Acorn Insurance and Financial Services Limited
Liverpool
Due to a period of exciting growth Acorn are looking for a highly skilled and experienced Senior Information Security Analyst to join our Information Security Team. Within this role you get the opportunity to join a collaborative team and have a chance to blend GRC responsibilities with technical security experience, all whilst working for a market leading insurance company, supporting and maintaining robust security controls and regulatory compliance.
Job Title: Senior Information Security Analyst (12 month FTC)
Location: Liverpool City Centre, Hybrid working available
Working Hours: Monday to Friday, 37.5 hours per week , 9:00 AM – 5:30 PM
Salary: £50,000 - £60,000 pa (DOE).
What you will be doing:
Work with all parties across the business to identify and assess risk and ensure mitigations are tracked to completion.
Lead the development and maintenance of information security policies, standards and procedures in line with regulatory frameworks and industry standards.
Lead third party risk management processes.
Collaborate across all areas of the business to align security policies and processes with business objectives and regulatory obligations.
Work with Security Operations and IT teams to provide oversight of vulnerability assessments and remediation activities.
Lead on security architecture reviews for new systems and services.
Evaluate technical security controls and recommending improvements.
Support the implementation of security tools and technologies.
Provide oversight of the security incident management process.
Provide security metrics for interested parties at all levels.
Lead the security awareness programme to promote a culture of security within all levels of the Group.
Provide support for internal and external security audits.
Lead security governance meetings representing the Information Security team and standing in for the Head of Information Security when required.
Provide subject matter expertise liaising across all business functions.
What we look for:
Minimum 5 years' experience in information security roles.
Strong leadership and mentorship abilities with a strategic mindset.
Experience with risk assessment methodologies.
Excellent analytical and problem-solving skills with attention to detail.
Strong communication skills with the ability to explain complex security concepts to non-technical stakeholders.
Ability to manage risk and compliance projects and drive security initiatives.
Knowledge of information security frameworks such as ISO 27001 or NIST.
Knowledge of vulnerability management processes.
About Acorn Insurance With over 40 years of experience, Acorn Insurance is a specialist provider dedicated to helping individuals secure motor insurance across the UK. We proudly serve more than 50,000 customers, ensuring they find policies that meet their needs and provide the peace of mind that comes with high-quality cover.
At Acorn Insurance, we offer comprehensive training and continuous in-house coaching. You'll receive in-depth, FCA-regulated industry knowledge and all the tools necessary to grow your career with us.
We celebrate diversity and are committed to fostering a culture where everyone feels respected and valued. As a Disability Confident Level 1 and Level 2 employer, we ensure our workplace is accessible and inclusive, encouraging our people to bring their best selves to work every day.
The Acorn Group has been recognised as a Great Place to Work for 2024/5. A record number of employees participated in our survey, overwhelmingly highlighting our welcoming and supportive atmosphere as an excellent place to build a career. We are committed to continuous improvement and have ambitious plans for 2025.
Why Acorn Insurance? Acorn Insurance want to give you more than a job, we want to give you a purpose and a career. So, what can we offer you as an employer? Some of the "your tomorrow" benefits you will receive include: Wellbeing:
Enhanced Annual Leave entitlement starting at 31 days and potentially increasing to 35 days per year depending on grade & length of service (including bank holidays)
Enhanced paternity pay and 16 weeks full maternity pay.
Colleague Assistance programme offers a suite of wellbeing services such as:
6 Free Counselling sessions per year
Unlimited access to a telephone councillor 24/7
Access to a free 4-week programme of cognitive behavioural therapy (CBT) with a trained therapist mentor.
Network of internal qualified mental health first aiders are available to provide support to colleagues.
Financial:
A core level of life assurance with the option to increase cover via salary sacrifice and add your spouse/partner
Ability to access your earnings before payday via Dayforce Wallet.
Company pension scheme
Refer a friend scheme with a £250 bonus for every colleague recommended on passing their probation period.
Access to a flexible benefits platform including an annual flex pot allowance to spend on over 15 benefits of your choice.
Ability to give back. You can opt into donating money to charity to climate positive organisations directly from your salary.
Reward, Recognition and Culture :
Long Service Award paid on 5,10- and 15-years’ service
A reward and recognition hub to celebrate and reward colleagues and peers.
Consistent and engaging company events including company awards, competitions and charity fundraisers.
Budgets for department leaders to use for social and engagement events. Please visit out website to view more of our excellent work benefits!
All roles are subject to DBS and Financial checks, any offer made will be conditional until checks are completed to a satisfactory standard. Unfortunately, due to the length of training and complexity of the role, we can only accept applications from candidates who have at least one year remaining on their (Graduate/ Post study work) visa. Unfortunately, we are unable to provide visa sponsorships. At Acorn, we are committed to creating an inclusive and supportive work environment. We recognise that candidates may have specific needs and are happy to consider reasonable adjustments to the recruitment process and working environment to accommodate individual requirements. Whether it’s modifying equipment, adjusting working hours, or providing additional support, we aim to ensure all employees can perform at their best. If you require any reasonable adjustments, please let us know during the application or interview process, and we will work with you to ensure your needs are met.
25/04/2025
Full time
Due to a period of exciting growth Acorn are looking for a highly skilled and experienced Senior Information Security Analyst to join our Information Security Team. Within this role you get the opportunity to join a collaborative team and have a chance to blend GRC responsibilities with technical security experience, all whilst working for a market leading insurance company, supporting and maintaining robust security controls and regulatory compliance.
Job Title: Senior Information Security Analyst (12 month FTC)
Location: Liverpool City Centre, Hybrid working available
Working Hours: Monday to Friday, 37.5 hours per week , 9:00 AM – 5:30 PM
Salary: £50,000 - £60,000 pa (DOE).
What you will be doing:
Work with all parties across the business to identify and assess risk and ensure mitigations are tracked to completion.
Lead the development and maintenance of information security policies, standards and procedures in line with regulatory frameworks and industry standards.
Lead third party risk management processes.
Collaborate across all areas of the business to align security policies and processes with business objectives and regulatory obligations.
Work with Security Operations and IT teams to provide oversight of vulnerability assessments and remediation activities.
Lead on security architecture reviews for new systems and services.
Evaluate technical security controls and recommending improvements.
Support the implementation of security tools and technologies.
Provide oversight of the security incident management process.
Provide security metrics for interested parties at all levels.
Lead the security awareness programme to promote a culture of security within all levels of the Group.
Provide support for internal and external security audits.
Lead security governance meetings representing the Information Security team and standing in for the Head of Information Security when required.
Provide subject matter expertise liaising across all business functions.
What we look for:
Minimum 5 years' experience in information security roles.
Strong leadership and mentorship abilities with a strategic mindset.
Experience with risk assessment methodologies.
Excellent analytical and problem-solving skills with attention to detail.
Strong communication skills with the ability to explain complex security concepts to non-technical stakeholders.
Ability to manage risk and compliance projects and drive security initiatives.
Knowledge of information security frameworks such as ISO 27001 or NIST.
Knowledge of vulnerability management processes.
About Acorn Insurance With over 40 years of experience, Acorn Insurance is a specialist provider dedicated to helping individuals secure motor insurance across the UK. We proudly serve more than 50,000 customers, ensuring they find policies that meet their needs and provide the peace of mind that comes with high-quality cover.
At Acorn Insurance, we offer comprehensive training and continuous in-house coaching. You'll receive in-depth, FCA-regulated industry knowledge and all the tools necessary to grow your career with us.
We celebrate diversity and are committed to fostering a culture where everyone feels respected and valued. As a Disability Confident Level 1 and Level 2 employer, we ensure our workplace is accessible and inclusive, encouraging our people to bring their best selves to work every day.
The Acorn Group has been recognised as a Great Place to Work for 2024/5. A record number of employees participated in our survey, overwhelmingly highlighting our welcoming and supportive atmosphere as an excellent place to build a career. We are committed to continuous improvement and have ambitious plans for 2025.
Why Acorn Insurance? Acorn Insurance want to give you more than a job, we want to give you a purpose and a career. So, what can we offer you as an employer? Some of the "your tomorrow" benefits you will receive include: Wellbeing:
Enhanced Annual Leave entitlement starting at 31 days and potentially increasing to 35 days per year depending on grade & length of service (including bank holidays)
Enhanced paternity pay and 16 weeks full maternity pay.
Colleague Assistance programme offers a suite of wellbeing services such as:
6 Free Counselling sessions per year
Unlimited access to a telephone councillor 24/7
Access to a free 4-week programme of cognitive behavioural therapy (CBT) with a trained therapist mentor.
Network of internal qualified mental health first aiders are available to provide support to colleagues.
Financial:
A core level of life assurance with the option to increase cover via salary sacrifice and add your spouse/partner
Ability to access your earnings before payday via Dayforce Wallet.
Company pension scheme
Refer a friend scheme with a £250 bonus for every colleague recommended on passing their probation period.
Access to a flexible benefits platform including an annual flex pot allowance to spend on over 15 benefits of your choice.
Ability to give back. You can opt into donating money to charity to climate positive organisations directly from your salary.
Reward, Recognition and Culture :
Long Service Award paid on 5,10- and 15-years’ service
A reward and recognition hub to celebrate and reward colleagues and peers.
Consistent and engaging company events including company awards, competitions and charity fundraisers.
Budgets for department leaders to use for social and engagement events. Please visit out website to view more of our excellent work benefits!
All roles are subject to DBS and Financial checks, any offer made will be conditional until checks are completed to a satisfactory standard. Unfortunately, due to the length of training and complexity of the role, we can only accept applications from candidates who have at least one year remaining on their (Graduate/ Post study work) visa. Unfortunately, we are unable to provide visa sponsorships. At Acorn, we are committed to creating an inclusive and supportive work environment. We recognise that candidates may have specific needs and are happy to consider reasonable adjustments to the recruitment process and working environment to accommodate individual requirements. Whether it’s modifying equipment, adjusting working hours, or providing additional support, we aim to ensure all employees can perform at their best. If you require any reasonable adjustments, please let us know during the application or interview process, and we will work with you to ensure your needs are met.
