SOC Specialist
Morson Group
Crawley, United Kingdom
10 days ago
Role details
Contract type
Permanent contract Employment type
Full-time (> 32 hours) Working hours
Regular working hours Languages
English Experience level
SeniorJob location
Crawley, United Kingdom
Tech stack
Computer Security
Security Information and Event Management
QRadar
Cybercrime
Microsoft Sentinel
Job description
- Lead the response to high-severity (Level 3) cyber incidents, acting as the technical escalation point.
- Perform advanced threat hunting, identifying hidden or emerging threats using multiple intelligence sources.
- Improve and maintain incident response playbooks, SOC procedures, and technical standards.
- Work closely with an MSSP and internal technology teams to optimise SIEM coverage and alerting.
- Develop and enhance SIEM use cases and SOAR automation workflows.
- Conduct digital forensics and produce clear, actionable incident reports.
- Support cyber attack simulations, tabletop exercises, and crisis testing.
- Mentor and support Level 1 and Level 2 SOC analysts.
- Contribute to audits and compliance activities (e.g. ISO 27001, NCSC CAF).
Requirements
Are you a Senior SOC Specialist comfortable leading high-severity cyber security incidents end to end, with a strong background in advanced threat hunting? If so, this could be a great opportunity to step into a highly impactful role within a critical infrastructure environment., * Strong experience in a SOC Level 3 role, with clear evidence of incident leadership and threat hunting.
- Experience working across IT environments, with exposure to or understanding of OT security.
- Hands-on experience with SIEM, SOAR, EDR, IDS/IPS, IAM, DLP, and network security tooling.
- Solid understanding of attacker TTPs and frameworks such as MITRE ATT&CK.
- Experience investigating complex or targeted cyber attacks (e.g. ransomware, advanced persistent threats).
- Confident communicator, able to explain technical incidents to both technical and non-technical stakeholders.
Desirable (Not Essential)
- Cyber security certifications such as CISSP, GIAC, CASP+, CEH, AZ-500 or SIEM-specific training.
- Experience with tools such as Microsoft Sentinel, QRadar, FortiSIEM, Darktrace, Microsoft Defender.
- Knowledge of ISO 27001, NCSC CAF, NIST, CIS frameworks.