Are you ready to take your SOC expertise to the next level? We are seeking a dynamic and highly capable SOC Shift Lead to support and secure critical infrastructure within the exciting Aerospace, Defence, and Security sector.
This is an exceptional opportunity to lead a team of talented analysts, manage incident triage, and drive operational excellence in a mission-critical environment.
It would be highly desirable if you have SC clearance and also be eligible and be prepared to be put through the process for DV Clearance
This role offers a unique shift-based schedule: 2 days (6am–6pm), 2 nights (6pm–6am), followed by 4 days off—providing an excellent work-life balance.
To be considered for this role you will need to have
- Proven experience in a Security Operations Centre (SOC) environment (SOC Level 2)
- Previous people management or line management experience
- Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk
- Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis
- In-depth understanding of:
- Client-server applications and multi-tier web environments
- Relational databases, firewalls, VPNs, enterprise AntiVirus solutions
- Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP)
It would also be desirable if you were to have
- Experience in static malware analysis and reverse engineering
- Any scripting or programming with Python, Perl, Bash, PowerShell, or C++
- Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1
- Familiarity with additional SIEM technologies, especially QRadar
The successful SOC Shift Lead, you will ensure the seamless operation and continual enhancement of SOC processes and personnel. This pivotal role involves safeguarding client systems while guiding your team through sophisticated cyber defence challenges.
The Soc Shift Leader would be tasked with
- Monitoring, triaging, and investigating alerts across host and network security systems
- Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities
- Providing line management to SOC Analysts—developing their skills and supporting career progression
- Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage
- Analysing and optimising detection rules and use cases based on Mitre Att&ck
- Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies
- Acting as a representative of the SOC in key meetings and internal stakeholder engagements
- Working shifts from the on-site SOC in Hemel Hempstead
You will be joining an organisation that is at the forefront of delivering cutting-edge digital solutions to Central Government clients and you would be contributing meaningfully to the UK’s most complex safety- and security-critical environments.
On offer is a great salary with benefits that include 25 days annual leave, health cash plan, life assurance, pension scheme, and a generous flexible benefits fund