Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: London Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: (see below) Certes IT Service Solutions welcome applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations.
Dec 10, 2025
Contractor
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: London Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: (see below) Certes IT Service Solutions welcome applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations.
Certes IT Service Solutions
Milton Keynes, Buckinghamshire
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: Milton Keynes Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats click apply for full job details
Dec 10, 2025
Contractor
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: Milton Keynes Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats click apply for full job details
Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared, required by our government services client at their East Kilbride, Glasgow base. Paying 653 per day - Umbrella Company Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake. The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays. To start in the New Year Skills and Experience Required: Experience of SPLUNK with in a Security Operations Centre (SOC). A bachelor's degree in computer science, Cyber Security or relevant experience You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role Key Responsibilities Continuous Monitoring You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents. Initial Incident Response For confirmed incidents, youll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Managing You'll provide direction and support to the junior member of the shift and provide handover to the next shift leader. Tool Management You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively. Please apply on line in the first instance SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.
Dec 09, 2025
Contractor
Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared, required by our government services client at their East Kilbride, Glasgow base. Paying 653 per day - Umbrella Company Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake. The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays. To start in the New Year Skills and Experience Required: Experience of SPLUNK with in a Security Operations Centre (SOC). A bachelor's degree in computer science, Cyber Security or relevant experience You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role Key Responsibilities Continuous Monitoring You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents. Initial Incident Response For confirmed incidents, youll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Managing You'll provide direction and support to the junior member of the shift and provide handover to the next shift leader. Tool Management You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively. Please apply on line in the first instance SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.
Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared, required by our government services client in their East Kilbride, Glasgow base. Paying £610 per day inside IR35 - Umbrella Company Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake. The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays. To start in the New Year Skills and Experience Required: Experience of SPLUNK with in a Security Operations Centre (SOC). A bachelor's degree in computer science, Cyber Security or relevant experience You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role Key Responsibilities Continuous Monitoring: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage: You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents. Initial Incident Response: For confirmed incidents, youll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation: You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Tool Management: You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively. Please apply on line in the first instance SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.
Dec 09, 2025
Contractor
Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared, required by our government services client in their East Kilbride, Glasgow base. Paying £610 per day inside IR35 - Umbrella Company Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake. The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays. To start in the New Year Skills and Experience Required: Experience of SPLUNK with in a Security Operations Centre (SOC). A bachelor's degree in computer science, Cyber Security or relevant experience You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role Key Responsibilities Continuous Monitoring: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage: You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents. Initial Incident Response: For confirmed incidents, youll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation: You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Tool Management: You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively. Please apply on line in the first instance SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.
LA International Computer Consultants Ltd
East Kilbride, Lanarkshire
We have a number of Lead and Senior SOC Analyst roles requiring a high level of Security Clearance. The roles will be based fully onsite in East Kilbride covering a 24/7 shift rota. You will be a part of a 24/7 team responsible for monitoring our systems, detecting potential security incidents, and initiating the incident response process. Key Responsibilities Continuous Monitoring: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage: You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. Initial Incident Response: For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation: You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Tool Management: You will assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. Essential skills & experience include: - Excellent problem-solving abilities, strong attention to detail, and the capacity to work under pressure. You should be a strong communicator, both written and verbal, and be comfortable working in a team environment. - Experience of SPLUNK within a Security Operations Centre (SOC). Education: A bachelor's degree in computer science, Cyber Security, Information Technology, or a related field is preferred. Relevant experience may be substituted for a degree. Knowledge: You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications: While not required, certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 18 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
Dec 09, 2025
Contractor
We have a number of Lead and Senior SOC Analyst roles requiring a high level of Security Clearance. The roles will be based fully onsite in East Kilbride covering a 24/7 shift rota. You will be a part of a 24/7 team responsible for monitoring our systems, detecting potential security incidents, and initiating the incident response process. Key Responsibilities Continuous Monitoring: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage: You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. Initial Incident Response: For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation: You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Tool Management: You will assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. Essential skills & experience include: - Excellent problem-solving abilities, strong attention to detail, and the capacity to work under pressure. You should be a strong communicator, both written and verbal, and be comfortable working in a team environment. - Experience of SPLUNK within a Security Operations Centre (SOC). Education: A bachelor's degree in computer science, Cyber Security, Information Technology, or a related field is preferred. Relevant experience may be substituted for a degree. Knowledge: You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications: While not required, certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 18 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
Cyber Security Lead SOC Analysts, Splunk, DV Security Cleared, required by our government services client based Milton Keynes, Bucks commutable from Northampton, East Midlands, Bedford, Luton, Peterborough. Paying £655 a day - Umbrella Company Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake. The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays. To start in the New Year Skills and Experience Required: Experience of SPLUNK with in a Security Operations Centre (SOC). A bachelor's degree in computer science, Cyber Security You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role Key Responsibilities Continuous Monitoring You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents. Initial Incident Response For confirmed incidents, youll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Managing You'll provide direction and support to the junior member of the shift and provide handover to the next shift leader. Tool Management: You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively. Please apply on line in the first instance SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.
