Clearance. Internal Recruiter: Jane Salary: £To be discussed Benefits: 25 days annual leave with the option to buy additional days, Health Shields, life assurance, pension. Loved reading about this job and want to know more about us? Sopra Steria's Aerospace, Defence and Security business designs, develops and deploys digital solutions to Central Government clients. The work we do makes a real difference to the client's goal of National Security, and we operate in a unique and privileged environment. We are given time for professional development activities, and we coach and mentor our colleagues, sharing knowledge and learning from each other. We foster a culture in which employees feel valued and supported and have pride in their work for the customer, delivering outstanding rates of customer satisfaction in the UK's most complex safety- and security-critical markets.
SOC Analyst (Level 2) Location: Aylesbury (Hybrid) Salary: Up to £45,000 (depending on experience) CTA are working with a Cyber Security company who are for a SOC Analyst (L2) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Advanced Security Monitoring: Analyse SIEM alerts, logs, and security events to identify and respond to complex threats. Incident Response: Lead investigations, perform deep analysis, determine impact, and coordinate response activities. Threat Detection & Analysis: Develop and refine detection rules and use cases to improve threat visibility. Threat Hunting: Proactively hunt for advanced threats and indicators of compromise across the environment. Vulnerability Management: Identify, assess, and prioritise vulnerabilities and recommend remediation actions. Security Reporting: Produce detailed reports on incidents, trends, and overall security posture. Process Improvement & Automation: Enhance SOC processes, playbooks, and automation capabilities. Skills & Experience Strong experience with SIEM platforms (e.g., Microsoft Sentinel, Sumo Logic) Hands-on experience with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Solid understanding of: Incident response lifecycle Threat detection methodologies Networking protocols (TCP/IP, DNS, HTTP/S) Experience analysing logs from multiple sources (endpoints, network, cloud) Ability to independently investigate and resolve security incidents Scripting or automation experience (e.g., Python, PowerShell) is a plus Strong communication and stakeholder management skills What You'll Be Doing Acting as an escalation point for Level 1 analysts Working closely with customers and internal teams on incident investigations Tuning detection rules and improving alert quality Staying up to date with emerging threats, vulnerabilities, and attack techniques Supporting and mentoring junior analysts Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
01/04/2026
Full time
SOC Analyst (Level 2) Location: Aylesbury (Hybrid) Salary: Up to £45,000 (depending on experience) CTA are working with a Cyber Security company who are for a SOC Analyst (L2) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Advanced Security Monitoring: Analyse SIEM alerts, logs, and security events to identify and respond to complex threats. Incident Response: Lead investigations, perform deep analysis, determine impact, and coordinate response activities. Threat Detection & Analysis: Develop and refine detection rules and use cases to improve threat visibility. Threat Hunting: Proactively hunt for advanced threats and indicators of compromise across the environment. Vulnerability Management: Identify, assess, and prioritise vulnerabilities and recommend remediation actions. Security Reporting: Produce detailed reports on incidents, trends, and overall security posture. Process Improvement & Automation: Enhance SOC processes, playbooks, and automation capabilities. Skills & Experience Strong experience with SIEM platforms (e.g., Microsoft Sentinel, Sumo Logic) Hands-on experience with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Solid understanding of: Incident response lifecycle Threat detection methodologies Networking protocols (TCP/IP, DNS, HTTP/S) Experience analysing logs from multiple sources (endpoints, network, cloud) Ability to independently investigate and resolve security incidents Scripting or automation experience (e.g., Python, PowerShell) is a plus Strong communication and stakeholder management skills What You'll Be Doing Acting as an escalation point for Level 1 analysts Working closely with customers and internal teams on incident investigations Tuning detection rules and improving alert quality Staying up to date with emerging threats, vulnerabilities, and attack techniques Supporting and mentoring junior analysts Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
SOC Analyst (Level 1) Location: Aylesbury (Hybrid) Salary: Up to £25,000-£30,000 + shift allowance Shift Pattern: 24/7 rotating shifts (including nights and weekends) CTA are working with a Cyber Security company who are for a SOC Analyst (Level 1) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Security Monitoring: Monitor SIEM dashboards, alerts, and log data to identify suspicious or malicious activity. Alert Triage: Perform initial investigation and prioritisation of security alerts, escalating where necessary. Incident Response (L1): Assist in incident investigation, gather relevant evidence, and support escalation to senior analysts or IR teams. Threat Detection: Support detection of threats using established rules and playbooks. Basic Threat Hunting: Assist with proactive searches for anomalies under guidance from senior analysts. Vulnerability Awareness: Identify and report potential vulnerabilities or misconfigurations. Reporting: Document incidents, actions taken, and findings clearly for internal teams and customers. Continuous Improvement: Contribute to improving SOC processes, playbooks, and detection rules. Skills & Experience Exposure to SIEM tools (e.g., Sumo Logic, Microsoft Sentinel) Familiarity with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Basic understanding of: Security operations Incident response lifecycle Networking fundamentals (TCP/IP, DNS, etc.) Strong analytical and problem-solving skills Good communication skills (written and verbal) Ability and willingness to work 24/7 shift patterns (including nights/weekends) What You'll Be Doing Working closely with senior analysts and wider security teams Supporting customers with security monitoring and incident triage Participating in a shift-based rota to ensure continuous SOC coverage Keeping up to date with emerging cyber threats and trends Learning industry tools and best practices through structured training Growth Opportunity Join a newly formed SOC team with a clear training and development pathway , offering progression into SOC Analyst Level 2 and beyond. Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
