SOC Specialist

Morson Group
Crawley, United Kingdom
10 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior

Job location

Crawley, United Kingdom

Tech stack

Computer Security
Security Information and Event Management
QRadar
Cybercrime
Microsoft Sentinel

Job description

  • Lead the response to high-severity (Level 3) cyber incidents, acting as the technical escalation point.
  • Perform advanced threat hunting, identifying hidden or emerging threats using multiple intelligence sources.
  • Improve and maintain incident response playbooks, SOC procedures, and technical standards.
  • Work closely with an MSSP and internal technology teams to optimise SIEM coverage and alerting.
  • Develop and enhance SIEM use cases and SOAR automation workflows.
  • Conduct digital forensics and produce clear, actionable incident reports.
  • Support cyber attack simulations, tabletop exercises, and crisis testing.
  • Mentor and support Level 1 and Level 2 SOC analysts.
  • Contribute to audits and compliance activities (e.g. ISO 27001, NCSC CAF).

Requirements

Are you a Senior SOC Specialist comfortable leading high-severity cyber security incidents end to end, with a strong background in advanced threat hunting? If so, this could be a great opportunity to step into a highly impactful role within a critical infrastructure environment., * Strong experience in a SOC Level 3 role, with clear evidence of incident leadership and threat hunting.

  • Experience working across IT environments, with exposure to or understanding of OT security.
  • Hands-on experience with SIEM, SOAR, EDR, IDS/IPS, IAM, DLP, and network security tooling.
  • Solid understanding of attacker TTPs and frameworks such as MITRE ATT&CK.
  • Experience investigating complex or targeted cyber attacks (e.g. ransomware, advanced persistent threats).
  • Confident communicator, able to explain technical incidents to both technical and non-technical stakeholders.

Desirable (Not Essential)

  • Cyber security certifications such as CISSP, GIAC, CASP+, CEH, AZ-500 or SIEM-specific training.
  • Experience with tools such as Microsoft Sentinel, QRadar, FortiSIEM, Darktrace, Microsoft Defender.
  • Knowledge of ISO 27001, NCSC CAF, NIST, CIS frameworks.

Apply for this position