Dec 09, 2025
Contractor
Cyber Security Lead SOC Analysts, Splunk, DV Security Cleared, required by our government services client based Milton Keynes, Bucks commutable from Northampton, East Midlands, Bedford, Luton, Peterborough. Paying £655 a day - Umbrella Company Working in an DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance, or be eligible to undertake. The role requires working as part of a 24/7 shift pattern. This pattern will include weekends and bank holidays. To start in the New Year Skills and Experience Required: Experience of SPLUNK with in a Security Operations Centre (SOC). A bachelor's degree in computer science, Cyber Security You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role Key Responsibilities Continuous Monitoring You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents. Initial Incident Response For confirmed incidents, youll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Managing You'll provide direction and support to the junior member of the shift and provide handover to the next shift leader. Tool Management: You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively. Please apply on line in the first instance SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity, we are committed to promoting equality and inclusion for all.
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: Milton Keynes Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: (see below) Certes IT Service Solutions welcomes applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations.
Dec 09, 2025
Contractor
Senior SOC Analyst (DV Cleared) Duration: 12 Months Location: Milton Keynes Rate: £600-£650 per day IR35 Status: Inside Start: ASAP A Senior SOC Analyst (DV Cleared) is required for our Government client to be part of their security team providing a 24x7 service helping to protect the organisation from cyber threats. You will be part of a 24x7 team responsible for monitoring their systems, detecting potential security incidents and initiating the incident response process. Essential skills & experience required: As the Senior SOC Analyst you will possess current security clearance to DV Level together with experience of SPLUNK within a security operations centre (SOC) Possess excellent problem solving abilities, attention to detail and the capacity to work under pressure and comfortable working within a team environment. Have a good understanding of networking concepts (TCP/IP, DNS etc ) Windows and Linux O/Systems Common cyber attack techniques Any Cyber security certifications would be desirable. Responsibilities include: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. Analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritise incidents. For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Create detailed tickets and reports for all detected incidents, documenting your findings and the steps you have taken as this is crucial for tracking incidents and for future analysis. Also to assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively. To apply for this role please email your CV to: (see below) Certes IT Service Solutions welcomes applications from all sections of the community and from people with diverse experience and backgrounds Certes Computing (and all of its subsidiary companies) is committed to promoting equality and diversity in its business operations.
CBSbutler Holdings Limited trading as CBSbutler
City, London
Information Assurance Project Analyst months + +Hybrid 2/3 days on site in London +SC cleared role +Outside IR35 + 400 - 475 a day Skills: +Information Assurance +SC clearance / DV clearance +Certifications, from a recognised body, in digital security e.g. GIAC, ISC2, BCS, ISACA. We're seeking a skilled Information Assurance Consultant to join a key government agency, supporting the Information, Policy and Security (IPS) Cyber and Information Assurance (C&IA) function. You'll provide expert direction and assurance across multiple programmes and projects, ensuring that the technical, procedural, and physical controls in place to protect sensitive data are robust, proportionate, and aligned with government standards. This is a hands-on, advisory role-ideal for someone who thrives on influencing at programme level while also getting into the detail of how assurance frameworks are applied across IT, data analytics, and wider business functions. Key Responsibilities Provide cyber and information assurance advice to new and ongoing projects, shaping security requirements and framework controls. Conduct security audits, risk assessments, and assurance reviews to ensure compliance with HMG Security Classifications and relevant regulations and standards. Advise on IT security solutions and emerging technologies, maintaining up-to-date knowledge of best practice. Collaborate with other security disciplines - including Cyber Operations, Physical Security, and Personnel Security - to manage and reduce data loss risks. Deliver formal technical assurance on system and architectural designs, ensuring appropriate security of information and processing facilities. Support incident management activities, offering expert input and response guidance. Required You'll bring both technical depth and strategic assurance expertise , ideally gained within a secure or government environment. You're confident engaging with multiple stakeholders, managing risk in complex programmes, and balancing security controls with operational need. Essential: Degree or equivalent in an IT-related discipline or recognised security certifications (e.g. GIAC, ISC2, BCS, ISACA). Demonstrable experience in information assurance, IT risk management, or cyber security within government or critical national infrastructure. Strong understanding of government security frameworks and assurance processes . Active SC clearance (enhanced SC preferred). If you'd like to discuss this Information Assurance role in more detail, please send your updated CV and I will get in touch.
