- Monitoring and triaging alerts across secure client environments
- Investigating threats using logs, network traffic, and endpoint telemetry
- Supporting response efforts during live security incidents
- Improving detection rules, playbooks, and tooling with MITRE ATT&CK-driven enhancements
- Producing clear incident reports for both technical and non-technical audiences
- Contributing to threat intelligence initiatives
- Staying ahead of the curve on emerging threats, tactics, and techniques
- Proven experience in a Security Operations Centre (SOC) environment
- Hands-on knowledge of SIEM tools (Microsoft Sentinel, Splunk, etc.)
- Familiarity with MITRE ATT&CK and threat detection methodologies
- Strong analytical mindset with log, endpoint, and network analysis skills
- Understanding of network protocols (TCP/IP, DNS, HTTP, SMTP)
- Awareness of enterprise security architecture: firewalls, AV, VPNs, IDS/IPS
- Eligible for DV Clearance – British citizens who have resided in the UK for the past 10 years