01/04/2026
Full time
SOC Analyst (Level 1) Location: Aylesbury (Hybrid) Salary: Up to £25,000-£30,000 + shift allowance Shift Pattern: 24/7 rotating shifts (including nights and weekends) CTA are working with a Cyber Security company who are for a SOC Analyst (Level 1) to join their growing Security Operations Centre. This role is ideal for a junior analyst looking to build hands-on experience in monitoring, triaging, and responding to security incidents in a fast-paced, shift-based environment. Key Responsibilities Security Monitoring: Monitor SIEM dashboards, alerts, and log data to identify suspicious or malicious activity. Alert Triage: Perform initial investigation and prioritisation of security alerts, escalating where necessary. Incident Response (L1): Assist in incident investigation, gather relevant evidence, and support escalation to senior analysts or IR teams. Threat Detection: Support detection of threats using established rules and playbooks. Basic Threat Hunting: Assist with proactive searches for anomalies under guidance from senior analysts. Vulnerability Awareness: Identify and report potential vulnerabilities or misconfigurations. Reporting: Document incidents, actions taken, and findings clearly for internal teams and customers. Continuous Improvement: Contribute to improving SOC processes, playbooks, and detection rules. Skills & Experience Exposure to SIEM tools (e.g., Sumo Logic, Microsoft Sentinel) Familiarity with EDR/XDR tools (e.g., CrowdStrike, Microsoft Defender) Basic understanding of: Security operations Incident response lifecycle Networking fundamentals (TCP/IP, DNS, etc.) Strong analytical and problem-solving skills Good communication skills (written and verbal) Ability and willingness to work 24/7 shift patterns (including nights/weekends) What You'll Be Doing Working closely with senior analysts and wider security teams Supporting customers with security monitoring and incident triage Participating in a shift-based rota to ensure continuous SOC coverage Keeping up to date with emerging cyber threats and trends Learning industry tools and best practices through structured training Growth Opportunity Join a newly formed SOC team with a clear training and development pathway , offering progression into SOC Analyst Level 2 and beyond. Requirements UK Citizenship (required due to the nature of the role) If you are looking for a progressive move with an established Cyber company, please do send your application through for consideration.
Infrastructure Analyst (Azure & Fabric) Salary: £49000 - £61000 per annum + benefits Hybrid with 1 day per week in Manchester (candidates need to be reasonably local) Our client is seeking a highly skilled and motivated Infrastructure Analyst with substantial hands-on experience designing, deploying, and managing solutions in Microsoft Azure environments. As an integral part of the cloud engineering team, you will architect, implement, and optimize scalable, secure, and robust cloud infrastructures, helping to transform our organization's IT landscape. The ideal candidate will be passionate about cloud technology, demonstrates a strong problem-solving ability, and thrives in a dynamic, collaborative environment. The successful candidate will have: Experience with Microsoft Fabric (mandatory) - especially the landing zone environment, roles-based access etc., settings, policies and so on Creating and maintaining AI agents and chatbots and more! Building containerised applications Key Responsibilities Design and architect end-to-end cloud solutions on Microsoft Azure to meet business requirements and strategic objectives. Deploy, configure, and maintain Azure services including (but not limited to): Azure Virtual Machines, App Services, Azure Kubernetes Service (AKS), Azure Functions, Logic Apps, Azure Active Directory, Virtual Networks, and Azure Storage. Implement and manage Infrastructure as Code (IaC) using tools such as ARM templates, Bicep, Terraform, and PowerShell DSC. Monitor, troubleshoot, and optimize Azure workloads to ensure high availability, performance, and cost-effectiveness. Design and implement security best practices, including identity and access management, secure networking, encryption, and compliance controls within Azure environments. Collaborate with software development teams to create CI/CD pipelines and automate deployment processes using Azure DevOps and GitHub Actions. Perform migrations from on-premises or other cloud platforms to Azure, ensuring minimal downtime and business continuity. Qualifications and Skills Extensive experience in IT infrastructure or cloud engineering, with strong hands-on experience with Microsoft Azure. Experience with Microsoft Fabric Creating and maintaining AI agents - chatbots and more Building containerised applications Strong expertise in Azure-native services, cloud networking, security, and automation. Proficiency with Scripting and automation tools such as PowerShell, Azure CLI, and/or Python. Solid understanding of DevOps principles and tools, including Azure DevOps, Git, GitHub, and CI/CD pipelines. Experience with containerization and orchestration technologies, such as Docker and Kubernetes. Familiarity with monitoring and observability solutions such as Azure Monitor, Log Analytics, and Application Insights. Knowledge of identity and access management, governance, and compliance within Azure environments. Azure certifications such as Azure Solutions Architect Expert, Azure Administrator Associate, or Azure DevOps Engineer Expert are strongly preferred. In the first instance, please submit your CV.
