140 Soc Engineer jobs in the United Kingdom
Senior SOC Engineer
Posted today
Job Viewed
Job Description
Glasgow, Scotland - United Kingdom
Type:
Permanent
Senior SOC EngineernA leading organisation is seeking a Senior SOC Engineer to strengthen its security operations capability and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook deve.
Senior SOC Engineer
Posted 2 days ago
Job Viewed
Job Description
Glasgow, Scotland - United Kingdom
Type:
Permanent
Senior SOC EngineernA leading organisation is seeking a Senior SOC Engineer to strengthen its security operations capability and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook development, analytical rule creation, and threat modelling. The Senior SOC Engineer will play a key role in building and optimising detection and response strategies, ensuring robust protection against evolving threats.
Key ResponsibilitiesnSIEM Engineering & Management
Deploy, configure, and maintain the QRadar SIEM platform.nOnboard and normalise log sources across on-premises and cloud environments.nDevelop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis.nPlaybook Development & Automation
Design and implement incident response playbooks for scenarios such as phishing, lateral movement, and data exfiltration.nIntegrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to streamline triage and automate response.nRefine playbooks based on threat intelligence and incident insights.nThreat Detection & Response
Monitor and analyse security alerts and events to identify potential threats.nConduct investigations and coordinate incident response activities.nCollaborate with threat intelligence teams to enhance detection logic.nThreat Modelling & Use Case Development
Lead threat modelling exercises using frameworks such as MITRE ATT&CK, STRIDE, and Cyber Kill Chain.nTranslate threat models into actionable detection use cases and SIEM rules.nPrioritise detection engineering based on business risk and impact.nReporting & Collaboration
Produce reports and dashboards to communicate security posture and incident trends.nPartner with IT, DevOps, and compliance teams to enforce secure configurations.nProvide mentorship to junior analysts and engineers.nMaintain documentation of security procedures, incident response plans, runbooks, and playbooks.nContribute to monthly reporting packs in line with contractual obligations.nAdditional Contributions
Support pre-sales teams with technical requirements for new opportunities.nDemonstrate SOC tools and capabilities to clients.nParticipate in continual service improvement initiatives, recommending changes to address recurring incidents.nSkills & Qualifications
Eligible for, or already holding, SC Clearance.nProven expertise in IBM QRadar and SIEM engineering.nStrong knowledge of log formats, parsing, and normalisation.nProficiency in SIEM query languages such as KQL, SPL, AQL.nScripting experience with Python or PowerShell for automation.nDeep understanding of threat detection, incident response, and the cyber kill chain.nFamiliarity with frameworks including MITRE ATT&CK, NIST, and CIS.nStrong communication, analytical, and presentation skills.nSolid understanding of network traffic flows, vulnerability management, and penetration testing principles.nKnowledge of ITIL processes (Incident, Problem, Change Management).nAbility to work independently and thrive in a 24/7 on-call environment.nEducation & Experience
3-5 years' experience in the IT security industry, ideally in a SOC/NOC environment.nCybersecurity certifications preferred (e.g., ISC2 CISSP, GIAC, SC-200, IBM QRadar Certified Specialist, Splunk Certified Admin/Power User, Google Chronicle Security Engineer).nHands-on experience with ServiceNow Security Suite.nFamiliarity with cloud platforms (AWS and/or Microsoft Azure).nProficiency in Microsoft Office products, particularly Excel and Word.nReference:
AMC/RHU/SOC
#ryhunTPBN1_UKTJn
Senior SOC Engineer
Posted 2 days ago
Job Viewed
Job Description
£60,000 GBP
Hybrid WORKING
Location: Glasgow, Scotland - United Kingdom Type: Permanent
Senior SOC Engineer
A leading organisation is seeking a Senior SOC Engineer to strengthen its security operations capability and drive continuous improvement across detection, response, and automation. This pivotal role requires deep expertise in IBM QRadar, with a strong focus on playbook deve.
L1 SOC Engineer
Posted 13 days ago
Job Viewed
Job Description
Charterhouse Group is a UK based, PE backed, value-added reseller providing a wide range of technology solutions across the Unified Communications, Cyber Security, LAN and Microsoft Teams spaces.
We are looking for talented and highly motivated people. We understand that the key to our success is our people. For this reason, we are committed to attracting and retaining the best possible candidates. Therefore, we offer a fun, innovative and a fast-paced environment where career development, reward and recognition are a priority.