Dec 08, 2025
Contractor
Information Assurance Project Analyst months + +Hybrid 2/3 days on site in London +SC cleared role +Outside IR35 + 400 - 475 a day Skills: +Information Assurance +SC clearance / DV clearance +Certifications, from a recognised body, in digital security e.g. GIAC, ISC2, BCS, ISACA. We're seeking a skilled Information Assurance Consultant to join a key government agency, supporting the Information, Policy and Security (IPS) Cyber and Information Assurance (C&IA) function. You'll provide expert direction and assurance across multiple programmes and projects, ensuring that the technical, procedural, and physical controls in place to protect sensitive data are robust, proportionate, and aligned with government standards. This is a hands-on, advisory role-ideal for someone who thrives on influencing at programme level while also getting into the detail of how assurance frameworks are applied across IT, data analytics, and wider business functions. Key Responsibilities Provide cyber and information assurance advice to new and ongoing projects, shaping security requirements and framework controls. Conduct security audits, risk assessments, and assurance reviews to ensure compliance with HMG Security Classifications and relevant regulations and standards. Advise on IT security solutions and emerging technologies, maintaining up-to-date knowledge of best practice. Collaborate with other security disciplines - including Cyber Operations, Physical Security, and Personnel Security - to manage and reduce data loss risks. Deliver formal technical assurance on system and architectural designs, ensuring appropriate security of information and processing facilities. Support incident management activities, offering expert input and response guidance. Required You'll bring both technical depth and strategic assurance expertise , ideally gained within a secure or government environment. You're confident engaging with multiple stakeholders, managing risk in complex programmes, and balancing security controls with operational need. Essential: Degree or equivalent in an IT-related discipline or recognised security certifications (e.g. GIAC, ISC2, BCS, ISACA). Demonstrable experience in information assurance, IT risk management, or cyber security within government or critical national infrastructure. Strong understanding of government security frameworks and assurance processes . Active SC clearance (enhanced SC preferred). If you'd like to discuss this Information Assurance role in more detail, please send your updated CV and I will get in touch.
Enterprise Architecture Modelling SME Must have an Active DV Clearance Join a high-performing Defence and National Security programme as an Enterprise Architecture Modelling SME , where you will design and manage enterprise architecture models that guide strategic decision making across complex systems. This is an opportunity to work within a multi skilled agile team, shaping how technology, applications, and business processes align to deliver secure and effective outcomes. About the Role - Enterprise Architecture Modelling SME As an Enterprise Architecture Modelling SME , you will create and manage enterprise architecture models across business, application, and technology layers using the ArchiMate standard. You will develop clear viewpoints, diagrams, and capability maps to communicate architectural direction to stakeholders. The role involves conducting impact and gap analyses, scenario modelling, and supporting decision making on proposed changes. You will work closely with analysts, project managers, data architects, and engineers to ensure solutions align with defined blueprints. You will automate documentation outputs from models to support knowledge transfer and reduce manual effort. What We're Looking For - Enterprise Architecture Modelling SME Strong experience applying ArchiMate 3.x across multiple viewpoints. Familiarity with architecture tools such as Archi, Sparx EA, or BizzDesign . Ability to visualise complex systems and produce clear analytical outputs. Excellent communication skills to explain architectural concepts to technical and non technical audiences. Strong problem solving ability with a structured and proactive approach. Make a meaningful impact as an Enterprise Architecture Modelling SME in a secure, mission focused environment. To apply, please send your CV by pressing the apply button.
Dec 06, 2025
Contractor
Enterprise Architecture Modelling SME Must have an Active DV Clearance Join a high-performing Defence and National Security programme as an Enterprise Architecture Modelling SME , where you will design and manage enterprise architecture models that guide strategic decision making across complex systems. This is an opportunity to work within a multi skilled agile team, shaping how technology, applications, and business processes align to deliver secure and effective outcomes. About the Role - Enterprise Architecture Modelling SME As an Enterprise Architecture Modelling SME , you will create and manage enterprise architecture models across business, application, and technology layers using the ArchiMate standard. You will develop clear viewpoints, diagrams, and capability maps to communicate architectural direction to stakeholders. The role involves conducting impact and gap analyses, scenario modelling, and supporting decision making on proposed changes. You will work closely with analysts, project managers, data architects, and engineers to ensure solutions align with defined blueprints. You will automate documentation outputs from models to support knowledge transfer and reduce manual effort. What We're Looking For - Enterprise Architecture Modelling SME Strong experience applying ArchiMate 3.x across multiple viewpoints. Familiarity with architecture tools such as Archi, Sparx EA, or BizzDesign . Ability to visualise complex systems and produce clear analytical outputs. Excellent communication skills to explain architectural concepts to technical and non technical audiences. Strong problem solving ability with a structured and proactive approach. Make a meaningful impact as an Enterprise Architecture Modelling SME in a secure, mission focused environment. To apply, please send your CV by pressing the apply button.