Sponsorship is not available for this position.Applicants must be UK Nationals or hold Settled Status and be fully eligible to obtain SC clearance. You must hold a clean current driving licence as some travel may be required. Information Security Analyst Type: Permanent Location: Hybrid (West Midlands) Overview We are looking for a detail-oriented and proactive Information Security Compliance Analyst to join our team on a permanent basis. This role is pivotal in supporting the development and continuous improvement of our global information security compliance program. You will be responsible for ensuring that all corporate and subsidiary operations comply with internal security policies, regulatory requirements, and internationally recognised frameworks such as ISO27001, NIST, SOX, GDPR, CMMC, and others. Key Responsibilities - Support the execution and enhancement of the global information security compliance program. - Conduct internal audits, third-party risk assessments, and due diligence reviews. - Ensure alignment with regulatory and industry standards including ISO27001, NIST, SOX, GDPR, SOC 2, HIPAA, CCPA, LGPD. - Collaborate with cross-functional teams across multiple jurisdictions to drive compliance initiatives. - Identify gaps in security controls and recommend corrective actions. - Maintain and update security policies, procedures, and documentation. - Monitor changes in global regulations and assess their impact on business operations. Experience & Skills Required - Proven experience in information security compliance, risk management, and audit. - Strong understanding of international regulatory frameworks and standards. - Hands-on experience with: - ISO27001 audits and implementation - GDPR compliance - NIST cybersecurity framework - SOX, SOC 2, HIPAA, CCPA, LGPD - Ability to interpret complex regulatory requirements and translate them into actionable controls. - Excellent communication and stakeholder engagement skills. - Strong analytical and problem-solving capabilities. What We Offer - Competitive salary and benefits package - Flexible hybrid working model - Opportunities for professional development and certification - Collaborative and inclusive work environment Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
13/03/2026
Full time
Sponsorship is not available for this position.Applicants must be UK Nationals or hold Settled Status and be fully eligible to obtain SC clearance. You must hold a clean current driving licence as some travel may be required. Information Security Analyst Type: Permanent Location: Hybrid (West Midlands) Overview We are looking for a detail-oriented and proactive Information Security Compliance Analyst to join our team on a permanent basis. This role is pivotal in supporting the development and continuous improvement of our global information security compliance program. You will be responsible for ensuring that all corporate and subsidiary operations comply with internal security policies, regulatory requirements, and internationally recognised frameworks such as ISO27001, NIST, SOX, GDPR, CMMC, and others. Key Responsibilities - Support the execution and enhancement of the global information security compliance program. - Conduct internal audits, third-party risk assessments, and due diligence reviews. - Ensure alignment with regulatory and industry standards including ISO27001, NIST, SOX, GDPR, SOC 2, HIPAA, CCPA, LGPD. - Collaborate with cross-functional teams across multiple jurisdictions to drive compliance initiatives. - Identify gaps in security controls and recommend corrective actions. - Maintain and update security policies, procedures, and documentation. - Monitor changes in global regulations and assess their impact on business operations. Experience & Skills Required - Proven experience in information security compliance, risk management, and audit. - Strong understanding of international regulatory frameworks and standards. - Hands-on experience with: - ISO27001 audits and implementation - GDPR compliance - NIST cybersecurity framework - SOX, SOC 2, HIPAA, CCPA, LGPD - Ability to interpret complex regulatory requirements and translate them into actionable controls. - Excellent communication and stakeholder engagement skills. - Strong analytical and problem-solving capabilities. What We Offer - Competitive salary and benefits package - Flexible hybrid working model - Opportunities for professional development and certification - Collaborative and inclusive work environment Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Sponsorship is not available for this position.Applicants must be UK Nationals or hold Settled Status and be fully eligible to obtain SC clearance. You must hold a clean current driving licence as some travel may be required. Information Security Analyst Type: Permanent Location: Hybrid (West Midlands) Overview We are looking for a detail-oriented and proactive Information Security Compliance Analyst to join our team on a permanent basis. This role is pivotal in supporting the development and continuous improvement of our global information security compliance program. You will be responsible for ensuring that all corporate and subsidiary operations comply with internal security policies, regulatory requirements, and internationally recognised frameworks such as ISO27001, NIST, SOX, GDPR, CMMC, and others. Key Responsibilities - Support the execution and enhancement of the global information security compliance program. - Conduct internal audits, third-party risk assessments, and due diligence reviews. - Ensure alignment with regulatory and industry standards including ISO27001, NIST, SOX, GDPR, SOC 2, HIPAA, CCPA, LGPD. - Collaborate with cross-functional teams across multiple jurisdictions to drive compliance initiatives. - Identify gaps in security controls and recommend corrective actions. - Maintain and update security policies, procedures, and documentation. - Monitor changes in global regulations and assess their impact on business operations. Experience & Skills Required - Proven experience in information security compliance, risk management, and audit. - Strong understanding of international regulatory frameworks and standards. - Hands-on experience with: - ISO27001 audits and implementation - GDPR compliance - NIST cybersecurity framework - SOX, SOC 2, HIPAA, CCPA, LGPD - Ability to interpret complex regulatory requirements and translate them into actionable controls. - Excellent communication and stakeholder engagement skills. - Strong analytical and problem-solving capabilities. What We Offer - Competitive salary and benefits package - Flexible hybrid working model - Opportunities for professional development and certification - Collaborative and inclusive work environment Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found on our website.
13/03/2026
Full time
Sponsorship is not available for this position.Applicants must be UK Nationals or hold Settled Status and be fully eligible to obtain SC clearance. You must hold a clean current driving licence as some travel may be required. Information Security Analyst Type: Permanent Location: Hybrid (West Midlands) Overview We are looking for a detail-oriented and proactive Information Security Compliance Analyst to join our team on a permanent basis. This role is pivotal in supporting the development and continuous improvement of our global information security compliance program. You will be responsible for ensuring that all corporate and subsidiary operations comply with internal security policies, regulatory requirements, and internationally recognised frameworks such as ISO27001, NIST, SOX, GDPR, CMMC, and others. Key Responsibilities - Support the execution and enhancement of the global information security compliance program. - Conduct internal audits, third-party risk assessments, and due diligence reviews. - Ensure alignment with regulatory and industry standards including ISO27001, NIST, SOX, GDPR, SOC 2, HIPAA, CCPA, LGPD. - Collaborate with cross-functional teams across multiple jurisdictions to drive compliance initiatives. - Identify gaps in security controls and recommend corrective actions. - Maintain and update security policies, procedures, and documentation. - Monitor changes in global regulations and assess their impact on business operations. Experience & Skills Required - Proven experience in information security compliance, risk management, and audit. - Strong understanding of international regulatory frameworks and standards. - Hands-on experience with: - ISO27001 audits and implementation - GDPR compliance - NIST cybersecurity framework - SOX, SOC 2, HIPAA, CCPA, LGPD - Ability to interpret complex regulatory requirements and translate them into actionable controls. - Excellent communication and stakeholder engagement skills. - Strong analytical and problem-solving capabilities. What We Offer - Competitive salary and benefits package - Flexible hybrid working model - Opportunities for professional development and certification - Collaborative and inclusive work environment Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found on our website.
Role Title: Cyber Risk Analyst Location: Knutsford 3 days on site Duration: 30/10/2026 Rate 404 MUST BE PAYE THROUGH UMBRELLA Role Description: "Role Overview: The Cyber Risk Analysts will work under the guidance of the Lead Consultant to execute the detailed risk assessments and analysis of End-of-Life technologies. In this role, you will collect and analyze data on EOL systems, evaluate cyber risks using the defined methodology, and support the implementation of remediation plans. Key Responsibilities: Perform Risk Assessments: Conduct in-depth cyber risk assessments for identified EOL systems and technologies, following the methodology and framework established by the project. Gather necessary information on assets (software, hardware, applications that are end-of-life or end-of-support) and assess the potential cyber threats, vulnerabilities, and business impacts associated with each5. Document findings meticulously, ensuring each risk item is well-described (likelihood, impact, severity) in the risk register. Required Skills & Competencies: Analytical Skills: Strong analytical and problem-solving skills are essential. The analyst must be able to assess complex IT systems and identify risk factors, interpret vulnerability data, and quantitatively rate risks. Attention to detail is critical for reviewing large lists of EOL assets and ensuring nothing is missed. Cybersecurity Knowledge: Good understanding of foundational cybersecurity principles (confidentiality, integrity, availability) and how outdated technologies can pose threats. Familiarity with common vulnerabilities and exploits affecting older systems (legacy OS, unsupported software) is beneficial. Knowledge of cyber risk frameworks and standards (such as NIST, ISO27001) and basic concepts of risk assessment is expectedxxiv. Qualifications & Certifications: Education: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Equivalent experience in cyber risk or IT security roles can be considered in lieu of a formal degree. Certifications: Relevant industry certifications are not mandatory but highly valued. Certifications demonstrating knowledge of security and risk principles (e.g., CompTIA Security+, Certified Ethical Hacker (CEH), or GIAC/GSEC) would be a plus. Certifications specifically in risk management or governance (such as CRISC, Certified Information Systems Auditor (CISA), or ISO 27001 Lead Auditor/Implementer) are also advantageous for this role, as they indicate a grasp of risk and control assessment practices. Experience: Years of Experience: Approximately 3-5+ years of experience in cybersecurity or IT risk roles. This could include experience as a Cyber Risk Analyst, IT Risk Analyst, Security Analyst, Vulnerability Management Specialist, or GRC (Governance, Risk & Compliance) Analyst. Candidates with slightly more or less experience will be considered based on skill fit, but a baseline understanding from a few years in the field is expected. Risk Assessment Background: Hands-on experience conducting risk assessments or security assessments is required. For example, experience in identifying and assessing risks for IT systems, writing risk or control reports, or supporting risk treatment projects. Familiarity with creating or maintaining risk registers and tracking mitigation actions is important (e.g., experience ensuring "risks and remediation plans are regularly addressed" in previous rolesxxvii). Industry-Specific Experience (Desirable): Experience in the financial services sector or other highly-regulated industries is a plus.