If you want to join a multi award-winning business, passionate about technology and its customers, credible in the market with a stimulating working environment - then we want to speak to you.
About the Role
As a member of the SOC team, you will provide security analysis of customer security events, monitor, manage, and support highly secure customer environments with a focus on security event management, endpoint security, and next-generation intrusion prevention/firewalling for a portfolio of small and medium businesses.
This role is ideal for someone early in their cybersecurity career, looking to gain hands-on experience with enterprise-grade security technologies in a fast-paced SOC environment.
Key Responsibilities
- Monitor SIEM, EDR, and SOAR platforms for security alerts, ensuring timely detection and escalation.
- Conduct initial triage of security events and incidents, escalating to L2/L3 teams when required.
- Assist with running vulnerability scans and interpreting results.
- Support incident response activities and document investigation findings.
- Perform packet-capture analysis and support network traffic investigations.
- Use threat intelligence sources to aid in investigations.
- Maintain accurate shift logs and participate in daily SOC briefings.
- Be part of an on-call rotation for after-hours support, when required.
- Contribute to SOC knowledge base and process improvements.
Performance Expectations
- Triaging and escalating security alerts within agreed SLAs
- Maintaining high accuracy in incident documentation and reporting
- Contributing to effective knowledge-sharing with SOC colleagues
- Supporting continuous improvement of SOC processes and playbooks
Challenges & Opportunities
- Exposure to real-world security incidents and threat actors
- Hands-on experience with leading security technologies and tools
- Opportunity to gain further certifications and professional development
- Career progression to L2 SOC Analyst, or Security Engineer roles
- Working in a hybrid environment with flexibility and collaboration
Requirements
Requirements
- Microsoft Security configuration knowledge – Defender for Endpoint/Email/Sentinel
- SIEM tool operations – Detection and response to security events (Rapid7, QRadar, LogRhythm, or similar)
- EDR operations – Detection and response using SentinelOne, Microsoft Defender for Endpoint, or similar
- Knowledge of vulnerability scanning tools (Rapid7 iVM, Qualys, or similar)
- Understanding of SOAR platforms
- Experience with packet-capture tools and analysis of packet flows
- Familiarity with Behaviour Analytics platforms
- Exposure to using Threat Intelligence in investigations
- Strong understanding of network technologies and how cybersecurity risks affect them
- Relevant certifications such as CompTIA Security+, Network+, CySA+, or equivalent
Performance Expectations
- Triaging and escalating security alerts within agreed SLAs
- Maintaining high accuracy in incident documentation and reporting
- Contributing to effective knowledge-sharing with SOC colleagues
- Supporting continuous improvement of SOC processes and playbooks
Challenges & Opportunities
- Exposure to real-world security incidents and threat actors
- Hands-on experience with leading security technologies and tools
- Opportunity to gain further certifications and professional development
- Career progression to L2 SOC Analyst, or Security Engineer roles
- Working in a hybrid environment with flexibility and collaboration
Benefits
Join us, and your benefits and perks will include private healthcare, Medicash cashback, life assurance, workplace pension, cycle to work scheme, access to our employee assistance programme, savings discount, 20% EE discount that extends to your family and friends, a birthday gift voucher and day off, plus more.