Junior IT Analyst (SC Cleared) - 26,000 to 30,000 - Bristol I am seeking an SC Cleared Junior IT Technician to work in a high performing IT Team. The right Junior IT Analyst will be a part of a medium sized team and will be working 5 days a week onsite. Ths is an initial 6 Month FTC but will likely be extended for a number of years. Requirements of Junior IT Analyst Take calls and provide 1st Line support on the phone Keep and confirm company details accurately Documentation Escalations to 2nd Line Password Resets Essential SC Clearance Prior basic IT background (1 year+) Willingness to Learn This is an excellent opprtunity for someone who is just starting out in IT and is looking to learn and grow on the role. Apply quickly to not miss out! If you are interested in this position please click 'apply'. Hunter Selection Limited is a recruitment consultancy with offices UK wide, specialising in permanent & contract roles within Engineering & Manufacturing, IT & Digital, Science & Technology and Service & Sales sectors. Please note as we receive a high level of applications we can only respond to applicants whose skills & qualifications are suitable for this position. No terminology in this advert is intended to discriminate against any of the protected characteristics that fall under the Equality Act 2010. For the purposes of the Conduct Regulations 2003, when advertising permanent vacancies we are acting as an Employment Agency, and when advertising temporary/contract vacancies we are acting as an Employment Business.
Dec 06, 2025
Full time
Junior IT Analyst (SC Cleared) - 26,000 to 30,000 - Bristol I am seeking an SC Cleared Junior IT Technician to work in a high performing IT Team. The right Junior IT Analyst will be a part of a medium sized team and will be working 5 days a week onsite. Ths is an initial 6 Month FTC but will likely be extended for a number of years. Requirements of Junior IT Analyst Take calls and provide 1st Line support on the phone Keep and confirm company details accurately Documentation Escalations to 2nd Line Password Resets Essential SC Clearance Prior basic IT background (1 year+) Willingness to Learn This is an excellent opprtunity for someone who is just starting out in IT and is looking to learn and grow on the role. Apply quickly to not miss out! If you are interested in this position please click 'apply'. Hunter Selection Limited is a recruitment consultancy with offices UK wide, specialising in permanent & contract roles within Engineering & Manufacturing, IT & Digital, Science & Technology and Service & Sales sectors. Please note as we receive a high level of applications we can only respond to applicants whose skills & qualifications are suitable for this position. No terminology in this advert is intended to discriminate against any of the protected characteristics that fall under the Equality Act 2010. For the purposes of the Conduct Regulations 2003, when advertising permanent vacancies we are acting as an Employment Agency, and when advertising temporary/contract vacancies we are acting as an Employment Business.
CBSbutler Holdings Limited trading as CBSbutler
Basingstoke, Hampshire
Infrastructure Test Analyst - DV Cleared Rate: 400 a day Location: Basingstoke - onsite 5 days a week Clearance: DV Clearance required You will join a global IT Consultancy delivering digital transformation to the MoD. You will be an experienced test analyst with good knowledge of Windows and Linux operating systems together with an understanding of DevOps principles, together with the experience of working within a multi-disciplined engineering team. Embedded within Agile delivery teams, you will collaborate closely with developers, infrastructure specialists, and project managers to deliver high-quality solutions that make a real-world impact. You will leverage your knowledge of core software tools, development methods, and integration frameworks to support the continuous integration, deployment, and testing of new features across complex environments. Hands on experience in infrastructure engineering, including the testing, deployment, and maintenance of robust, scalable systems. Key Duties and Responsibilities Running manual tests using the project approved tools Interpretation of test results and preliminary investigation of failures Raising defects and monitoring them through to resolution Develop scripts and integrate testing within CI/CD pipelines and a wider ecosystem of tools Good knowledge of IT infrastructure, including servers, networks, and virtualisation technologies. Good understanding of network protocols, and experience with both Linux and Windows operating systems. Your skills and experience: Experience of Testing Experience of Continuous Integration Tools Experience designing and producing manual Tests Experience of Test Management Tools Desired Competencies Experience of SAFe and agile ways of working Good Problem investigation and analysis skills ISTQB Foundation Certification
Dec 04, 2025
Contractor
Infrastructure Test Analyst - DV Cleared Rate: 400 a day Location: Basingstoke - onsite 5 days a week Clearance: DV Clearance required You will join a global IT Consultancy delivering digital transformation to the MoD. You will be an experienced test analyst with good knowledge of Windows and Linux operating systems together with an understanding of DevOps principles, together with the experience of working within a multi-disciplined engineering team. Embedded within Agile delivery teams, you will collaborate closely with developers, infrastructure specialists, and project managers to deliver high-quality solutions that make a real-world impact. You will leverage your knowledge of core software tools, development methods, and integration frameworks to support the continuous integration, deployment, and testing of new features across complex environments. Hands on experience in infrastructure engineering, including the testing, deployment, and maintenance of robust, scalable systems. Key Duties and Responsibilities Running manual tests using the project approved tools Interpretation of test results and preliminary investigation of failures Raising defects and monitoring them through to resolution Develop scripts and integrate testing within CI/CD pipelines and a wider ecosystem of tools Good knowledge of IT infrastructure, including servers, networks, and virtualisation technologies. Good understanding of network protocols, and experience with both Linux and Windows operating systems. Your skills and experience: Experience of Testing Experience of Continuous Integration Tools Experience designing and producing manual Tests Experience of Test Management Tools Desired Competencies Experience of SAFe and agile ways of working Good Problem investigation and analysis skills ISTQB Foundation Certification
SC Cleared 1st Line IT Support - 26,000 to 30,000 - Bristol I am seeking an SC Cleared 1st Line IT Support Technician to work in a high performing IT Team. The right Junior IT Analyst will be a part of a medium sized team and will be working 5 days a week onsite. Ths is an initial 6 Month FTC but will likely be extended for a number of years. Please only apply if you have valid SC clearance. Requirements of SC Cleared 1st Line IT Support Technician: Take calls and provide 1st Line support on the phone Keep and confirm company details accurately Documentation Escalations to 2nd Line Password Resets The right SC Cleared 1st Line IT Support Technician must have: Prior basic IT background (1 year+) Willingness to Learn SC Clearance This is an excellent opprtunity for someone who is just starting out in IT and is looking to learn and grow on the role. Apply quickly to not miss out! If you are interested in this position please click 'apply'. Hunter Selection Limited is a recruitment consultancy with offices UK wide, specialising in permanent & contract roles within Engineering & Manufacturing, IT & Digital, Science & Technology and Service & Sales sectors. Please note as we receive a high level of applications we can only respond to applicants whose skills & qualifications are suitable for this position. No terminology in this advert is intended to discriminate against any of the protected characteristics that fall under the Equality Act 2010. For the purposes of the Conduct Regulations 2003, when advertising permanent vacancies we are acting as an Employment Agency, and when advertising temporary/contract vacancies we are acting as an Employment Business.