13/03/2026
Contractor
Role Title: Cyber Risk Analyst Location: Knutsford 3 days on site Duration: 30/10/2026 Rate 404 MUST BE PAYE THROUGH UMBRELLA Role Description: "Role Overview: The Cyber Risk Analysts will work under the guidance of the Lead Consultant to execute the detailed risk assessments and analysis of End-of-Life technologies. In this role, you will collect and analyze data on EOL systems, evaluate cyber risks using the defined methodology, and support the implementation of remediation plans. Key Responsibilities: Perform Risk Assessments: Conduct in-depth cyber risk assessments for identified EOL systems and technologies, following the methodology and framework established by the project. Gather necessary information on assets (software, hardware, applications that are end-of-life or end-of-support) and assess the potential cyber threats, vulnerabilities, and business impacts associated with each5. Document findings meticulously, ensuring each risk item is well-described (likelihood, impact, severity) in the risk register. Required Skills & Competencies: Analytical Skills: Strong analytical and problem-solving skills are essential. The analyst must be able to assess complex IT systems and identify risk factors, interpret vulnerability data, and quantitatively rate risks. Attention to detail is critical for reviewing large lists of EOL assets and ensuring nothing is missed. Cybersecurity Knowledge: Good understanding of foundational cybersecurity principles (confidentiality, integrity, availability) and how outdated technologies can pose threats. Familiarity with common vulnerabilities and exploits affecting older systems (legacy OS, unsupported software) is beneficial. Knowledge of cyber risk frameworks and standards (such as NIST, ISO27001) and basic concepts of risk assessment is expectedxxiv. Qualifications & Certifications: Education: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Equivalent experience in cyber risk or IT security roles can be considered in lieu of a formal degree. Certifications: Relevant industry certifications are not mandatory but highly valued. Certifications demonstrating knowledge of security and risk principles (e.g., CompTIA Security+, Certified Ethical Hacker (CEH), or GIAC/GSEC) would be a plus. Certifications specifically in risk management or governance (such as CRISC, Certified Information Systems Auditor (CISA), or ISO 27001 Lead Auditor/Implementer) are also advantageous for this role, as they indicate a grasp of risk and control assessment practices. Experience: Years of Experience: Approximately 3-5+ years of experience in cybersecurity or IT risk roles. This could include experience as a Cyber Risk Analyst, IT Risk Analyst, Security Analyst, Vulnerability Management Specialist, or GRC (Governance, Risk & Compliance) Analyst. Candidates with slightly more or less experience will be considered based on skill fit, but a baseline understanding from a few years in the field is expected. Risk Assessment Background: Hands-on experience conducting risk assessments or security assessments is required. For example, experience in identifying and assessing risks for IT systems, writing risk or control reports, or supporting risk treatment projects. Familiarity with creating or maintaining risk registers and tracking mitigation actions is important (e.g., experience ensuring "risks and remediation plans are regularly addressed" in previous rolesxxvii). Industry-Specific Experience (Desirable): Experience in the financial services sector or other highly-regulated industries is a plus.
About the opportunity Send your CV to us, complete the fully-funded course and get a certified qualification. Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 2) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 16/02 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you ll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees complete the training, gain essential cyber security skills, and secure your guaranteed interview. IT Support: Manage helpdesk tickets, resolve technical issues, and configure operating systems. Network & Cloud: Configure network devices and explore cloud computing models like IaaS and SaaS. Digital Security: Learn to protect data using risk management, SIEM tools, and vulnerability assessments. Data Management: Source, cleanse, and analyse data to present actionable insights. Digital Transformation: Explore Agile project management and how to support digital change. Sector Skills: Understand IT policies, legislation, and industry structure. Career Pathway Successful participants are guaranteed an interview with our network of partners. Potential Roles: IT Support Technician Cloud Support Assistant Junior Network Engineer Service Desk Analyst Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester (GMCA region). Be aged 19 or over. Have lived in the UK/EU for a minimum of 3 years. Earn below the gross annual wage cap. Prerequisites: Basic IT skills are required. Cost This is a fully-funded course with no fees complete the training, build your portfolio, and secure your guaranteed interview. provided you meet the learner obligations outlined in our employablility terms and conditions, which can be found on our website.
12/03/2026
Full time
About the opportunity Send your CV to us, complete the fully-funded course and get a certified qualification. Are you ready to launch a career in cyber security? Netcom Training s fully-funded Cyber Security course (NCFE Certificate in Cyber Security Practices, Level 2) equips you with the practical skills employers in Greater Manchester are actively seeking. From threat intelligence and security testing to incident response and ethical compliance, you ll gain hands-on experience that prepares you for today s fast-growing cyber security and IT roles. Our learners have gone on to roles such as Cyber Security Analyst, Junior Penetration Tester, SOC Analyst, and IT Support, working with companies across tech, logistics, public services, and digital sectors. Complete the course and gain a guaranteed interview with a leading employer, helping you start your career protecting businesses, data, and digital systems. Course Details Start Date: 16/02 Duration: 14 weeks Format: Online, practical workshops Schedule: Mon-Thurs 6-9PM What you ll learn Cyber Principles: Understand core frameworks and security principles. Threat Intelligence: Develop expertise to identify risks and analyze threats. Vulnerability Testing: Conduct cyber security testing, identify vulnerabilities, and implement controls. Incident Response: Prepare for and respond to live cyber security incidents. Ethics & Law: Understand legislation and ethical conduct within the cyber security sector. Professional Skills: Build the behaviours required for the modern cyber security workplace. Career Pathway Successful participants are guaranteed an interview with us or our network of UK-wide partners working with leading brands. Potential Roles: Trainee Cyber Security Analyst, SOC Analyst, Junior Information Security Officer Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester. Be aged 19 or over. Earn below the gross annual wage cap of £32,400. Not currently be undertaking other government-funded training. Right to Work: You must have lived in the UK/EU for the last 3 years and have the right to work in the UK (Student/Graduate visas are not eligible). Cost This is a fully-funded course with no fees complete the training, gain essential cyber security skills, and secure your guaranteed interview. IT Support: Manage helpdesk tickets, resolve technical issues, and configure operating systems. Network & Cloud: Configure network devices and explore cloud computing models like IaaS and SaaS. Digital Security: Learn to protect data using risk management, SIEM tools, and vulnerability assessments. Data Management: Source, cleanse, and analyse data to present actionable insights. Digital Transformation: Explore Agile project management and how to support digital change. Sector Skills: Understand IT policies, legislation, and industry structure. Career Pathway Successful participants are guaranteed an interview with our network of partners. Potential Roles: IT Support Technician Cloud Support Assistant Junior Network Engineer Service Desk Analyst Eligibility This is a government-funded opportunity. To apply, you must: Live in Greater Manchester (GMCA region). Be aged 19 or over. Have lived in the UK/EU for a minimum of 3 years. Earn below the gross annual wage cap. Prerequisites: Basic IT skills are required. Cost This is a fully-funded course with no fees complete the training, build your portfolio, and secure your guaranteed interview. provided you meet the learner obligations outlined in our employablility terms and conditions, which can be found on our website.
SOC Lead/SOC Manager - London - £90,000 Nigel Frank is supporting a global technology organisation in their search for an Onsite SOC Lead/SOC Manager to join a major cybersecurity programme based in London. This is a highly visible role where you will act as the primary onsite representative for SOC operations, working closely with senior stakeholders while coordinating with offshore security analysts to ensure effective monitoring, threat detection, and incident response. The successful candidate will play a vital role in strengthening cybersecurity operations, improving detection capabilities, and ensuring operational excellence across the Security Operations Centre. Key Responsibilities Act as the primary onsite point of contact (SPOC) for all cybersecurity operational matters between the client and offshore SOC teams. Coordinate communication between stakeholders and the offshore SOC to ensure efficient handling of alerts, incidents, and operational requests. Oversee daily SOC operations, ensuring security monitoring, investigations, and response activities are delivered in line with agreed SLAs. Lead incident management for high-severity security events, coordinating across IT, infrastructure, and business teams. Guide and support SOC analysts across L1, L2, and L3 functions to ensure effective 24/7 security operations. Drive improvements across threat detection, incident response processes, and SOC operational maturity. Skills & Experience Extensive experience working in Security Operations Centres (SOC), including leadership or managerial responsibilities. Strong technical knowledge of SIEM platforms such as LogRhythm, Splunk, Microsoft Sentinel, or similar. Experience working with SOAR, EDR/XDR, and threat detection technologies. Strong understanding of incident response frameworks and cybersecurity best practices. Experience managing security incidents, investigations, and response coordination.
11/03/2026
Full time
SOC Lead/SOC Manager - London - £90,000 Nigel Frank is supporting a global technology organisation in their search for an Onsite SOC Lead/SOC Manager to join a major cybersecurity programme based in London. This is a highly visible role where you will act as the primary onsite representative for SOC operations, working closely with senior stakeholders while coordinating with offshore security analysts to ensure effective monitoring, threat detection, and incident response. The successful candidate will play a vital role in strengthening cybersecurity operations, improving detection capabilities, and ensuring operational excellence across the Security Operations Centre. Key Responsibilities Act as the primary onsite point of contact (SPOC) for all cybersecurity operational matters between the client and offshore SOC teams. Coordinate communication between stakeholders and the offshore SOC to ensure efficient handling of alerts, incidents, and operational requests. Oversee daily SOC operations, ensuring security monitoring, investigations, and response activities are delivered in line with agreed SLAs. Lead incident management for high-severity security events, coordinating across IT, infrastructure, and business teams. Guide and support SOC analysts across L1, L2, and L3 functions to ensure effective 24/7 security operations. Drive improvements across threat detection, incident response processes, and SOC operational maturity. Skills & Experience Extensive experience working in Security Operations Centres (SOC), including leadership or managerial responsibilities. Strong technical knowledge of SIEM platforms such as LogRhythm, Splunk, Microsoft Sentinel, or similar. Experience working with SOAR, EDR/XDR, and threat detection technologies. Strong understanding of incident response frameworks and cybersecurity best practices. Experience managing security incidents, investigations, and response coordination.