Senior IR-SOC Engineer
Posted 1 day ago
Job Viewed
Job Description
Join to apply for the
Senior IR-SOC Engineer
role at
Simpson Thacher & Bartlett LLP .nThe firm is one of the world’s leading international law firms. Established in 1884, it has more than 1,000 lawyers and is headquartered in New York with offices in Beijing, Brussels, Hong Kong, Houston, London, Los Angeles, Palo Alto, São Paulo, Tokyo and Washington, D.C. The Firm provides coordinated legal advice and transactional capability to clients around the globe.nDescription/Job Summary
Reporting to the Security Operations Center (SOC) Senior Manager, this person will work alongside an expanding team of information security professionals with the shared goal of protecting the Firm’s security posture and staying one step ahead of threat actors. The person in this role will develop and integrate an Incident Response (IR)/SOC security infrastructure to monitor the Firm’s on prem and cloud environments, articulate technical security requirements, monitor the effectiveness of the IR/SOC, make recommendations for enhancements, and help raise the level of security awareness.nThe Senior IR-SOC Engineer serves as a critical bridge between operations and engineering. This very skilled professional has developed additional experience integrating SOC systems, people, and process. This role includes implementation, maintenance and configuration of key SOC technology initiatives.nResponsibilities/Duties
Drive and improve continuous monitoring and incident response, serving as a senior resource in our SOC and Incident Response processes.nConfigure and integrate platforms, tools, service providers, and solutions into our IR/SOC systems, make recommendations as needed.nConsolidate and improve security logging and monitoring solutions on premise and in the cloud to detect and respond to security threats in real time.nDrive and guide efforts to automate and accelerate the detection and response processesnCoach and mentor SOC Analysts on process, tools, and skills development.nPartner with Security Engineers to assess and select appropriate security controls and technologies related to continuous monitoring and incident response.nEnsure integration of input from the Firm’s deployed suite of security tools to SOC systems (e.g. SIEM/SOAR), including, but not limited to, IDS/IPS, End Point Protection, MDR/XDR, PAM, MFA, DNS Security, and cloud security posture management.nEnsure the Firms Incident Response and security monitoring systems adhere to security best practices and baselines to ensure a secure configuration of platforms and resources.nAdvise and work closely with the Identity and Access Management (IAM) team to ensure IR/SOC visibility into authentication to the Firm’s resources.nParticipate in the computer security incident response team efforts and other security investigation activities as assigned, including on call escalation rotation.nAssist leadership with trend analysis, reporting, and metrics development to drive continuous improvement.nLead tactical and strategic level efforts to develop process and runbooks as well as capture lessons learned and improve tools and process.nProvide technical assistance to IT staff in the detection and resolution of security problems.nCoordinate multiple projects concurrently and influence the decision making process.nCommunicate and report issues, status, and results to senior management.nPerform other duties as assigned.nPhysical demands
Sedentary work: Exerting up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met.nSitting: Remaining in the seated position, particularly for sustained periods of timenWalking: Moving about on foot to accomplish tasks, particularly for long distances or moving from one work site to anothernLifting: Raising objects from a lower to a higher position or moving objects horizontallynCarrying: Transporting an object, usually holding it in the hands or arms, or on the shouldernPulling/Pushing: Using upper extremities to exert steady force upon an object so that the object moves toward or away from the forcenBending/Stooping/Kneeling/Crouching: Bending body downward and forward by bending legs and spine, or by bending legs at kneesnReaching: Extending hand(s) and arm(s) in any directionnRequired Skills
8+ years of hands-on experience in information security related responsibilities with a strong focus on SOC engineering, incident response, and thread detection/huntingnIn-depth knowledge of IR/SOC monitoring, alerting and investigation tools platforms, process, and architecture.nExperience working with cloud security technologies (AWS, Azure DevOps, Kubernetes, GCP, etc) including cloud log analysis, monitoring, detection, and incident response.nExperience with SOC use of SIEM, SOAR, IDS/IPS, DLP, and Endpoint securitynExperience with third-party security monitoring solutions and providersnAbility to effectively prioritize and execute tasksnAbility to effectively present information verbally and in writingnMust be able to work collaboratively in a team environment and independentlynAbility to handle sensitive and/or confidential material and information with suitable discretionnExcellent interpersonal skills and a professional demeanor; ability to work effectively with all levels of Firm personnel and vendorsnRequired Education
Bachelor’s (or Master’s) degree in information security, IT, related discipline, or equivalent experiencenPreferred
Professional certifications such as GIAC Certified Incident Handler (GCIH); GIAC Certified Intrusion Analyst (GCIA); Certified Information Systems Security Professional (CISSP)nDetails
Salary and Benefits: CompetitivenHybrid: Monday-Thursday in office, ability to WFH on FridaysnEqual Opportunities
Simpson Thacher is committed to ensuring that everyone can reach their full potential, irrespective of background, identity, or circumstance. We know that we are at our best when we bring together diverse experiences and perspectives. This is why we are focused on fostering a collegial environment which maximises collaboration, empowering every individual to thrive and succeed.nSeniority level
Mid-Senior levelnEmployment type
Full-timenJob function
Engineering and Information TechnologynIndustries
Law Practice
#J-18808-Ljbffrn
Tier 3 SOC Engineer (London)
Posted 15 days ago
Job Viewed
Job Description
I am currently working with a national MSP who are seeking a Tier 3 SOC Engineer to work within their SOC team, supporting their customers networks using the companies toolsets and processes.
You will be providing technical support for a variety of products and services with the main focus of Managed Networks and Security, Unified Communication and fixed connectivity supplied to our customers.
Key Responsibilities
- Remotely support and identify issues affecting customer systems and services, then perform top-tier diagnosis with a view to resolution or further escalation.