31/03/2026
Full time
Infrastructure Analyst (Azure & Fabric) Salary: £49000 - £61000 per annum + benefits Hybrid with 1 day per week in Manchester (candidates need to be reasonably local) Our client is seeking a highly skilled and motivated Infrastructure Analyst with substantial hands-on experience designing, deploying, and managing solutions in Microsoft Azure environments. As an integral part of the cloud engineering team, you will architect, implement, and optimize scalable, secure, and robust cloud infrastructures, helping to transform our organization's IT landscape. The ideal candidate will be passionate about cloud technology, demonstrates a strong problem-solving ability, and thrives in a dynamic, collaborative environment. The successful candidate will have: Experience with Microsoft Fabric (mandatory) - especially the landing zone environment, roles-based access etc., settings, policies and so on Creating and maintaining AI agents and chatbots and more! Building containerised applications Key Responsibilities Design and architect end-to-end cloud solutions on Microsoft Azure to meet business requirements and strategic objectives. Deploy, configure, and maintain Azure services including (but not limited to): Azure Virtual Machines, App Services, Azure Kubernetes Service (AKS), Azure Functions, Logic Apps, Azure Active Directory, Virtual Networks, and Azure Storage. Implement and manage Infrastructure as Code (IaC) using tools such as ARM templates, Bicep, Terraform, and PowerShell DSC. Monitor, troubleshoot, and optimize Azure workloads to ensure high availability, performance, and cost-effectiveness. Design and implement security best practices, including identity and access management, secure networking, encryption, and compliance controls within Azure environments. Collaborate with software development teams to create CI/CD pipelines and automate deployment processes using Azure DevOps and GitHub Actions. Perform migrations from on-premises or other cloud platforms to Azure, ensuring minimal downtime and business continuity. Qualifications and Skills Extensive experience in IT infrastructure or cloud engineering, with strong hands-on experience with Microsoft Azure. Experience with Microsoft Fabric Creating and maintaining AI agents - chatbots and more Building containerised applications Strong expertise in Azure-native services, cloud networking, security, and automation. Proficiency with Scripting and automation tools such as PowerShell, Azure CLI, and/or Python. Solid understanding of DevOps principles and tools, including Azure DevOps, Git, GitHub, and CI/CD pipelines. Experience with containerization and orchestration technologies, such as Docker and Kubernetes. Familiarity with monitoring and observability solutions such as Azure Monitor, Log Analytics, and Application Insights. Knowledge of identity and access management, governance, and compliance within Azure environments. Azure certifications such as Azure Solutions Architect Expert, Azure Administrator Associate, or Azure DevOps Engineer Expert are strongly preferred. In the first instance, please submit your CV.
Service Desk Analyst Location: Motherwell, ML1 Salary: £25,000 per annum (depending on experience) Contract: Full time, Permanent Do you have experience of technical troubleshooting within a fast-paced professional environment The Digital team have an exciting opportunity to join them as a Service Desk Analyst. Within this role you will be responsible for providing a range of remote and deskside support to all users; resolving both software and hardware related issues and managing the hardware deployment and returns. This is a varied role where you will have a range of responsibilities including: Deploying and managing mobile devices and laptops, ensuring compliance with MDM (Intune) and installation of required business software, security tools and updates. Maintaining ICT asset registers, including mobile numbers, device locations and warranty records; coordinate delivery and returns with staff and suppliers. Providing Service Desk support, resolving hardware, software, mobile, printer, telephony (BT Cloudworks) and network issues, including on-site support where required. Deploying and managing applications across Android and Windows devices via Intune. Creating and managing user accounts, permissions and dynamic groups across M365, Azure, Entra ID and Exchange Admin. Monitoring and remediating security vulnerabilities through the Sophos security console. Liaising with external ICT providers to troubleshoot infrastructure issues. Supporting ongoing ICT operations using Microsoft technologies including Microsoft 365, Azure, Intune, Entra ID and Android platforms, and undertake additional duties as required by ICT leadership. About You A minimum of 1 years' experience, preferably within a professional services environment. Methodical in approach to resolving end user's issues and troubleshooting. Good time management, communication and organisational skills. Positive, enthusiastic and resilient manner - enjoys a challenge. Takes ownership of problems and proactively resolves technical problems, ensuring that technical solutions continue to meet business requirements. Takes full accountability for actions taken and decisions made. Puts users first and can manage competing priorities. Self-driven to learn new technologies. About Us At Enable we believe in developing all our staff and we provide an extensive learning programme together with in-house career development opportunities. We also have an excellent range of staff benefits on offer including but not limited to: Health cash plans providing a wide range of health benefits to help people cover the cost of their everyday health care. Employee Assistance Programme Cycle to Work Scheme Season Ticket Loans Blue Light Card Where