Dec 04, 2025
Full time
SC Cleared 1st Line IT Support - 26,000 to 30,000 - Bristol I am seeking an SC Cleared 1st Line IT Support Technician to work in a high performing IT Team. The right Junior IT Analyst will be a part of a medium sized team and will be working 5 days a week onsite. Ths is an initial 6 Month FTC but will likely be extended for a number of years. Please only apply if you have valid SC clearance. Requirements of SC Cleared 1st Line IT Support Technician: Take calls and provide 1st Line support on the phone Keep and confirm company details accurately Documentation Escalations to 2nd Line Password Resets The right SC Cleared 1st Line IT Support Technician must have: Prior basic IT background (1 year+) Willingness to Learn SC Clearance This is an excellent opprtunity for someone who is just starting out in IT and is looking to learn and grow on the role. Apply quickly to not miss out! If you are interested in this position please click 'apply'. Hunter Selection Limited is a recruitment consultancy with offices UK wide, specialising in permanent & contract roles within Engineering & Manufacturing, IT & Digital, Science & Technology and Service & Sales sectors. Please note as we receive a high level of applications we can only respond to applicants whose skills & qualifications are suitable for this position. No terminology in this advert is intended to discriminate against any of the protected characteristics that fall under the Equality Act 2010. For the purposes of the Conduct Regulations 2003, when advertising permanent vacancies we are acting as an Employment Agency, and when advertising temporary/contract vacancies we are acting as an Employment Business.
Security Analyst/Detection Engineer Location: Corsham, 60% on site Duration: 20/02/2026 MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive for a global consultancy that require an SC or DV cleared Security Analyst/Detection Engineer to join them on a major defence project that's based in Corsham. Role description: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. Must be a sole British National. Hybrid working: The position is office based, with a local agreement with the customer that allows for a limited amount of Working from Home, based around your role, your needs, and those of the business. The current agreement requires 60% attendance in the office. If you are successfully offered this position, you will go through a series of pre-employment checks, including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At Capgemini, striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK MOD Your security clearance
Oct 06, 2025
Contractor
Security Analyst/Detection Engineer Location: Corsham, 60% on site Duration: 20/02/2026 MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive for a global consultancy that require an SC or DV cleared Security Analyst/Detection Engineer to join them on a major defence project that's based in Corsham. Role description: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. Must be a sole British National. Hybrid working: The position is office based, with a local agreement with the customer that allows for a limited amount of Working from Home, based around your role, your needs, and those of the business. The current agreement requires 60% attendance in the office. If you are successfully offered this position, you will go through a series of pre-employment checks, including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At Capgemini, striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK MOD Your security clearance
*Senior Cyber Security Analyst - £600-800pd (experience dependent) INSIDE IR35 - 3 month initial contract - London (3 days per week onsite)* Please note: Due to the nature of the role, we are ideally looking for candidates to hold an active SC clearance. We are looking for a SC Cleared Senior Cyber Security Analyst with SPLUNK experience to join our central government client on an initial 3-month contract. You must have experience investigating and responding to cyber incidents, co-ordinating incident response in a large organisation. We have both a Senior and mid-level role available. Main responsibilities: As a senior security analyst with responsibility for incident response, you will: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environment Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. Essential skills and experience: SPLUNK EDR (Endpoint Detection and Response) Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our Data Protection Policy which can be found on our website. Please note that no terminology in this advert is intended to discriminate on the grounds of a person's gender, marital status, race, religion, colour, age, disability or sexual orientation. Every candidate will be assessed only in accordance with their merits, qualifications and ability to perform the duties of the job. Damia Group is acting as an Employment Business in relation to this vacancy and in accordance to Conduct Regulations 2003.