Sponsorship is not available for this position.Applicants must be UK Nationals or hold Settled Status and be fully eligible to obtain SC clearance. You must hold a clean current driving licence as some travel may be required. Information Security Analyst Type: Permanent Location: Hybrid (West Midlands) 3 Days on Site. Overview We are looking for a detail-oriented and proactive Information Security Compliance Analyst to join our team on a permanent basis. This role is pivotal in supporting the development and continuous improvement of our global information security compliance program. You will be responsible for ensuring that all corporate and subsidiary operations comply with internal security policies, regulatory requirements, and internationally recognised frameworks such as ISO27001, NIST, SOX, GDPR, CMMC, and others. Key Responsibilities - Support the execution and enhancement of the global information security compliance program. - Conduct internal audits, third-party risk assessments, and due diligence reviews. - Ensure alignment with regulatory and industry standards including ISO27001, NIST, SOX, GDPR, SOC 2, HIPAA, CCPA, LGPD. - Collaborate with cross-functional teams across multiple jurisdictions to drive compliance initiatives. - Identify gaps in security controls and recommend corrective actions. - Maintain and update security policies, procedures, and documentation. - Monitor changes in global regulations and assess their impact on business operations. Experience & Skills Required - Proven experience in information security compliance, risk management, and audit. - Strong understanding of international regulatory frameworks and standards. - Hands-on experience with: - ISO27001 audits and implementation - GDPR compliance - NIST cybersecurity framework - SOX, SOC 2, HIPAA, CCPA, LGPD - Ability to interpret complex regulatory requirements and translate them into actionable controls. - Excellent communication and stakeholder engagement skills. - Strong analytical and problem-solving capabilities. What We Offer - Competitive salary and benefits package - Flexible hybrid working model - Opportunities for professional development and certification - Collaborative and inclusive work environment Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
10/03/2026
Full time
Sponsorship is not available for this position.Applicants must be UK Nationals or hold Settled Status and be fully eligible to obtain SC clearance. You must hold a clean current driving licence as some travel may be required. Information Security Analyst Type: Permanent Location: Hybrid (West Midlands) 3 Days on Site. Overview We are looking for a detail-oriented and proactive Information Security Compliance Analyst to join our team on a permanent basis. This role is pivotal in supporting the development and continuous improvement of our global information security compliance program. You will be responsible for ensuring that all corporate and subsidiary operations comply with internal security policies, regulatory requirements, and internationally recognised frameworks such as ISO27001, NIST, SOX, GDPR, CMMC, and others. Key Responsibilities - Support the execution and enhancement of the global information security compliance program. - Conduct internal audits, third-party risk assessments, and due diligence reviews. - Ensure alignment with regulatory and industry standards including ISO27001, NIST, SOX, GDPR, SOC 2, HIPAA, CCPA, LGPD. - Collaborate with cross-functional teams across multiple jurisdictions to drive compliance initiatives. - Identify gaps in security controls and recommend corrective actions. - Maintain and update security policies, procedures, and documentation. - Monitor changes in global regulations and assess their impact on business operations. Experience & Skills Required - Proven experience in information security compliance, risk management, and audit. - Strong understanding of international regulatory frameworks and standards. - Hands-on experience with: - ISO27001 audits and implementation - GDPR compliance - NIST cybersecurity framework - SOX, SOC 2, HIPAA, CCPA, LGPD - Ability to interpret complex regulatory requirements and translate them into actionable controls. - Excellent communication and stakeholder engagement skills. - Strong analytical and problem-solving capabilities. What We Offer - Competitive salary and benefits package - Flexible hybrid working model - Opportunities for professional development and certification - Collaborative and inclusive work environment Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
05/03/2026
Full time
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
Senior Security & Technology Consultants Location: Warton, UK (On-Site - 5 Days per Week) Clearance Required: Valid MOD DV (Mandatory) Engagement Type: Contract (Inside IR35) Day Rate: 500 - 900 per day (dependent on role and experience) Overview We are seeking experienced Security & Technology Professionals to support critical programmes in a secure defence environment. These roles span architecture, assurance, operations, and technical delivery disciplines and require individuals who can operate effectively within highly regulated, mission-critical settings. All positions are based full-time on-site in Warton (5 days per week) and require candidates to hold a current and valid MOD DV clearance at the time of application. Scope of Opportunities We are hiring across multiple security and technology disciplines, including: Security Architects Security Assurers Information Security Consultants SOC Analysts OT Architects Cross Domain SMEs IT Administrators Service Managers Product Security Managers Penetration Testing Specialists Technical Project / Programme Managers Key Responsibilities (Role Dependent) Security Architecture & Design Define and review secure architectures across enterprise IT and OT environments. Act as technical authority for secure system design and implementation. Lead threat modelling, risk assessments, and security design reviews. Ensure compliance with defence security standards and secure-by-design principles. Security Assurance & Governance Deliver independent security assurance across programmes. Support accreditation activities and compliance reviews. Develop and maintain security documentation, standards, and risk registers. Security Operations & SOC Monitor, analyse, and respond to security events and incidents. Strengthen detection, response, and resilience capabilities. Support vulnerability management and remediation activities. OT & Cross Domain Security Provide expertise in Operational Technology environments. Design and assure secure cross-domain solutions and data transfer mechanisms. Evaluate network segregation and high-assurance controls. Penetration Testing & Vulnerability Management Conduct or oversee penetration testing engagements. Assess vulnerabilities and validate remediation strategies. Support red/blue team activities where required. Service & Product Security Embed security into live service management processes. Act as Product Security lead across development lifecycles. Integrate DevSecOps controls and secure SDLC practices. Technical Delivery & Programme Support Manage security-focused technical workstreams. Provide governance reporting to senior stakeholders. Translate technical risks into business impact and mitigation plans. Essential Requirements Valid and transferable MOD DV clearance (mandatory). Availability to work on-site in Warton, 5 days per week. Strong background in one or more of the listed security disciplines. Experience working in secure, defence, or highly regulated environments. Relevant certifications (e.g., CISSP, CISM, TOGAF, CREST, cloud certifications).
05/03/2026
Contractor
Senior Security & Technology Consultants Location: Warton, UK (On-Site - 5 Days per Week) Clearance Required: Valid MOD DV (Mandatory) Engagement Type: Contract (Inside IR35) Day Rate: 500 - 900 per day (dependent on role and experience) Overview We are seeking experienced Security & Technology Professionals to support critical programmes in a secure defence environment. These roles span architecture, assurance, operations, and technical delivery disciplines and require individuals who can operate effectively within highly regulated, mission-critical settings. All positions are based full-time on-site in Warton (5 days per week) and require candidates to hold a current and valid MOD DV clearance at the time of application. Scope of Opportunities We are hiring across multiple security and technology disciplines, including: Security Architects Security Assurers Information Security Consultants SOC Analysts OT Architects Cross Domain SMEs IT Administrators Service Managers Product Security Managers Penetration Testing Specialists Technical Project / Programme Managers Key Responsibilities (Role Dependent) Security Architecture & Design Define and review secure architectures across enterprise IT and OT environments. Act as technical authority for secure system design and implementation. Lead threat modelling, risk assessments, and security design reviews. Ensure compliance with defence security standards and secure-by-design principles. Security Assurance & Governance Deliver independent security assurance across programmes. Support accreditation activities and compliance reviews. Develop and maintain security documentation, standards, and risk registers. Security Operations & SOC Monitor, analyse, and respond to security events and incidents. Strengthen detection, response, and resilience capabilities. Support vulnerability management and remediation activities. OT & Cross Domain Security Provide expertise in Operational Technology environments. Design and assure secure cross-domain solutions and data transfer mechanisms. Evaluate network segregation and high-assurance controls. Penetration Testing & Vulnerability Management Conduct or oversee penetration testing engagements. Assess vulnerabilities and validate remediation strategies. Support red/blue team activities where required. Service & Product Security Embed security into live service management processes. Act as Product Security lead across development lifecycles. Integrate DevSecOps controls and secure SDLC practices. Technical Delivery & Programme Support Manage security-focused technical workstreams. Provide governance reporting to senior stakeholders. Translate technical risks into business impact and mitigation plans. Essential Requirements Valid and transferable MOD DV clearance (mandatory). Availability to work on-site in Warton, 5 days per week. Strong background in one or more of the listed security disciplines. Experience working in secure, defence, or highly regulated environments. Relevant certifications (e.g., CISSP, CISM, TOGAF, CREST, cloud certifications).
Cyber Security Manager Permanent Tameside, Greater Manchester (Hybrid) Salary: £56,000 per annum + car allowance A leading housing association is seeking an experienced Cyber Security Manager to lead their network and security functions. This is a fantastic opportunity to shape cybersecurity strategy and governance in a purpose-driven organisation that manages over 37,000 homes and prioritises resident wellbeing, community sustainability, and innovation. About the role Reporting to the Assistant Director of Technology Services, you will provide tactical and operational leadership to a small, capable team (including Senior/Junior Security Analysts, Senior Security Engineer, and network engineers). The focus is approximately 80% cyber security and 20% network-related responsibilities. You will take a proactive, strategic approach to safeguarding information assets, managing cyber risks, leading incident response, and driving continual improvement in our security and network posture. Key responsibilities include: Developing and maintaining security strategies, policies, standards, and procedures in alignment with frameworks such as ISO27001 , NIST CSF , CIS Controls , and Cyber Essentials Plus . Providing senior leadership with insightful reports, dashboards, and actionable recommendations on security posture, risks, and incidents. Leading cyber risk assessments, third-party risk management, vulnerability remediation, patch management (soon transitioning to a third-party provider-opportunity to put your stamp on processes), and supplier compliance. Overseeing incident management, coordinating audits, penetration testing (third-party delivered, but you will shape scoping and remediation), and contributing to disaster recovery/business continuity. Mentoring and developing the team to high performance, aligned with SFIA framework. Building strong relationships with stakeholders, executive leaders, SOC partners, vendors, and auditors. Championing security awareness across the organisation. This is a leadership role where you can influence IT strategy, investment decisions, and compliance maturity. We are looking for someone ready to take ownership. About you We are particularly interested in candidates with proven managerial experience in cybersecurity (line managing teams, even small ones), strong compliance and governance expertise, and the ability to operate strategically. Essential : 5+ years hands-on technical experience in network/security, plus 2+ years in a senior/lead cybersecurity role. Leadership of teams and delivery of security strategies/policies. Deep knowledge of key frameworks (ISO27001, NIST CSF, CIS Controls, Cyber Essentials Plus). Experience in risk management, incident response, vulnerability management/remediation, third-party security, and stakeholder engagement. Relevant certifications (e.g., CISSP, CISM, CCNP Security, CEH, ISO27001 Lead Implementer/Auditor-or equivalent experience). Degree in Cyber Security, IT, Computer Science (or equivalent experience). Desirable : Background in housing, public sector, or regulated environments. Hands-on experience with firewalls, hybrid infrastructure security, SOC collaboration, and pen testing oversight. Experience and leadership ability outweigh formal qualifications-we value a strategic mindset and the drive to build robust governance. Benefits: Excellent work-life balance: 24 days annual leave + 3 days Christmas closure + bank holidays (rising with service). Flexible working: Compressed hours/4-day week possible, hybrid (50% home working after probation). Strong benefits: Competitive pension (Social Housing Pension Scheme), occupational sick pay, BHSF health membership, enhanced parental leave, training/development opportunities, on-site gyms. Progression: Clear opportunities for advancement (including into higher management over 5-10 years) in a pro-promotion culture. Purpose: Contribute to a respected organisation tackling housing challenges, building sustainable communities, and innovating digitally. If you're a hands-on leader with a track record in cybersecurity governance, compliance, and team management, and you're ready to lead in a supportive, outcome-focused environment, we'd love to hear from you.