- Provide an escalation route within SOC for Tier 1, Tier 2 and Tier 3 support functions
- Resolution of full range of technical support issues.
- Provide proactive monitoring and management of services to all customers.
- Ensure that all company processes, procedures, and standards are adhered to at all times.
- Provide ownership of operational processes and escalate issues to internal support teams (such as Technical Services and PMO) as and when required.
- Work with the ISOC Tier 2 Team Leader to provide mentoring to ISOC Tier 2 Core engineers
Ideal background
- A minimum of five years providing network/security solutions in a technical support role to a high technical level
- Experience with the advanced functionality of networking equipment, i.e. Routers, Switches, Firewalls, wide area communications, cloud compute and security, SDN's
- Experience of the following vendor products; Check Point, Juniper, Cisco, Palo Alto, Aruba
- Expert knowledge of connectivity technologies (LAN/WAN/Wireless/SD-WAN)
- Advanced Experience in configuring and troubleshooting networking protocols.
- Expert understanding of practical application of VLANs, switching, and routing.
- Willingness to learn new technologies using self-learning and dedicated training techniques.
- Working under pressure, multitasking between simultaneous projects and responding to deadlines.
- Operational experience of Wireless technologies is required
- Operational experience of shared compute and virtualisation technologies is desirable.
Qualifications
- Cisco CCIE
- Aruba CCCP
- Expert level Radius experience, including Cisco ISE, Aruba ClearPass
Key requirements
- Willing to work in a varying shift pattern including week-ends, bank holidays and out of hours
- All employees are subject to Enhanced DBS check during probation period.
- The role will require NPPV3 and/or SC clearance in order to support key customers.
Please apply for consideration
Tier 3 SOC Engineer (London)
Posted 15 days ago
Job Viewed
Job Description
I am currently working with a national MSP who are seeking a Tier 3 SOC Engineer to work within their SOC team, supporting their customers networks using the companies toolsets and processes.
You will be providing technical support for a variety of products and services with the main focus of Managed Networks and Security, Unified Communication and fixed connectivity supplied to our customers.
Key Responsibilities
- Remotely support and identify issues affecting customer systems and services, then perform top-tier diagnosis with a view to resolution or further escalation.
- Provide an escalation route within SOC for Tier 1, Tier 2 and Tier 3 support functions
- Resolution of full range of technical support issues.
- Provide proactive monitoring and management of services to all customers.
- Ensure that all company processes, procedures, and standards are adhered to at all times.
- Provide ownership of operational processes and escalate issues to internal support teams (such as Technical Services and PMO) as and when required.
- Work with the ISOC Tier 2 Team Leader to provide mentoring to ISOC Tier 2 Core engineers
Ideal background
- A minimum of five years providing network/security solutions in a technical support role to a high technical level
- Experience with the advanced functionality of networking equipment, i.e. Routers, Switches, Firewalls, wide area communications, cloud compute and security, SDN's
- Experience of the following vendor products; Check Point, Juniper, Cisco, Palo Alto, Aruba
- Expert knowledge of connectivity technologies (LAN/WAN/Wireless/SD-WAN)
- Advanced Experience in configuring and troubleshooting networking protocols.
- Expert understanding of practical application of VLANs, switching, and routing.
- Willingness to learn new technologies using self-learning and dedicated training techniques.
- Working under pressure, multitasking between simultaneous projects and responding to deadlines.
- Operational experience of Wireless technologies is required
- Operational experience of shared compute and virtualisation technologies is desirable.
Qualifications
- Cisco CCIE
- Aruba CCCP
- Expert level Radius experience, including Cisco ISE, Aruba ClearPass
Key requirements
- Willing to work in a varying shift pattern including week-ends, bank holidays and out of hours
- All employees are subject to Enhanced DBS check during probation period.
- The role will require NPPV3 and/or SC clearance in order to support key customers.
Please apply for consideration
Be The First To Know
About the latest Soc engineer Jobs in United Kingdom !
Tier 3 SOC Engineer (London)
Posted 5 days ago
Job Viewed
Job Description
I am currently working with a national MSP who are seeking a Tier 3 SOC Engineer to work within their SOC team, supporting their customers networks using the companies toolsets and processes.
You will be providing technical support for a variety of products and services with the main focus of Managed Networks and Security, Unified Communication and fixed connectivity supplied to our customers.
K.
WHJS1_UKTJ
SOC Solution Engineer
Posted today
Job Viewed
Job Description
SOC Solution Engineer
Posted today
Job Viewed