required, Enable will fully fund SVQ Health and Social Care qualifications required for SSSC registration. Starting a career with Enable is the first step towards making a real difference in our award-winning charity s mission to help create an equal society for every person who has a learning disability. Enable is an equal opportunities employer and our recruitment, selection and assessment process is based entirely on values, skills and competencies required of the specific roles. The cost of PVG is paid upfront by the organisation and deducted from your wage if successfully appointed. Enable reserve the right to close this vacancy early if we receive sufficient applications. Please submit your application as early as possible if this vacancy is of interest. Note: The successful applicant will be required to register with the Scottish Social Services Council (SSSC) within 3 months of their start date. Terms and Conditions Apply
31/03/2026
Full time
Service Desk Analyst Location: Motherwell, ML1 Salary: £25,000 per annum (depending on experience) Contract: Full time, Permanent Do you have experience of technical troubleshooting within a fast-paced professional environment The Digital team have an exciting opportunity to join them as a Service Desk Analyst. Within this role you will be responsible for providing a range of remote and deskside support to all users; resolving both software and hardware related issues and managing the hardware deployment and returns. This is a varied role where you will have a range of responsibilities including: Deploying and managing mobile devices and laptops, ensuring compliance with MDM (Intune) and installation of required business software, security tools and updates. Maintaining ICT asset registers, including mobile numbers, device locations and warranty records; coordinate delivery and returns with staff and suppliers. Providing Service Desk support, resolving hardware, software, mobile, printer, telephony (BT Cloudworks) and network issues, including on-site support where required. Deploying and managing applications across Android and Windows devices via Intune. Creating and managing user accounts, permissions and dynamic groups across M365, Azure, Entra ID and Exchange Admin. Monitoring and remediating security vulnerabilities through the Sophos security console. Liaising with external ICT providers to troubleshoot infrastructure issues. Supporting ongoing ICT operations using Microsoft technologies including Microsoft 365, Azure, Intune, Entra ID and Android platforms, and undertake additional duties as required by ICT leadership. About You A minimum of 1 years' experience, preferably within a professional services environment. Methodical in approach to resolving end user's issues and troubleshooting. Good time management, communication and organisational skills. Positive, enthusiastic and resilient manner - enjoys a challenge. Takes ownership of problems and proactively resolves technical problems, ensuring that technical solutions continue to meet business requirements. Takes full accountability for actions taken and decisions made. Puts users first and can manage competing priorities. Self-driven to learn new technologies. About Us At Enable we believe in developing all our staff and we provide an extensive learning programme together with in-house career development opportunities. We also have an excellent range of staff benefits on offer including but not limited to: Health cash plans providing a wide range of health benefits to help people cover the cost of their everyday health care. Employee Assistance Programme Cycle to Work Scheme Season Ticket Loans Blue Light Card Where required, Enable will fully fund SVQ Health and Social Care qualifications required for SSSC registration. Starting a career with Enable is the first step towards making a real difference in our award-winning charity s mission to help create an equal society for every person who has a learning disability. Enable is an equal opportunities employer and our recruitment, selection and assessment process is based entirely on values, skills and competencies required of the specific roles. The cost of PVG is paid upfront by the organisation and deducted from your wage if successfully appointed. Enable reserve the right to close this vacancy early if we receive sufficient applications. Please submit your application as early as possible if this vacancy is of interest. Note: The successful applicant will be required to register with the Scottish Social Services Council (SSSC) within 3 months of their start date. Terms and Conditions Apply
CYBER SECURITY ANALYST SECURITY OPERATIONS CENTER (SOC). Summer-Browning Associates is supporting our client in the Central Government who is seeking a Cyber Security Analyst for an initial 12-month assignment, with the possibility of extension. Location: London Hybrid Remote The ideal candidates will hold active DV clearance and have a proven background in Cyber Security, with the following skills and experience: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation. Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or GIAC are highly desirable. To apply, please submit your latest CV for review.
31/03/2026
Contractor
CYBER SECURITY ANALYST SECURITY OPERATIONS CENTER (SOC). Summer-Browning Associates is supporting our client in the Central Government who is seeking a Cyber Security Analyst for an initial 12-month assignment, with the possibility of extension. Location: London Hybrid Remote The ideal candidates will hold active DV clearance and have a proven background in Cyber Security, with the following skills and experience: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation. Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or GIAC are highly desirable. To apply, please submit your latest CV for review.