Oct 03, 2025
Contractor
*Senior Cyber Security Analyst - £600-800pd (experience dependent) INSIDE IR35 - 3 month initial contract - London (3 days per week onsite)* Please note: Due to the nature of the role, we are ideally looking for candidates to hold an active SC clearance. We are looking for a SC Cleared Senior Cyber Security Analyst with SPLUNK experience to join our central government client on an initial 3-month contract. You must have experience investigating and responding to cyber incidents, co-ordinating incident response in a large organisation. We have both a Senior and mid-level role available. Main responsibilities: As a senior security analyst with responsibility for incident response, you will: Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents Lead the forensic analysis of systems, files, network traffic and cloud environment Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions Support the wider coordination of cyber incidents Review previous incidents to identify lessons and actions Identify and deliver opportunities for continual improvement of the incident response capability Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities Develop and update internal plans, playbooks and knowledge base articles Act as an escalation point for, and provide coaching and mentoring to, security analysts Be responsible for leadership and line management of security analysts Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join. Essential skills and experience: SPLUNK EDR (Endpoint Detection and Response) Significant experience investigating and responding to cyber incidents Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents Experience managing and coordinating the response to cyber incidents Experience coaching and mentoring junior staff An in-depth understanding of the tools, techniques and procedures used by threat actors Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our Data Protection Policy which can be found on our website. Please note that no terminology in this advert is intended to discriminate on the grounds of a person's gender, marital status, race, religion, colour, age, disability or sexual orientation. Every candidate will be assessed only in accordance with their merits, qualifications and ability to perform the duties of the job. Damia Group is acting as an Employment Business in relation to this vacancy and in accordance to Conduct Regulations 2003.
Outside IR35 - DV Cleared Strategic Service Design Lead - 3-6 months+ - Remote Please note: This role requires a current and active DV Clearance, unfortunately, applications without this cannot be considered. Looking for a Strategic Design Lead who will coordinate business requirements across all stakeholders, providing strategic direction and guidance across design functions. Key responsibilities include: Leading the overall design vision and ensuring it aligns with business goals and programme objectives. Defining the approach and strategy for eliciting, prioritising, and managing requirements. Guiding multi-disciplinary teams-including user researchers, service designers, business analysts, and solution architects-to create coherent and effective designs. Managing relationships with design components of the End-to-End Change Lifecycle (E2ECL), ensuring integration with governance and processes. Ensuring designs meet established standards and frameworks, including GDS and other relevant guidance. Providing oversight and direction on design decisions, contributing to programme-level governance and design assurance. Identifying and proposing solutions to design challenges using user-centred, co-design, and innovative approaches. Advising senior programme leadership on the prioritisation of requirements at both individual and epic levels. Supporting Discovery phases to ensure programmes are ready for mobilisation and delivery. Outside IR35 - DV Cleared Strategic Service Design Lead - 3-6 months+ - Remote Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our Data Protection Policy which can be found on our website. Please note that no terminology in this advert is intended to discriminate on the grounds of a person's gender, marital status, race, religion, colour, age, disability or sexual orientation. Every candidate will be assessed only in accordance with their merits, qualifications and ability to perform the duties of the job. Damia Group is acting as an Employment Business in relation to this vacancy and in accordance to Conduct Regulations 2003.
Oct 01, 2025
Contractor
Outside IR35 - DV Cleared Strategic Service Design Lead - 3-6 months+ - Remote Please note: This role requires a current and active DV Clearance, unfortunately, applications without this cannot be considered. Looking for a Strategic Design Lead who will coordinate business requirements across all stakeholders, providing strategic direction and guidance across design functions. Key responsibilities include: Leading the overall design vision and ensuring it aligns with business goals and programme objectives. Defining the approach and strategy for eliciting, prioritising, and managing requirements. Guiding multi-disciplinary teams-including user researchers, service designers, business analysts, and solution architects-to create coherent and effective designs. Managing relationships with design components of the End-to-End Change Lifecycle (E2ECL), ensuring integration with governance and processes. Ensuring designs meet established standards and frameworks, including GDS and other relevant guidance. Providing oversight and direction on design decisions, contributing to programme-level governance and design assurance. Identifying and proposing solutions to design challenges using user-centred, co-design, and innovative approaches. Advising senior programme leadership on the prioritisation of requirements at both individual and epic levels. Supporting Discovery phases to ensure programmes are ready for mobilisation and delivery. Outside IR35 - DV Cleared Strategic Service Design Lead - 3-6 months+ - Remote Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our Data Protection Policy which can be found on our website. Please note that no terminology in this advert is intended to discriminate on the grounds of a person's gender, marital status, race, religion, colour, age, disability or sexual orientation. Every candidate will be assessed only in accordance with their merits, qualifications and ability to perform the duties of the job. Damia Group is acting as an Employment Business in relation to this vacancy and in accordance to Conduct Regulations 2003.