04/03/2026
Full time
Cyber Security Manager Permanent Tameside, Greater Manchester (Hybrid) Salary: £56,000 per annum + car allowance A leading housing association is seeking an experienced Cyber Security Manager to lead their network and security functions. This is a fantastic opportunity to shape cybersecurity strategy and governance in a purpose-driven organisation that manages over 37,000 homes and prioritises resident wellbeing, community sustainability, and innovation. About the role Reporting to the Assistant Director of Technology Services, you will provide tactical and operational leadership to a small, capable team (including Senior/Junior Security Analysts, Senior Security Engineer, and network engineers). The focus is approximately 80% cyber security and 20% network-related responsibilities. You will take a proactive, strategic approach to safeguarding information assets, managing cyber risks, leading incident response, and driving continual improvement in our security and network posture. Key responsibilities include: Developing and maintaining security strategies, policies, standards, and procedures in alignment with frameworks such as ISO27001 , NIST CSF , CIS Controls , and Cyber Essentials Plus . Providing senior leadership with insightful reports, dashboards, and actionable recommendations on security posture, risks, and incidents. Leading cyber risk assessments, third-party risk management, vulnerability remediation, patch management (soon transitioning to a third-party provider-opportunity to put your stamp on processes), and supplier compliance. Overseeing incident management, coordinating audits, penetration testing (third-party delivered, but you will shape scoping and remediation), and contributing to disaster recovery/business continuity. Mentoring and developing the team to high performance, aligned with SFIA framework. Building strong relationships with stakeholders, executive leaders, SOC partners, vendors, and auditors. Championing security awareness across the organisation. This is a leadership role where you can influence IT strategy, investment decisions, and compliance maturity. We are looking for someone ready to take ownership. About you We are particularly interested in candidates with proven managerial experience in cybersecurity (line managing teams, even small ones), strong compliance and governance expertise, and the ability to operate strategically. Essential : 5+ years hands-on technical experience in network/security, plus 2+ years in a senior/lead cybersecurity role. Leadership of teams and delivery of security strategies/policies. Deep knowledge of key frameworks (ISO27001, NIST CSF, CIS Controls, Cyber Essentials Plus). Experience in risk management, incident response, vulnerability management/remediation, third-party security, and stakeholder engagement. Relevant certifications (e.g., CISSP, CISM, CCNP Security, CEH, ISO27001 Lead Implementer/Auditor-or equivalent experience). Degree in Cyber Security, IT, Computer Science (or equivalent experience). Desirable : Background in housing, public sector, or regulated environments. Hands-on experience with firewalls, hybrid infrastructure security, SOC collaboration, and pen testing oversight. Experience and leadership ability outweigh formal qualifications-we value a strategic mindset and the drive to build robust governance. Benefits: Excellent work-life balance: 24 days annual leave + 3 days Christmas closure + bank holidays (rising with service). Flexible working: Compressed hours/4-day week possible, hybrid (50% home working after probation). Strong benefits: Competitive pension (Social Housing Pension Scheme), occupational sick pay, BHSF health membership, enhanced parental leave, training/development opportunities, on-site gyms. Progression: Clear opportunities for advancement (including into higher management over 5-10 years) in a pro-promotion culture. Purpose: Contribute to a respected organisation tackling housing challenges, building sustainable communities, and innovating digitally. If you're a hands-on leader with a track record in cybersecurity governance, compliance, and team management, and you're ready to lead in a supportive, outcome-focused environment, we'd love to hear from you.
SOC Analyst Basingstoke (Hybrid) Full Time Up to £30,000 per annum + 5% pension contribution A Microsoft Solution Partner have an exciting opportunity to join their growing Managed Service team as a Security Operations Centre (SOC) Analyst. In this role, you will monitor security alerts, perform initial investigations, and escalate threats to senior analysts, helping to safeguard our clients digital environments. This is a unique opportunity to join a growing team at the forefront of ElysianIT s managed security services, contributing to a modern, agile, and customer-focused SOC offering. We are looking for a motivated and curious security professional who has taken their first steps into the world of cyber defence whether through experience in a Security Operations Centre or another hands-on security role and is ready to develop their skills further. The ideal candidate is someone with an inquisitive and analytical mindset, naturally driven to understand how systems, networks, and applications work. They should enjoy exploring customer environments, asking the right questions, and piecing together data points to understand what normal looks like so they can quickly identify when something isn t quite right. What s in it for you? Working Monday-Friday, UK Business Hours Hybrid working: 2 days in the office per week (Basingstoke area) Mentorship and structured development in a growing SOC Funded CPD and certification support (training budget available) Quarterly social events Key responsibilities Monitor security alerts and events from Microsoft Security Suite Perform initial triage and analysis of security incidents to determine severity and impact. Escalate verified incidents to the incident response teams. Ensure timely triage and remediation of any incidents Follow standard operating procedures (SOPs) for incident handling and escalation. Assist in improving standard operating procedures (SOPs) Assist in identifying tuning opportunities and reduction of false positives Communicate with customer stakeholders during incident investigation Maintain awareness of current threats and vulnerabilities relevant to customers. Required Skills Basic understanding of cybersecurity principles and threat landscapes Experience working with Microsoft Security tools (Sentinel, Defender XDR, Entra ID) Basics in KQL (Kusto query language) Strong analytical and problem-solving skills Excellent verbal and written communication skills Preferred Qualifications About 12 months of experience in a SOC or IT Support role Related certifications or actively working towards it (such as CompTIA Security+, CySA+, Microsoft SC-200) What can you expect in return? Up to £30,000 per annum, depending on experience 5% Company pension contribution Hybrid working with around 60% home-based and 40% in the Basingstoke office What s next? It s easy! Click APPLY now! We can t wait to hear from you! Your data will be handled in line with GDPR.
02/03/2026
Full time
SOC Analyst Basingstoke (Hybrid) Full Time Up to £30,000 per annum + 5% pension contribution A Microsoft Solution Partner have an exciting opportunity to join their growing Managed Service team as a Security Operations Centre (SOC) Analyst. In this role, you will monitor security alerts, perform initial investigations, and escalate threats to senior analysts, helping to safeguard our clients digital environments. This is a unique opportunity to join a growing team at the forefront of ElysianIT s managed security services, contributing to a modern, agile, and customer-focused SOC offering. We are looking for a motivated and curious security professional who has taken their first steps into the world of cyber defence whether through experience in a Security Operations Centre or another hands-on security role and is ready to develop their skills further. The ideal candidate is someone with an inquisitive and analytical mindset, naturally driven to understand how systems, networks, and applications work. They should enjoy exploring customer environments, asking the right questions, and piecing together data points to understand what normal looks like so they can quickly identify when something isn t quite right. What s in it for you? Working Monday-Friday, UK Business Hours Hybrid working: 2 days in the office per week (Basingstoke area) Mentorship and structured development in a growing SOC Funded CPD and certification support (training budget available) Quarterly social events Key responsibilities Monitor security alerts and events from Microsoft Security Suite Perform initial triage and analysis of security incidents to determine severity and impact. Escalate verified incidents to the incident response teams. Ensure timely triage and remediation of any incidents Follow standard operating procedures (SOPs) for incident handling and escalation. Assist in improving standard operating procedures (SOPs) Assist in identifying tuning opportunities and reduction of false positives Communicate with customer stakeholders during incident investigation Maintain awareness of current threats and vulnerabilities relevant to customers. Required Skills Basic understanding of cybersecurity principles and threat landscapes Experience working with Microsoft Security tools (Sentinel, Defender XDR, Entra ID) Basics in KQL (Kusto query language) Strong analytical and problem-solving skills Excellent verbal and written communication skills Preferred Qualifications About 12 months of experience in a SOC or IT Support role Related certifications or actively working towards it (such as CompTIA Security+, CySA+, Microsoft SC-200) What can you expect in return? Up to £30,000 per annum, depending on experience 5% Company pension contribution Hybrid working with around 60% home-based and 40% in the Basingstoke office What s next? It s easy! Click APPLY now! We can t wait to hear from you! Your data will be handled in line with GDPR.