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: 45ph - 85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online only) Sat to Tue Off Wed to Sun - Nights (Apply online only) (The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates) 28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
31/03/2026
Contractor
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: 45ph - 85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online only) Sat to Tue Off Wed to Sun - Nights (Apply online only) (The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates) 28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
Palo Alto XSoar Developer Role Candidates in this role are responsible for the development and maintenance of the code and capabilities of the Security Orchestration, Automation and Response (SOAR) platform. Candidates will work with the Manager of Detection & Response Engineering and will work jointly with our detection engineering, threat detection and response teams to specify clear priorities, evaluate technical tradeoffs, and build high-impact features within the SOAR platform. The candidates' main responsibilities will be to: Focus on the development, maintenance, and delivery of new Security Orchestration and Automation content including custom SOAR Playbooks, Automations/Scripts, Jobs, dashboards, reports, widgets, RESTful API integrations, and code via Continuous Integration/Continuous Delivery pipelines adhering to an Agile development practice Reduce Incident Response efforts and increase quality leveraging XSOAR for Security Orchestration, Automation and Response (SOAR) Automate manual SOC procedures and develop, implement, and maintain playbooks Detail SOAR workflows, scripts, and develop, test and debug code and use established code repository for tracking. Use python/other Scripting languages to perform the customizations to develop the required automation. Work with the existing playbook framework and ensure the amendments are hooked accurately to the existing framework. Prioritize and coordinate backlog of SOAR integration and automation requests, making sure we have a healthy balance between defect resolution and new features. Work in partnership with the incident response team to craft find opportunities for improvement Qualifications Technical Skills 3+ year prior experience in a similar position Sophisticated knowledge of the Palo Alto Cortex XSOAR platform Ability to create documentation for Palo Alto Networks Cortex XSOAR playbooks Proficient in Python, JavaScript, and PowerShell are an asset Good understanding of REST/SOAP/WSDL/XML (Web services) Understanding of cybersecurity incident response procedures, experience as a Security Incident Responder or SOC analyst is a plus Strong understanding of cybersecurity technologies, protocols, and applications Soft Skills Strong analytical skills to evaluate complex multivariate problems and find a systematic approach to gain a quick resolution, often under stress! Strong problem solving, documentation, process execution, time management and interpersonal skills. Ability to communicate sophisticated information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. Passion and drive to work in start-up division with potential of significant growth in scope and services
31/03/2026
Full time
Palo Alto XSoar Developer Role Candidates in this role are responsible for the development and maintenance of the code and capabilities of the Security Orchestration, Automation and Response (SOAR) platform. Candidates will work with the Manager of Detection & Response Engineering and will work jointly with our detection engineering, threat detection and response teams to specify clear priorities, evaluate technical tradeoffs, and build high-impact features within the SOAR platform. The candidates' main responsibilities will be to: Focus on the development, maintenance, and delivery of new Security Orchestration and Automation content including custom SOAR Playbooks, Automations/Scripts, Jobs, dashboards, reports, widgets, RESTful API integrations, and code via Continuous Integration/Continuous Delivery pipelines adhering to an Agile development practice Reduce Incident Response efforts and increase quality leveraging XSOAR for Security Orchestration, Automation and Response (SOAR) Automate manual SOC procedures and develop, implement, and maintain playbooks Detail SOAR workflows, scripts, and develop, test and debug code and use established code repository for tracking. Use python/other Scripting languages to perform the customizations to develop the required automation. Work with the existing playbook framework and ensure the amendments are hooked accurately to the existing framework. Prioritize and coordinate backlog of SOAR integration and automation requests, making sure we have a healthy balance between defect resolution and new features. Work in partnership with the incident response team to craft find opportunities for improvement Qualifications Technical Skills 3+ year prior experience in a similar position Sophisticated knowledge of the Palo Alto Cortex XSOAR platform Ability to create documentation for Palo Alto Networks Cortex XSOAR playbooks Proficient in Python, JavaScript, and PowerShell are an asset Good understanding of REST/SOAP/WSDL/XML (Web services) Understanding of cybersecurity incident response procedures, experience as a Security Incident Responder or SOC analyst is a plus Strong understanding of cybersecurity technologies, protocols, and applications Soft Skills Strong analytical skills to evaluate complex multivariate problems and find a systematic approach to gain a quick resolution, often under stress! Strong problem solving, documentation, process execution, time management and interpersonal skills. Ability to communicate sophisticated information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. Passion and drive to work in start-up division with potential of significant growth in scope and services
About the opportunity Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed career support. helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 30/03 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you ll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer. Starting Salaries: Typically £22,000 £35,000 (role dependent). Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees complete the training, gain essential cyber security skills.
26/03/2026
Full time
About the opportunity Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 3) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed career support. helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 30/03 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you ll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer. Starting Salaries: Typically £22,000 £35,000 (role dependent). Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees complete the training, gain essential cyber security skills.
Infrastructure Analyst Location: Aberdeen, Scotland Our client are on the lookout for a strong 2nd Line Engineer keen to move in to Infrastructure or Infrastructure Analyst ready for their next move. This is a great opportunity to join a forward-thinking professional services firm, where you'll play a key role in supporting business-critical systems and driving IT improvements. You'll get to work with a wide range of technologies, from Citrix and Visualfiles to cloud, storage, and backup solutions, while contributing to exciting infrastructure projects that shape the future of the firm's IT environment. What You'll Be Doing Acting as a trusted point of contact, delivering excellent customer service across the business. Supporting and maintaining Citrix environments, Visualfiles, storage, and backup solutions. Providing 2nd/3rd line support for infrastructure-related incidents and requests. Monitoring and managing servers, storage, and networks across multiple office locations. Ensuring backup, recovery, and security measures are in place to meet compliance standards (GDPR, ISO 27001). Getting involved in infrastructure projects, upgrades, and system improvements. What We're Looking For Solid knowledge of Windows Server, Active Directory, Group Policy, networking. Strong hands-on experience with Citrix Virtual Apps/Desktops. Background in Visualfiles administration/support. Experience with storage (SAN), backup tools (Veeam, Commvault), and virtualisation (VMware/Hyper-V). Previous experience working in a professional services or legal environment. Strong communicator, problem solver, and team player. Full, clean UK driver's licence. Nice to Have Certifications such as Citrix Certified Associate or Microsoft Certified: Azure Administrator . Knowledge of Microsoft Azure or other cloud platforms. Familiarity with ITIL practices and service management tools. Exposure to other case management/legal applications (e.g., SOS). Why Apply? Chance to work on both day-to-day support and strategic IT projects . Wide technical exposure in a professional, supportive environment. Real opportunity to influence the IT roadmap and contribute to long-term business goals. We are looking to arrange interviews for as soon as possible, so if this role is of interest please apply ASAP!