Palantir Foundry Data Engineer - DV Cleared NEW CONTRACT OPPORTUNITY FOR A PALANTIR FOUNDRY DATA ENGINEER TO WORK ON A NATIONAL SECURITY PROJECT IN LONDON WITH DV CLEARANCE - Contract role in London for a Palantir Foundry Data Engineer - Must hold DV Security Clearance - Central London based - Daily rate up to £800 - Hybrid position - To apply, email: (see below) or call Who we are We are seeking an experienced Palantir Foundry Data Engineer with current DV clearance to join a high-profile programme. This is a contract position offering hybrid working and a daily rate of up to £800 . In this role, you will be responsible for designing, developing, and optimising data pipelines and integrations within Palantir Foundry , ensuring data is efficiently processed, transformed, and made available for analysis and operational use. You will collaborate closely with analysts, data scientists, and business stakeholders to deliver robust, secure, and scalable data solutions. What we're looking for Key Responsibilities: Develop and maintain data pipelines and workflows in Palantir Foundry Integrate diverse data sources, ensuring data quality and integrity Optimise performance of data ingestion, transformation, and visualisation Collaborate with stakeholders to define requirements and deliver solutions Ensure security and compliance with DV-level clearance standards Skills & Experience: Current DV clearance (essential) Proven experience working with Palantir Foundry in complex environments Strong skills in data engineering, ETL processes, and data modelling Proficiency in relevant programming/Scripting languages (eg Python, SQL) Experience working with large-scale datasets in secure environments Strong problem-solving skills and stakeholder engagement abilities TO BE CONSIDERED . Please either apply by clicking online or emailing me directly to (see below) For further information please call me. I can make myself available outside of normal working hours to suit from 7am until 10pm. If unavailable, please leave a message and either myself or one of my colleagues will respond. By applying for this role, you give express consent for us to process & submit (subject to required skills) your application to our client in conjunction with this vacancy only. I look forward to hearing from you. PALANTIR FOUNDRY DATA ENGINEER - DV CLEARED
Oct 01, 2025
Contractor
Palantir Foundry Data Engineer - DV Cleared NEW CONTRACT OPPORTUNITY FOR A PALANTIR FOUNDRY DATA ENGINEER TO WORK ON A NATIONAL SECURITY PROJECT IN LONDON WITH DV CLEARANCE - Contract role in London for a Palantir Foundry Data Engineer - Must hold DV Security Clearance - Central London based - Daily rate up to £800 - Hybrid position - To apply, email: (see below) or call Who we are We are seeking an experienced Palantir Foundry Data Engineer with current DV clearance to join a high-profile programme. This is a contract position offering hybrid working and a daily rate of up to £800 . In this role, you will be responsible for designing, developing, and optimising data pipelines and integrations within Palantir Foundry , ensuring data is efficiently processed, transformed, and made available for analysis and operational use. You will collaborate closely with analysts, data scientists, and business stakeholders to deliver robust, secure, and scalable data solutions. What we're looking for Key Responsibilities: Develop and maintain data pipelines and workflows in Palantir Foundry Integrate diverse data sources, ensuring data quality and integrity Optimise performance of data ingestion, transformation, and visualisation Collaborate with stakeholders to define requirements and deliver solutions Ensure security and compliance with DV-level clearance standards Skills & Experience: Current DV clearance (essential) Proven experience working with Palantir Foundry in complex environments Strong skills in data engineering, ETL processes, and data modelling Proficiency in relevant programming/Scripting languages (eg Python, SQL) Experience working with large-scale datasets in secure environments Strong problem-solving skills and stakeholder engagement abilities TO BE CONSIDERED . Please either apply by clicking online or emailing me directly to (see below) For further information please call me. I can make myself available outside of normal working hours to suit from 7am until 10pm. If unavailable, please leave a message and either myself or one of my colleagues will respond. By applying for this role, you give express consent for us to process & submit (subject to required skills) your application to our client in conjunction with this vacancy only. I look forward to hearing from you. PALANTIR FOUNDRY DATA ENGINEER - DV CLEARED
LA International Computer Consultants Ltd
Leamington Spa, Warwickshire
SOC Manager 6 Month contract initially Based: Hybrid/Leamington & Gaydon - Hybrid as per business need Rate: £Market rates p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We have a great opportunity for a SOC Manager to join the team. As SOC Manager you will: * Oversee SOC activities by reviewing your team's performance metrics, incident reports and other key indicators * Lead incident response efforts when a security incident occurs, the SOC team has to respond as quickly as possible * Lead these efforts by establishing clear incident response procedures and protocols and conveying them to the team * Analyse incident reports to understand your organization's security posture by reviewing incident reports, SOC managers identify patterns and trends that may indicate weaknesses or vulnerabilities in their security defences * Serve as the point of contact (POC) for security incidents within the company. You are the primary liaison between the SOC team, other internal stakeholders, and external parties such as vendors, clients or regulatory bodies. * Be responsible for conducting information security investigations as a result of security incidents. These are previously identified by the Level 2 security analyst who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone) End to end security incident management. You will play a key role in providing the highest level of technical expertise and handling the most complex security incidents. Key Responsibilities: * Manage service and process improvements of SOC, auditing SOC incidents, identifying new use cases and automations * POC for SOC engineering team, threat intelligence analyst and Threat exposure management * Act as a point of escalation for Level-2 