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: 45ph - 85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online only) Sat to Tue Off Wed to Sun - Nights (Apply online only) (The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates) 28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
24/02/2026
Contractor
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: 45ph - 85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online only) Sat to Tue Off Wed to Sun - Nights (Apply online only) (The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates) 28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
Introduction Saab UK is part of Scandinavia's largest defence company, bringing together the best of Swedish and British innovation. Saab offers world-leading solutions and services in defence, aviation, space, and civil security to keep people and society safe. Our UK presence has been growing at pace, meaning we can offer a wide range of opportunities for personal fulfilment and career growth. We currently employ over 600 people across eight sites in the UK, and our specialisations include software engineering, underwater robotics, radars, AI, and armed forces training. What you will be part of: Explore a wealth of possibilities. Take on challenges, create smart inventions, and grow beyond. This is a place for curious minds, brave pioneers, and everyone in between. Together, we achieve the extraordinary, each bringing our unique perspectives. Your part matters. Saab is a leading defence and security company with an enduring mission, to help nations keep their people and society safe. Empowered by its 26,000 talented people, Saab constantly pushes the boundaries of technology to create a safer and more sustainable world. Saab designs, manufactures and maintains advanced systems in aeronautics, weapons, command and control, sensors and underwater systems. Saab is headquartered in Sweden. It has major operations all over the world and is part of the domestic defence capability of several nations. The Role: This is an initial 6 month contract role within our UK IT Business Unit. The IT Solution Architect will be responsible for designing and implementing technology solutions that align with business objectives and technical requirements. This role bridges the gap between business needs and IT capabilities, ensuring that solutions are scalable, secure, and cost-effective. The Solution Architect works closely with stakeholders, developers, and project managers to deliver robust architectures that support organisational goals. Key Responsibilities: Solution Design & Architecture to a high standard. Develop high-level and detailed solution architectures for IT systems and applications. Ensure solutions comply with enterprise architecture standards, security policies, and regulatory requirements. Create architectural diagrams, models, and documentation for proposed solutions. Stakeholder Engagement Collaborate with business analysts, project managers, and technical teams to understand requirements. Present architectural solutions to stakeholders and obtain buy-in. Technology Evaluation Assess emerging technologies and recommend adoption where appropriate. Conduct feasibility studies and cost-benefit analyses for proposed solutions. Governance & Standards Define and enforce architectural principles, guidelines, and best practices. Ensure consistency and integration across systems and platforms. Implementation Support Provide technical leadership during solution implementation. Troubleshoot architectural issues and guide development teams. Perform Risk Management. Identify potential risks in solution design and propose mitigation strategies. Ensure compliance with data protection and cybersecurity standards. Qualifications and Skills: Bachelor's degree in Computer Science, Information Technology, or related field. 7+ years in IT roles, with at least 3 years in solution architecture. Experience in large-scale system design and implementation. Certifications (Preferred). TOGAF, AWS/Azure Solution Architect, ITIL. Knowledge of enterprise architecture frameworks (e.g., TOGAF, Zachman). Proficiency in cloud platforms (AWS, Azure, GCP) and hybrid architectures. Experience with APIs, microservices, and integration patterns. Understanding of networking, security, and infrastructure principles. Analytical & Problem-Solving. Ability to translate business requirements into technical solutions. Strong analytical skills for evaluating complex systems. Communication & Leadership. Excellent verbal and written communication skills. Ability to influence and negotiate with stakeholders at all levels. Self-motivated, resilient and able to work under pressure. Excellent communication and presentation skills. By submitting an application to Saab UK you consent to undertaking workforce screening activities that may include but are not limited to: Baseline Personnel Security checks, National Security Vetting, reference checks, verification of working rights and in all circumstances preferred candidates will be placed through a security interview.
23/02/2026
Contractor
Introduction Saab UK is part of Scandinavia's largest defence company, bringing together the best of Swedish and British innovation. Saab offers world-leading solutions and services in defence, aviation, space, and civil security to keep people and society safe. Our UK presence has been growing at pace, meaning we can offer a wide range of opportunities for personal fulfilment and career growth. We currently employ over 600 people across eight sites in the UK, and our specialisations include software engineering, underwater robotics, radars, AI, and armed forces training. What you will be part of: Explore a wealth of possibilities. Take on challenges, create smart inventions, and grow beyond. This is a place for curious minds, brave pioneers, and everyone in between. Together, we achieve the extraordinary, each bringing our unique perspectives. Your part matters. Saab is a leading defence and security company with an enduring mission, to help nations keep their people and society safe. Empowered by its 26,000 talented people, Saab constantly pushes the boundaries of technology to create a safer and more sustainable world. Saab designs, manufactures and maintains advanced systems in aeronautics, weapons, command and control, sensors and underwater systems. Saab is headquartered in Sweden. It has major operations all over the world and is part of the domestic defence capability of several nations. The Role: This is an initial 6 month contract role within our UK IT Business Unit. The IT Solution Architect will be responsible for designing and implementing technology solutions that align with business objectives and technical requirements. This role bridges the gap between business needs and IT capabilities, ensuring that solutions are scalable, secure, and cost-effective. The Solution Architect works closely with stakeholders, developers, and project managers to deliver robust architectures that support organisational goals. Key Responsibilities: Solution Design & Architecture to a high standard. Develop high-level and detailed solution architectures for IT systems and applications. Ensure solutions comply with enterprise architecture standards, security policies, and regulatory requirements. Create architectural diagrams, models, and documentation for proposed solutions. Stakeholder Engagement Collaborate with business analysts, project managers, and technical teams to understand requirements. Present architectural solutions to stakeholders and obtain buy-in. Technology Evaluation Assess emerging technologies and recommend adoption where appropriate. Conduct feasibility studies and cost-benefit analyses for proposed solutions. Governance & Standards Define and enforce architectural principles, guidelines, and best practices. Ensure consistency and integration across systems and platforms. Implementation Support Provide technical leadership during solution implementation. Troubleshoot architectural issues and guide development teams. Perform Risk Management. Identify potential risks in solution design and propose mitigation strategies. Ensure compliance with data protection and cybersecurity standards. Qualifications and Skills: Bachelor's degree in Computer Science, Information Technology, or related field. 7+ years in IT roles, with at least 3 years in solution architecture. Experience in large-scale system design and implementation. Certifications (Preferred). TOGAF, AWS/Azure Solution Architect, ITIL. Knowledge of enterprise architecture frameworks (e.g., TOGAF, Zachman). Proficiency in cloud platforms (AWS, Azure, GCP) and hybrid architectures. Experience with APIs, microservices, and integration patterns. Understanding of networking, security, and infrastructure principles. Analytical & Problem-Solving. Ability to translate business requirements into technical solutions. Strong analytical skills for evaluating complex systems. Communication & Leadership. Excellent verbal and written communication skills. Ability to influence and negotiate with stakeholders at all levels. Self-motivated, resilient and able to work under pressure. Excellent communication and presentation skills. By submitting an application to Saab UK you consent to undertaking workforce screening activities that may include but are not limited to: Baseline Personnel Security checks, National Security Vetting, reference checks, verification of working rights and in all circumstances preferred candidates will be placed through a security interview.
OT SOC Engineer Basingstoke 28k - 35k + Benefite Hybrid working x2 days in office / x3 days work from home I am recruiting in Basingstoke for an OT SOC Engineer to join the OT SOC team and will report directly into the OT Cybersecurity Services Lead. As an OT SOC Engineer the role will be focused on the day-to-day monitoring of the OT service platform(s) and any other required security applications. You will be the first line of support for clients who have existing support services. The standard working hours for this role are Monday to Friday, 9:00 AM to 5:30 PM. In addition, you will participate in an on-call rotation on a 1-in-4 basis. On-call duties fall outside your regular working hours and run from Monday at 9:00 AM through to the following Monday at 8:59 AM and uou will be paid extra for the on call duites of the OT SOC Engineer. OT SOC Engineer Responsibilities: Continuous / Proactive monitoring of OT security tools (e.g., Nozomi, Fortinet, TXOne) for alerts and anomalies. Acknowledge, analyse and validate alerts triggered from the OT security tools to reduce false positives and escalate genuine incidents. Proactively collaborate with internal engineers and customers to assess operational and BAU alerts, establishing baselines to minimise unnecessary noise within OT service security tools. Triage, investigate, and respond to security incidents, performing root cause analysis and taking steps to mitigate the threat. Take immediate action on potential and identified cyber security incidents in accordance with agreed SLA's and KPI's. Proactively research emerging threats and vulnerabilities to find and address potential weaknesses before they are exploited. Identify potential weaknesses in systems and networks and suggest or help implement preventative measures like firewalls or improved access controls. Escalate incidents to Level 2 OT SOC or OT Cybersecurity Engineers as per service documentation (i.e. Playbooks or Alert/Incident Management processes). Adhere to all internal service-related processes such as Alert & Incident Management processes. Assist with the creation of processes as and when required and to have these align with existing processes. Document incident reports including actions taken in SOC Ticketing systems. Analyse data from logs, network traffic, and forensics to create detailed reports on findings and lessons learned. To be utilised in daily / weekly SOC reports for OT Environments. Management and ownership or service-related documentation such as knowledge bases and playbooks. Provide training to additional or new members of the Business Unit as and when required. Assist with liaising with manufactures or tool set providers regarding product or toolset specific issues. Prepare, maintain, and adhere to procedures for logging, reporting, and statistically monitoring data as directed. Ensuring time is accurately logged against client work, for billing purposes. Identify new technology opportunities to enhance the product and service portfolio. Respond to emergency outages in accordance with business continuity and disaster recovery plans. Adopt a proactive approach towards all client activities. Collaborate with all the Technical Service departments when required to ensure business objectives are met. Support delivery of projects with chosen technologies as and when required. Own personal training plan that is put in place with line manager. Highlight areas for improvement to supervisor where applicable. Ensuring adherence to Management System Manual for Quality (ISO 9001), InfoSec (ISO 27001) and ESG (ISO 14001). Follow established OT security procedures aligned with IEC 62443, NIST CSF, and company policies. Translate complex technical threats into clear business risks for management and collaborate with GRC (Governance, Risk, and Compliance) teams. Work with other SOC analysts, technical teams, and stakeholders to coordinate responses and share information. Provide input on and help optimise security tools, such as EDR/XDR and SIEM platforms. Expectation to assist with other tasks requested by line manager. OT SOC Engineer Desired Skills/Qualifications/Experience The following list highlights the desired skills, qualifications and experience required for the role; however, it is not exhaustive: Degree in Cybersecurity or similar. Experience with Cyber Security Monitoring tools. Experience working in an IT Support or Security/SOC team. Experience working in an OT environment. Understanding or knowledge of devices specific to an OT environment. Understanding of OT specific legislations or regulations such as IEC62443. Basic understanding of: ICS/SCADA systems and OT network architecture. Common OT protocols (Modbus, DNP3, OPC). Experience/Understanding of SIEM/SOAR solutions and OT-specific monitoring platforms (e.g. Nozomi Vantage). Knowledge of network environments (routing/switching/VLANS/Security/Wireless/etc.). Knowledge of Firewalls (IDS/IPS/DPI/WAF/Web Filter/App Control). Knowledge of security concepts (CIA/MITRE ATT&CK Framework/Vulnerabilities). Knowledge of cybersecurity fundamentals (CIA triad, threat vectors). Knowledge of ITIL disciplines such as Incident, Problem and Change Management. CompTIA Security+ / CySA+ or similar. Vendor Certifications - Cisco, Nozomi, Fortinet. Knowledge of scripting - Python, Powershell, Perl desirable. Drive to work off own initiative. Ability to work in a fast paced, changing environment. Understanding of ticket management systems and SLAs. Strong analytical and problem-solving skills. Ability to follow structured service-related documents such as Alert & Incident response playbooks. OT SOC Engineer Personal attributes: The following list highlights the personal attributes required for the role; however, it is not exhaustive: Must be self-motivated with a positive can-do attitude. Must be able to work un-supervised, on own initiative as well as within a team. Must be a logical thinker. Must remain calm under pressure. Be confident in both spoken and written communications. An excellent problem solver with strong analytical skills. Must stay up to date with the latest security trends, threats, and technologies and to report and communicate these to the technical teams. Can meet deadlines and maintain high standards even when under pressure. Must have understanding and appreciation to rigid process adherence. Must be willing to take on the unknown with the desire to learn. Must hold full driving licence valid in UK. Ability to work as part of a team but virtually at times due to remote and solo working. Must attend the office workplace as and when requested. OT SOC Engineer Benefits: Pension, Medical Insurance, Financial Planning Support, Death in Service, Medicash Healthcare Cash Plan, Permanent Total Disability Insurance, Enhanced Maternity/Paternity/Adoption Pay, Company Sick Pay, Hybrid Working, Investment in personal and professional training, Professional Memberships, Health checks, Wellbeing training and support, Employee Assistance Program, Flu jabs, Eyecare and of course paid holiday. Services advertised by Gold Group are those of an Agency and/or an Employment Business. We will contact you within the next 14 days if you are selected for interview. For a copy of our privacy policy please visit our website.