07/10/2025
Full time
Infrastructure Analyst Location: Aberdeen, Scotland Our client are on the lookout for a strong 2nd Line Engineer keen to move in to Infrastructure or Infrastructure Analyst ready for their next move. This is a great opportunity to join a forward-thinking professional services firm, where you'll play a key role in supporting business-critical systems and driving IT improvements. You'll get to work with a wide range of technologies, from Citrix and Visualfiles to cloud, storage, and backup solutions, while contributing to exciting infrastructure projects that shape the future of the firm's IT environment. What You'll Be Doing Acting as a trusted point of contact, delivering excellent customer service across the business. Supporting and maintaining Citrix environments, Visualfiles, storage, and backup solutions. Providing 2nd/3rd line support for infrastructure-related incidents and requests. Monitoring and managing servers, storage, and networks across multiple office locations. Ensuring backup, recovery, and security measures are in place to meet compliance standards (GDPR, ISO 27001). Getting involved in infrastructure projects, upgrades, and system improvements. What We're Looking For Solid knowledge of Windows Server, Active Directory, Group Policy, networking. Strong hands-on experience with Citrix Virtual Apps/Desktops. Background in Visualfiles administration/support. Experience with storage (SAN), backup tools (Veeam, Commvault), and virtualisation (VMware/Hyper-V). Previous experience working in a professional services or legal environment. Strong communicator, problem solver, and team player. Full, clean UK driver's licence. Nice to Have Certifications such as Citrix Certified Associate or Microsoft Certified: Azure Administrator . Knowledge of Microsoft Azure or other cloud platforms. Familiarity with ITIL practices and service management tools. Exposure to other case management/legal applications (e.g., SOS). Why Apply? Chance to work on both day-to-day support and strategic IT projects . Wide technical exposure in a professional, supportive environment. Real opportunity to influence the IT roadmap and contribute to long-term business goals. We are looking to arrange interviews for as soon as possible, so if this role is of interest please apply ASAP!
Nextech Group Ltd
Newcastle Upon Tyne, Tyne And Wear
Infrastructure Analyst Location: Newcastle Are you an experienced IT professional with a passion for infrastructure and support? This is a great opportunity to join a forward-thinking professional services firm, where you'll play a key role in supporting business-critical systems and driving IT improvements. You'll get to work with a wide range of technologies, from Citrix and Visualfiles to cloud, storage, and backup solutions, while contributing to exciting infrastructure projects that shape the future of the firm's IT environment. What You'll Be Doing Acting as a trusted point of contact, delivering excellent customer service across the business. Supporting and maintaining Citrix environments, Visualfiles, storage, and backup solutions. Providing 2nd/3rd line support for infrastructure-related incidents and requests. Monitoring and managing servers, storage, and networks across multiple office locations. Ensuring backup, recovery, and security measures are in place to meet compliance standards (GDPR, ISO 27001). Getting involved in infrastructure projects, upgrades, and system improvements. What We're Looking For Solid knowledge of Windows Server, Active Directory, Group Policy, networking. Strong hands-on experience with Citrix Virtual Apps/Desktops. Background in Visualfiles administration/support. Experience with storage (SAN), backup tools (Veeam, Commvault), and virtualisation (VMware/Hyper-V). Previous experience working in a professional services or legal environment. Strong communicator, problem solver, and team player. Full, clean UK driver's licence. Nice to Have Certifications such as Citrix Certified Associate or Microsoft Certified: Azure Administrator . Knowledge of Microsoft Azure or other cloud platforms. Familiarity with ITIL practices and service management tools. Exposure to other case management/legal applications (e.g., SOS). Why Apply? Chance to work on both day-to-day support and strategic IT projects . Wide technical exposure in a professional, supportive environment. Real opportunity to influence the IT roadmap and contribute to long-term business goals. We are looking to arrange interviews for as soon as possible, so if this role is of interest please apply ASAP!