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques * Act as the lead coordinator to individual information security incidents * Mentor security analysts regarding risk management, information security controls, incident analysis, incident response, SIEM monitoring, and other operational tasks (tools, techniques, Procedures) in support of technologies managed by the Security Operations Centre. * Document incidents from initial detection through final resolution * Ensure threat management, threat modelling, identify threat vectors and develop use cases for security monitoring * Create reports, dashboards, metrics for SOC operations and presentation to Sr. Mgmt. * Act as focal point for any investigations involving security; to prepare reports and note follow up action * Participate in the role of Incident Manager during any incidents and emergencies * Ensure that all business recovery/contingency plans and/or procedures held within the security control rooms are always kept up to date * Coordinate with IT teams on escalations, tracking, performance issues, and outages Key skills & experience: * Strong knowledge in Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) and SOC advancements such as EDR and SOAR * Good knowledge of SIEM technologies, like Google Chronicle, Splunk ES or QRadar * In-depth familiarity with security policies based on industry standards and best practices * Experienced within the information security field, with emphasis on security operations, incident management, intrusion analysis, security device installations, configuration, and troubleshooting (e. g., Firewall, IDS, etc.) * Experience in Log source integration and in Developing new correlation rules & Parser writing * Experienced in SOC automation development, cloud operations (e. g. AWS), Designing, building security operations centers and Regulatory Compliance * Ability to lead and communicate efficiently within a team environment along with Incident management process development and/or incident management experience * Solid understanding of information technology and information security required * Excellent communication and presentation skills with demonstrated skill in presenting analytical data effectively to varied audiences (including executives) * Ability to work well under pressure with differing levels of Management This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
Sep 26, 2025
Contractor
SOC Manager 6 Month contract initially Based: Hybrid/Leamington & Gaydon - Hybrid as per business need Rate: £Market rates p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We have a great opportunity for a SOC Manager to join the team. As SOC Manager you will: * Oversee SOC activities by reviewing your team's performance metrics, incident reports and other key indicators * Lead incident response efforts when a security incident occurs, the SOC team has to respond as quickly as possible * Lead these efforts by establishing clear incident response procedures and protocols and conveying them to the team * Analyse incident reports to understand your organization's security posture by reviewing incident reports, SOC managers identify patterns and trends that may indicate weaknesses or vulnerabilities in their security defences * Serve as the point of contact (POC) for security incidents within the company. You are the primary liaison between the SOC team, other internal stakeholders, and external parties such as vendors, clients or regulatory bodies. * Be responsible for conducting information security investigations as a result of security incidents. These are previously identified by the Level 2 security analyst who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone) End to end security incident management. You will play a key role in providing the highest level of technical expertise and handling the most complex security incidents. Key Responsibilities: * Manage service and process improvements of SOC, auditing SOC incidents, identifying new use cases and automations * POC for SOC engineering team, threat intelligence analyst and Threat exposure management * Act as a point of escalation for Level-2 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques * Act as the lead coordinator to individual information security incidents * Mentor security analysts regarding risk management, information security controls, incident analysis, incident response, SIEM monitoring, and other operational tasks (tools, techniques, Procedures) in support of technologies managed by the Security Operations Centre. * Document incidents from initial detection through final resolution * Ensure threat management, threat modelling, identify threat vectors and develop use cases for security monitoring * Create reports, dashboards, metrics for SOC operations and presentation to Sr. Mgmt. * Act as focal point for any investigations involving security; to prepare reports and note follow up action * Participate in the role of Incident Manager during any incidents and emergencies * Ensure that all business recovery/contingency plans and/or procedures held within the security control rooms are always kept up to date * Coordinate with IT teams on escalations, tracking, performance issues, and outages Key skills & experience: * Strong knowledge in Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) and SOC advancements such as EDR and SOAR * Good knowledge of SIEM technologies, like Google Chronicle, Splunk ES or QRadar * In-depth familiarity with security policies based on industry standards and best practices * Experienced within the information security field, with emphasis on security operations, incident management, intrusion analysis, security device installations, configuration, and troubleshooting (e. g., Firewall, IDS, etc.) * Experience in Log source integration and in Developing new correlation rules & Parser writing * Experienced in SOC automation development, cloud operations (e. g. AWS), Designing, building security operations centers and Regulatory Compliance * Ability to lead and communicate efficiently within a team environment along with Incident management process development and/or incident management experience * Solid understanding of information technology and information security required * Excellent communication and presentation skills with demonstrated skill in presenting analytical data effectively to varied audiences (including executives) * Ability to work well under pressure with differing levels of Management This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.