16/02/2026
Full time
OT SOC Engineer Basingstoke 28k - 35k + Benefite Hybrid working x2 days in office / x3 days work from home I am recruiting in Basingstoke for an OT SOC Engineer to join the OT SOC team and will report directly into the OT Cybersecurity Services Lead. As an OT SOC Engineer the role will be focused on the day-to-day monitoring of the OT service platform(s) and any other required security applications. You will be the first line of support for clients who have existing support services. The standard working hours for this role are Monday to Friday, 9:00 AM to 5:30 PM. In addition, you will participate in an on-call rotation on a 1-in-4 basis. On-call duties fall outside your regular working hours and run from Monday at 9:00 AM through to the following Monday at 8:59 AM and uou will be paid extra for the on call duites of the OT SOC Engineer. OT SOC Engineer Responsibilities: Continuous / Proactive monitoring of OT security tools (e.g., Nozomi, Fortinet, TXOne) for alerts and anomalies. Acknowledge, analyse and validate alerts triggered from the OT security tools to reduce false positives and escalate genuine incidents. Proactively collaborate with internal engineers and customers to assess operational and BAU alerts, establishing baselines to minimise unnecessary noise within OT service security tools. Triage, investigate, and respond to security incidents, performing root cause analysis and taking steps to mitigate the threat. Take immediate action on potential and identified cyber security incidents in accordance with agreed SLA's and KPI's. Proactively research emerging threats and vulnerabilities to find and address potential weaknesses before they are exploited. Identify potential weaknesses in systems and networks and suggest or help implement preventative measures like firewalls or improved access controls. Escalate incidents to Level 2 OT SOC or OT Cybersecurity Engineers as per service documentation (i.e. Playbooks or Alert/Incident Management processes). Adhere to all internal service-related processes such as Alert & Incident Management processes. Assist with the creation of processes as and when required and to have these align with existing processes. Document incident reports including actions taken in SOC Ticketing systems. Analyse data from logs, network traffic, and forensics to create detailed reports on findings and lessons learned. To be utilised in daily / weekly SOC reports for OT Environments. Management and ownership or service-related documentation such as knowledge bases and playbooks. Provide training to additional or new members of the Business Unit as and when required. Assist with liaising with manufactures or tool set providers regarding product or toolset specific issues. Prepare, maintain, and adhere to procedures for logging, reporting, and statistically monitoring data as directed. Ensuring time is accurately logged against client work, for billing purposes. Identify new technology opportunities to enhance the product and service portfolio. Respond to emergency outages in accordance with business continuity and disaster recovery plans. Adopt a proactive approach towards all client activities. Collaborate with all the Technical Service departments when required to ensure business objectives are met. Support delivery of projects with chosen technologies as and when required. Own personal training plan that is put in place with line manager. Highlight areas for improvement to supervisor where applicable. Ensuring adherence to Management System Manual for Quality (ISO 9001), InfoSec (ISO 27001) and ESG (ISO 14001). Follow established OT security procedures aligned with IEC 62443, NIST CSF, and company policies. Translate complex technical threats into clear business risks for management and collaborate with GRC (Governance, Risk, and Compliance) teams. Work with other SOC analysts, technical teams, and stakeholders to coordinate responses and share information. Provide input on and help optimise security tools, such as EDR/XDR and SIEM platforms. Expectation to assist with other tasks requested by line manager. OT SOC Engineer Desired Skills/Qualifications/Experience The following list highlights the desired skills, qualifications and experience required for the role; however, it is not exhaustive: Degree in Cybersecurity or similar. Experience with Cyber Security Monitoring tools. Experience working in an IT Support or Security/SOC team. Experience working in an OT environment. Understanding or knowledge of devices specific to an OT environment. Understanding of OT specific legislations or regulations such as IEC62443. Basic understanding of: ICS/SCADA systems and OT network architecture. Common OT protocols (Modbus, DNP3, OPC). Experience/Understanding of SIEM/SOAR solutions and OT-specific monitoring platforms (e.g. Nozomi Vantage). Knowledge of network environments (routing/switching/VLANS/Security/Wireless/etc.). Knowledge of Firewalls (IDS/IPS/DPI/WAF/Web Filter/App Control). Knowledge of security concepts (CIA/MITRE ATT&CK Framework/Vulnerabilities). Knowledge of cybersecurity fundamentals (CIA triad, threat vectors). Knowledge of ITIL disciplines such as Incident, Problem and Change Management. CompTIA Security+ / CySA+ or similar. Vendor Certifications - Cisco, Nozomi, Fortinet. Knowledge of scripting - Python, Powershell, Perl desirable. Drive to work off own initiative. Ability to work in a fast paced, changing environment. Understanding of ticket management systems and SLAs. Strong analytical and problem-solving skills. Ability to follow structured service-related documents such as Alert & Incident response playbooks. OT SOC Engineer Personal attributes: The following list highlights the personal attributes required for the role; however, it is not exhaustive: Must be self-motivated with a positive can-do attitude. Must be able to work un-supervised, on own initiative as well as within a team. Must be a logical thinker. Must remain calm under pressure. Be confident in both spoken and written communications. An excellent problem solver with strong analytical skills. Must stay up to date with the latest security trends, threats, and technologies and to report and communicate these to the technical teams. Can meet deadlines and maintain high standards even when under pressure. Must have understanding and appreciation to rigid process adherence. Must be willing to take on the unknown with the desire to learn. Must hold full driving licence valid in UK. Ability to work as part of a team but virtually at times due to remote and solo working. Must attend the office workplace as and when requested. OT SOC Engineer Benefits: Pension, Medical Insurance, Financial Planning Support, Death in Service, Medicash Healthcare Cash Plan, Permanent Total Disability Insurance, Enhanced Maternity/Paternity/Adoption Pay, Company Sick Pay, Hybrid Working, Investment in personal and professional training, Professional Memberships, Health checks, Wellbeing training and support, Employee Assistance Program, Flu jabs, Eyecare and of course paid holiday. Services advertised by Gold Group are those of an Agency and/or an Employment Business. We will contact you within the next 14 days if you are selected for interview. For a copy of our privacy policy please visit our website.
Position: SOC Analyst Location: Cheltenham (Hybrid - 3 days a week) Contract Type: 3 months Hours: 40 per week Start Date: 16/10/2025 Holiday Entitlement: 33 days Pay Rate: £380 PAYE/£504 Umbrella PD About the Team: You will have the opportunity to leverage the latest technologies and develop your skills in an innovative, collaborative environment that supports career growth and learning. What You Will Do: As a SOC Analyst, you will play a key role in monitoring and responding to security alerts, assisting with incident investigations, and supporting clients to strengthen their security posture. Key responsibilities include: Working a combination of day and night shifts. Responding to security alerts and incidents. Collaborating closely with client analysts. Conducting detailed analysis of monitoring system data. Escalating incidents when necessary and serving as a point of contact. Planning and conducting threat hunting under supervision. Reviewing alerts for tuning opportunities. Performing proactive threat research. Supporting the creation and implementation of new detection signatures. Assisting in client engagements and service meetings. Contributing to the development of SOC playbooks. Required Skills and Experience: Strong understanding of computer networks, operating systems, software, hardware, and security principles. Knowledge of cyber security risks and mitigation strategies. Working familiarity with security technologies such as Firewalls, host intrusion prevention, and antivirus solutions. Relevant academic or industry-specific training. Preferred Attributes: Ability to identify more efficient ways of working. Maintain focus, energy, and effort under pressure. Proven creativity and innovation in problem-solving. Commitment to learning new skills, applications, and technologies. If you are interested, please apply directly. Randstad Technologies is acting as an Employment Business in relation to this vacancy.