07/10/2025
Full time
Infrastructure Analyst Location: Newcastle Are you an experienced IT professional with a passion for infrastructure and support? This is a great opportunity to join a forward-thinking professional services firm, where you'll play a key role in supporting business-critical systems and driving IT improvements. You'll get to work with a wide range of technologies, from Citrix and Visualfiles to cloud, storage, and backup solutions, while contributing to exciting infrastructure projects that shape the future of the firm's IT environment. What You'll Be Doing Acting as a trusted point of contact, delivering excellent customer service across the business. Supporting and maintaining Citrix environments, Visualfiles, storage, and backup solutions. Providing 2nd/3rd line support for infrastructure-related incidents and requests. Monitoring and managing servers, storage, and networks across multiple office locations. Ensuring backup, recovery, and security measures are in place to meet compliance standards (GDPR, ISO 27001). Getting involved in infrastructure projects, upgrades, and system improvements. What We're Looking For Solid knowledge of Windows Server, Active Directory, Group Policy, networking. Strong hands-on experience with Citrix Virtual Apps/Desktops. Background in Visualfiles administration/support. Experience with storage (SAN), backup tools (Veeam, Commvault), and virtualisation (VMware/Hyper-V). Previous experience working in a professional services or legal environment. Strong communicator, problem solver, and team player. Full, clean UK driver's licence. Nice to Have Certifications such as Citrix Certified Associate or Microsoft Certified: Azure Administrator . Knowledge of Microsoft Azure or other cloud platforms. Familiarity with ITIL practices and service management tools. Exposure to other case management/legal applications (e.g., SOS). Why Apply? Chance to work on both day-to-day support and strategic IT projects . Wide technical exposure in a professional, supportive environment. Real opportunity to influence the IT roadmap and contribute to long-term business goals. We are looking to arrange interviews for as soon as possible, so if this role is of interest please apply ASAP!
Position: SOC Analyst Location: Cheltenham (Hybrid - 3 days a week) Contract Type: 3 months Hours: 40 per week Start Date: 16/10/2025 Holiday Entitlement: 33 days Pay Rate: £380 PAYE/£504 Umbrella PD About the Team: You will have the opportunity to leverage the latest technologies and develop your skills in an innovative, collaborative environment that supports career growth and learning. What You Will Do: As a SOC Analyst, you will play a key role in monitoring and responding to security alerts, assisting with incident investigations, and supporting clients to strengthen their security posture. Key responsibilities include: Working a combination of day and night shifts. Responding to security alerts and incidents. Collaborating closely with client analysts. Conducting detailed analysis of monitoring system data. Escalating incidents when necessary and serving as a point of contact. Planning and conducting threat hunting under supervision. Reviewing alerts for tuning opportunities. Performing proactive threat research. Supporting the creation and implementation of new detection signatures. Assisting in client engagements and service meetings. Contributing to the development of SOC playbooks. Required Skills and Experience: Strong understanding of computer networks, operating systems, software, hardware, and security principles. Knowledge of cyber security risks and mitigation strategies. Working familiarity with security technologies such as Firewalls, host intrusion prevention, and antivirus solutions. Relevant academic or industry-specific training. Preferred Attributes: Ability to identify more efficient ways of working. Maintain focus, energy, and effort under pressure. Proven creativity and innovation in problem-solving. Commitment to learning new skills, applications, and technologies. If you are interested, please apply directly. Randstad Technologies is acting as an Employment Business in relation to this vacancy.
06/10/2025
Contractor
Position: SOC Analyst Location: Cheltenham (Hybrid - 3 days a week) Contract Type: 3 months Hours: 40 per week Start Date: 16/10/2025 Holiday Entitlement: 33 days Pay Rate: £380 PAYE/£504 Umbrella PD About the Team: You will have the opportunity to leverage the latest technologies and develop your skills in an innovative, collaborative environment that supports career growth and learning. What You Will Do: As a SOC Analyst, you will play a key role in monitoring and responding to security alerts, assisting with incident investigations, and supporting clients to strengthen their security posture. Key responsibilities include: Working a combination of day and night shifts. Responding to security alerts and incidents. Collaborating closely with client analysts. Conducting detailed analysis of monitoring system data. Escalating incidents when necessary and serving as a point of contact. Planning and conducting threat hunting under supervision. Reviewing alerts for tuning opportunities. Performing proactive threat research. Supporting the creation and implementation of new detection signatures. Assisting in client engagements and service meetings. Contributing to the development of SOC playbooks. Required Skills and Experience: Strong understanding of computer networks, operating systems, software, hardware, and security principles. Knowledge of cyber security risks and mitigation strategies. Working familiarity with security technologies such as Firewalls, host intrusion prevention, and antivirus solutions. Relevant academic or industry-specific training. Preferred Attributes: Ability to identify more efficient ways of working. Maintain focus, energy, and effort under pressure. Proven creativity and innovation in problem-solving. Commitment to learning new skills, applications, and technologies. If you are interested, please apply directly. Randstad Technologies is acting as an Employment Business in relation to this vacancy.