06/10/2025
Contractor
Position: SOC Analyst Location: Cheltenham (Hybrid - 3 days a week) Contract Type: 3 months Hours: 40 per week Start Date: 16/10/2025 Holiday Entitlement: 33 days Pay Rate: £380 PAYE/£504 Umbrella PD About the Team: You will have the opportunity to leverage the latest technologies and develop your skills in an innovative, collaborative environment that supports career growth and learning. What You Will Do: As a SOC Analyst, you will play a key role in monitoring and responding to security alerts, assisting with incident investigations, and supporting clients to strengthen their security posture. Key responsibilities include: Working a combination of day and night shifts. Responding to security alerts and incidents. Collaborating closely with client analysts. Conducting detailed analysis of monitoring system data. Escalating incidents when necessary and serving as a point of contact. Planning and conducting threat hunting under supervision. Reviewing alerts for tuning opportunities. Performing proactive threat research. Supporting the creation and implementation of new detection signatures. Assisting in client engagements and service meetings. Contributing to the development of SOC playbooks. Required Skills and Experience: Strong understanding of computer networks, operating systems, software, hardware, and security principles. Knowledge of cyber security risks and mitigation strategies. Working familiarity with security technologies such as Firewalls, host intrusion prevention, and antivirus solutions. Relevant academic or industry-specific training. Preferred Attributes: Ability to identify more efficient ways of working. Maintain focus, energy, and effort under pressure. Proven creativity and innovation in problem-solving. Commitment to learning new skills, applications, and technologies. If you are interested, please apply directly. Randstad Technologies is acting as an Employment Business in relation to this vacancy.
We are currently recruiting for Senior Cyber Security Analysts and Associate Security Analysts - both working a 3-month contract for our client 3 days per week on-site in London. As a senior security analyst with responsibility for incident response, you will: lead the investigation of security alerts to understand the nature and extent of possible cyber incidents lead the forensic analysis of systems, files, network traffic and cloud environments lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions support the wider coordination of cyber incidents review previous incidents to identify lessons and actions identify and deliver opportunities for continual improvement of the incident response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities develop and update internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, security analysts be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: significant experience investigating and responding to cyber incidents significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents experience managing and coordinating the response to cyber incidents experience coaching and mentoring junior staff an in-depth understanding of the tools, techniques and procedures used by threat actors excellent analytical and problem solving skills excellent verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS As an associate security analyst you will: triage and investigate cyber security alerts and reports from users use a variety of techniques to analyse systems, files, network traffic and cloud environments and understand the nature and extent of possible cyber incidents support the technical response to cyber incidents by identifying and implementing (or supporting the implementation of) containment, eradication and recovery actions support the coordination of cyber incidents contribute to post-incident reviews to identify lessons and actions identify opportunities for, and support the delivery of, continual improvements to the incident investigation and response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities contribute to internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, apprentice security analysts be responsible for line management of apprentice security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join We're interested in people who have: experience investigating and responding to cyber incidents experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an equivalent SIEM tool is acceptable) an understanding of the tools, techniques and procedures commonly used by threat actors good analytical and problem-solving skills good verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS If you feel you have the skills and experience needed for this role; please do apply now.
06/10/2025
Contractor
We are currently recruiting for Senior Cyber Security Analysts and Associate Security Analysts - both working a 3-month contract for our client 3 days per week on-site in London. As a senior security analyst with responsibility for incident response, you will: lead the investigation of security alerts to understand the nature and extent of possible cyber incidents lead the forensic analysis of systems, files, network traffic and cloud environments lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions support the wider coordination of cyber incidents review previous incidents to identify lessons and actions identify and deliver opportunities for continual improvement of the incident response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities develop and update internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, security analysts be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. We're interested in people who have: significant experience investigating and responding to cyber incidents significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents experience managing and coordinating the response to cyber incidents experience coaching and mentoring junior staff an in-depth understanding of the tools, techniques and procedures used by threat actors excellent analytical and problem solving skills excellent verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS As an associate security analyst you will: triage and investigate cyber security alerts and reports from users use a variety of techniques to analyse systems, files, network traffic and cloud environments and understand the nature and extent of possible cyber incidents support the technical response to cyber incidents by identifying and implementing (or supporting the implementation of) containment, eradication and recovery actions support the coordination of cyber incidents contribute to post-incident reviews to identify lessons and actions identify opportunities for, and support the delivery of, continual improvements to the incident investigation and response capability work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities contribute to internal plans, playbooks and knowledge base articles act as an escalation point for, and provide coaching and mentoring to, apprentice security analysts be responsible for line management of apprentice security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join We're interested in people who have: experience investigating and responding to cyber incidents experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an equivalent SIEM tool is acceptable) an understanding of the tools, techniques and procedures commonly used by threat actors good analytical and problem-solving skills good verbal and written communication skills It's desirable, but not essential, that you have: experience with Splunk experience working in an Agile environment experience with cloud environments such as AWS If you feel you have the skills and experience needed for this role; please do apply now.
LA International Computer Consultants Ltd
Cheltenham, Gloucestershire
*12 hour shift patterns & inside IR35* As a SOC Analyst you will: * Work a combination of day and night shifts. * Respond to alerts. * Work closely with client organization analysts. * Perform detailed analysis of the data captured by monitoring systems. * Escalate incidents where necessary and act as a point of contact throughout * Under supervision, plan and conduct threat hunting across client environments. * Review and identify alerts for further tuning. * Conduct proactive threat research. * Support the recommendation and implementation of new detection signatures. * Support client engagements and/or service meetings. * Support the development of SOC playbooks. The following skills and experience are required for this role: * A good understanding of computer networks, operating systems, software, hardware and security. * An understanding of cyber security risks associated with various technologies and ways to manage them. * A good working knowledge of various security technologies such as network and application Firewalls, host intrusion prevention and antivirus. * Any relevant academic or industry specific training. Set yourself apart: * Ability to seek out new ways of working more efficiently. * Sustain a high level of focus, effort, and energy. * Proven history developing innovative & creative solutions. * Strives to learn new skills, applications, and technologies through focused effort. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
06/10/2025
Contractor
*12 hour shift patterns & inside IR35* As a SOC Analyst you will: * Work a combination of day and night shifts. * Respond to alerts. * Work closely with client organization analysts. * Perform detailed analysis of the data captured by monitoring systems. * Escalate incidents where necessary and act as a point of contact throughout * Under supervision, plan and conduct threat hunting across client environments. * Review and identify alerts for further tuning. * Conduct proactive threat research. * Support the recommendation and implementation of new detection signatures. * Support client engagements and/or service meetings. * Support the development of SOC playbooks. The following skills and experience are required for this role: * A good understanding of computer networks, operating systems, software, hardware and security. * An understanding of cyber security risks associated with various technologies and ways to manage them. * A good working knowledge of various security technologies such as network and application Firewalls, host intrusion prevention and antivirus. * Any relevant academic or industry specific training. Set yourself apart: * Ability to seek out new ways of working more efficiently. * Sustain a high level of focus, effort, and energy. * Proven history developing innovative & creative solutions. * Strives to learn new skills, applications, and technologies through focused effort. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Security Analyst/Detection Engineer Location: Corsham (Hybrid 2/3 days onsite)( 60% attendance in the office is required) Duration: 20/02/2026 Pay rate £537 GBP/day inside IR35 Candidate must hold an Active SC OR DV Clerance Role description: Good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge oenvironment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' Your role Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK If you are interested in this position and would like to learn more, please send through your CV and we will get in touch with you as soon as possible. Please note, candidates are often Shortlisted within 48 hours.
06/10/2025
Contractor
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Security Analyst/Detection Engineer Location: Corsham (Hybrid 2/3 days onsite)( 60% attendance in the office is required) Duration: 20/02/2026 Pay rate £537 GBP/day inside IR35 Candidate must hold an Active SC OR DV Clerance Role description: Good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge oenvironment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' Your role Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK If you are interested in this position and would like to learn more, please send through your CV and we will get in touch with you as soon as possible. Please note, candidates are often Shortlisted within 48 hours.
Security Analyst/Detection Engineer Whitehall Resources are looking for a Security Analyst/Detection Engineer. This role is hybrid working with 3 days per week onsite in Wiltshire and the remainder remote working, for an initial 3 month contract. *Must hold active SC clearance or DV clearance* *Inside IR35* Job Description: . Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. . Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. . Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. . Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Your skills and experience: . Experienced Tier 2 SOC analyst . Knowledge of Data networks . Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) All of our opportunities require that applicants are eligible to work in the specified country/location, unless otherwise stated in the job description. Whitehall Resources are an equal opportunities employer who value a diverse and inclusive working environment. All qualified applicants will receive consideration for employment without regard to race, religion, gender identity or expression, sexual orientation, national origin, pregnancy, disability, age, veteran status, or other characteristics.
06/10/2025
Contractor
Security Analyst/Detection Engineer Whitehall Resources are looking for a Security Analyst/Detection Engineer. This role is hybrid working with 3 days per week onsite in Wiltshire and the remainder remote working, for an initial 3 month contract. *Must hold active SC clearance or DV clearance* *Inside IR35* Job Description: . Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. . Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. . Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. . Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Your skills and experience: . Experienced Tier 2 SOC analyst . Knowledge of Data networks . Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) All of our opportunities require that applicants are eligible to work in the specified country/location, unless otherwise stated in the job description. Whitehall Resources are an equal opportunities employer who value a diverse and inclusive working environment. All qualified applicants will receive consideration for employment without regard to race, religion, gender identity or expression, sexual orientation, national origin, pregnancy, disability, age, veteran status, or other characteristics.
LA International Computer Consultants Ltd
Corsham, Wiltshire
*SC CLEARED* Security Analyst/Detection Engineer 4 Month contract initially Based: Remote/Corsham - Max 3 days p/w onsite Rate: £500 - £537 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We have a great opportunity for a Security Analyst/Detection Engineer to join the team for an initial 4 month contract. The ideal candidate will have good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge of defence environment and culture. You will have the ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC. Key Responsibilities: * Conduct reactive monitoring of the networks to deliver a layered, agile cyber defence capability across all security domains. * Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. * Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. * Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Key Skills & Experience: * Experienced Tier 2 SOC analyst * Knowledge of Data networks * Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications: * CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc. * Ideally have some experience with UK defence or military space. This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 10 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
06/10/2025
Contractor
*SC CLEARED* Security Analyst/Detection Engineer 4 Month contract initially Based: Remote/Corsham - Max 3 days p/w onsite Rate: £500 - £537 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We have a great opportunity for a Security Analyst/Detection Engineer to join the team for an initial 4 month contract. The ideal candidate will have good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge of defence environment and culture. You will have the ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC. Key Responsibilities: * Conduct reactive monitoring of the networks to deliver a layered, agile cyber defence capability across all security domains. * Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. * Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. * Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Key Skills & Experience: * Experienced Tier 2 SOC analyst * Knowledge of Data networks * Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications: * CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc. * Ideally have some experience with UK defence or military space. This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 10 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.