We are currently recruiting for Senior Cyber Security Analysts and Associate Security Analysts - both working a 3-month contract for our client 3 days per week on-site in London. As a senior security analyst with responsibility for incident response, you will: lead the investigation of security alerts to understand the nature and extent of possible cyber incidents lead the forensic analysis of systems, files, network traffic and cloud environments lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions support the wider coordination of cyber incidents review previous incidents to identify lessons and actions identify and deliver opportunities for continual improvement of the incident response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities develop and update internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, security analysts be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: significant experience investigating and responding to cyber incidents significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents experience managing and coordinating the response to cyber incidents experience coaching and mentoring junior staff an in-depth understanding of the tools, techniques and procedures used by threat actors excellent analytical and problem solving skills excellent verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS As an associate security analyst you will: triage and investigate cyber security alerts and reports from users use a variety of techniques to analyse systems, files, network traffic and cloud environments and understand the nature and extent of possible cyber incidents support the technical response to cyber incidents by identifying and implementing (or supporting the implementation of) containment, eradication and recovery actions support the coordination of cyber incidents contribute to post-incident reviews to identify lessons and actions identify opportunities for, and support the delivery of, continual improvements to the incident investigation and response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities contribute to internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, apprentice security analysts be responsible for line management of apprentice security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join We're interested in people who have: experience investigating and responding to cyber incidents experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an equivalent SIEM tool is acceptable) an understanding of the tools, techniques and procedures commonly used by threat actors good analytical and problem-solving skills good verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS If you feel you have the skills and experience needed for this role; please do apply now.
06/10/2025
Contractor
We are currently recruiting for Senior Cyber Security Analysts and Associate Security Analysts - both working a 3-month contract for our client 3 days per week on-site in London. As a senior security analyst with responsibility for incident response, you will: lead the investigation of security alerts to understand the nature and extent of possible cyber incidents lead the forensic analysis of systems, files, network traffic and cloud environments lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions support the wider coordination of cyber incidents review previous incidents to identify lessons and actions identify and deliver opportunities for continual improvement of the incident response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities develop and update internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, security analysts be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: significant experience investigating and responding to cyber incidents significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents experience managing and coordinating the response to cyber incidents experience coaching and mentoring junior staff an in-depth understanding of the tools, techniques and procedures used by threat actors excellent analytical and problem solving skills excellent verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS As an associate security analyst you will: triage and investigate cyber security alerts and reports from users use a variety of techniques to analyse systems, files, network traffic and cloud environments and understand the nature and extent of possible cyber incidents support the technical response to cyber incidents by identifying and implementing (or supporting the implementation of) containment, eradication and recovery actions support the coordination of cyber incidents contribute to post-incident reviews to identify lessons and actions identify opportunities for, and support the delivery of, continual improvements to the incident investigation and response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities contribute to internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, apprentice security analysts be responsible for line management of apprentice security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join We're interested in people who have: experience investigating and responding to cyber incidents experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an equivalent SIEM tool is acceptable) an understanding of the tools, techniques and procedures commonly used by threat actors good analytical and problem-solving skills good verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS If you feel you have the skills and experience needed for this role; please do apply now.
LA International Computer Consultants Ltd
Cheltenham, Gloucestershire
*12 hour shift patterns & inside IR35* As a SOC Analyst you will: * Work a combination of day and night shifts. * Respond to alerts. * Work closely with client organization analysts. * Perform detailed analysis of the data captured by monitoring systems. * Escalate incidents where necessary and act as a point of contact throughout * Under supervision, plan and conduct threat hunting across client environments. * Review and identify alerts for further tuning. * Conduct proactive threat research. * Support the recommendation and implementation of new detection signatures. * Support client engagements and/or service meetings. * Support the development of SOC playbooks. The following skills and experience are required for this role: * A good understanding of computer networks, operating systems, software, hardware and security. * An understanding of cyber security risks associated with various technologies and ways to manage them. * A good working knowledge of various security technologies such as network and application Firewalls, host intrusion prevention and antivirus. * Any relevant academic or industry specific training. Set yourself apart: * Ability to seek out new ways of working more efficiently. * Sustain a high level of focus, effort, and energy. * Proven history developing innovative & creative solutions. * Strives to learn new skills, applications, and technologies through focused effort. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
06/10/2025
Contractor
*12 hour shift patterns & inside IR35* As a SOC Analyst you will: * Work a combination of day and night shifts. * Respond to alerts. * Work closely with client organization analysts. * Perform detailed analysis of the data captured by monitoring systems. * Escalate incidents where necessary and act as a point of contact throughout * Under supervision, plan and conduct threat hunting across client environments. * Review and identify alerts for further tuning. * Conduct proactive threat research. * Support the recommendation and implementation of new detection signatures. * Support client engagements and/or service meetings. * Support the development of SOC playbooks. The following skills and experience are required for this role: * A good understanding of computer networks, operating systems, software, hardware and security. * An understanding of cyber security risks associated with various technologies and ways to manage them. * A good working knowledge of various security technologies such as network and application Firewalls, host intrusion prevention and antivirus. * Any relevant academic or industry specific training. Set yourself apart: * Ability to seek out new ways of working more efficiently. * Sustain a high level of focus, effort, and energy. * Proven history developing innovative & creative solutions. * Strives to learn new skills, applications, and technologies through focused effort. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.