CrawlJobs Logo

SOC Deployment Specialist

dynamicsearch.co.uk Logo

Dynamic Search Solutions

Location Icon

Location:
United Kingdom

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

45000.00 - 50000.00 GBP / Year

Job Description:

An exciting opportunity at an award-winning Microsoft Partner for a SOC Deployment Specialist. The organisation is a fast-growing Managed Security Service Provider (MSSP) delivering Microsoft-native SOC services to public sector, government, and enterprise customers.

Job Responsibility:

  • Lead the deployment of Microsoft Sentinel for new customers, ensuring SOC readiness from day one
  • Integrate Microsoft Defender technologies (Defender XDR, Defender for Endpoint, Defender for Cloud, Defender for Identity) with Sentinel to deliver unified threat visibility
  • Work closely with SOC analysts to ensure detections are relevant, actionable, and aligned to SOC operating procedures
  • Engage directly with customer stakeholders to gather requirements, explain SOC capabilities, and support successful service onboarding
  • Validate data sources, detection coverage, and alert quality to ensure deployments meet operational and SLA requirements
  • Support transition of deployed environments into business-as-usual SOC operations, providing documentation and technical handover
  • Assist with tuning, optimisation, and ongoing improvement of customer SOC environments post-deployment

Requirements:

  • Hands-on experience deploying Microsoft Sentinel within a SOC or MSSP environment
  • Strong operational knowledge of the Microsoft security stack, including: Microsoft Defender XDR, Defender for Endpoint, Defender for Cloud, Entra ID (Azure Active Directory) and Microsoft 365 security tooling
  • Solid understanding of SOC operations, alert triage, and incident response workflows
  • Proven experience working in customer-facing roles, with the ability to communicate clearly with both technical teams and non-technical stakeholders
  • Strong understanding of cloud, identity, and endpoint security in Microsoft Azure environments
  • Eligibility for SC and NPPV3 security clearance
What we offer:
  • Opportunity to work with cutting-edge Microsoft security technologies
  • Strong emphasis on training and certification

Additional Information:

Job Posted:
February 13, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Deployment Specialist

DevOps Automation Specialist (SOC)

This job description provides a high-level review of the types of work performed...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5-8 years of relevant experience
  • Bachelor's Degree or higher preferred
  • Advanced proficiency with Microsoft Office tools and software
  • Experience utilizing a SOAR platform with SIEM and case management solution
  • Experience with various scripting languages - Python, PHP, etc.
  • Experience working in a SOC environment and familiar with SOC Incident Response process
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Team player with the ability to work independently
Job Responsibility
Job Responsibility
  • Work closely with the Security Operations Center (SOC) and Security Engineering teams to implement and improve existing SOC process automation
  • Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
  • Enhance current deployment of commercial tools used by Security Operations Center.
  • Evaluate new technologies against SOC requirements in proof of concept
  • Fulltime
Read More
Arrow Right
New

Cyber Security IAM & PKI Specialist

At Bombardier, we design, build and maintain the world’s peak-performing aircraf...
Location
Location
Canada , Dorval; Mississauga
Salary
Salary:
Not provided
bombardier.com Logo
Bombardier
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • You hold a bachelor’s degree in cyber security, information security, computer science, or relevant field of study.
  • You have over 6 years of experience with identity lifecycle management (Joiner/Mover/Leaver), access governance, and least‑privilege access models.
  • You have a strong knowledge of authentication and authorization protocols (SAML, OAuth 2.0, OpenID Connect, LDAP, Kerberos).
  • You have hands‑on experience with enterprise IAM (Identity & Access Management) platforms (e.g., Azure Entra ID, SailPoint, Okta, CyberArk, MFA).
  • You have proven experience designing, operating, and evolving enterprise PKI (Public Key Infrastructure) environments (internal and public CAs).
  • You have a strong understanding of certificate lifecycle management, TLS/SSL, and cryptographic trust models.
  • You have experience securing non‑human identities such as applications, services, workloads, and APIs.
  • You have experience with human identities in medium to high trust environments such as formal digital signature of documents and software.
  • You are familiar with key management practices, HSMs (Hardware Security Modules), and cloud‑native key services.
  • You have experience integrating IAM (Identity & Access Management) and PKI signals into SIEM/XDR platforms.
Job Responsibility
Job Responsibility
  • Identity Architect - Act as the SME (Subject Matter Expert) for the identity technology stack, plan and prioritize the technology roadmap, track deployments.
  • PKI (Public Key Infrastructure) Specialist - Own, develop and drive the current state and future state plan for PKI.
  • Identity Threat Engineer/Specialist - Collaborate with the SOC (Security Operations Centre) to mature and enhance telemetry, processes and response to cyber threats.
What we offer
What we offer
  • Insurance plans (Dental, medical, life insurance, disability, and more)
  • Competitive base salary
  • Retirement savings plan
  • Employee Assistance Program
  • Tele Health Program
  • Fulltime
Read More
Arrow Right

IT Security Specialist

Amla Commerce is looking for an experienced IT Security Specialist to join our t...
Location
Location
United States , Milwaukee
Salary
Salary:
Not provided
amla.io Logo
Amla Commerce
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Technology, or a related field
  • Minimum 2 Years of relevant work experience
  • Proven experience in infrastructure security, manual penetration testing, vulnerability assessment, and web application security
  • Strong knowledge of penetration testing tools and frameworks, including Burp Suite, Owasp Zap, and Metasploit Framework
  • Familiarity with OWASP Top 10 vulnerabilities and best practices for securing web applications
  • Experience with IDS/IPS tools for monitoring and preventing intrusions
  • Familiarity with wireless/Wi-Fi security protocols, encryption standards, and best practices
  • Knowledge of network and system security protocols, technologies, and best practices
  • Strong problem-solving skills and ability to think strategically about security risks and solutions
  • Excellent communication and interpersonal skills to effectively collaborate with cross-functional teams and stakeholders
Job Responsibility
Job Responsibility
  • Conduct manual penetration testing of infrastructure systems, networks, and applications to identify security vulnerabilities and potential risks
  • Utilize various penetration testing tools such as Nmap, Nessus, Burp Suite, Owasp Zap, and Metasploit Framework to identify and exploit vulnerabilities
  • Perform vulnerability assessments using both manual approaches and vulnerability assessment and penetration testing (VAPT) tools like Nessus, OpenVAS, and Qualys
  • Collaborate with the development team to enhance the security of web applications by implementing secure coding practices and addressing OWASP Top 10 vulnerabilities
  • Configure and manage web application firewalls (WAF) to protect against common web-based attacks
  • Implement and maintain infrastructure firewalls, ensuring that proper configurations are in place to protect the network and systems from unauthorized access
  • Manage IP access control lists and handle blocking/unblocking requests as per security policies
  • Ensure compliance with SOC (Security Operations Center) standards and participate in audits and assessments
  • Provide end user system security by deploying and managing antivirus solutions, conducting security awareness training, and responding to security incidents
  • Stay up-to-date with the latest security threats, vulnerabilities, and industry best practices to proactively identify potential risks and recommend mitigation strategies
Read More
Arrow Right

SIEM Content Development Specialist

The SIEM Content Development Specialist plays a critical role in advancing the C...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 2-5 years’ experience in SIEM content (rule logic and code) development role
  • Minimum of 2 years of SOC analyst experience (Level2 or above) required
  • In depth and extensive hands-on experience in security event analysis, create and refine SIEM/EDR rules and deliver efficiency within the SIEM and all other technologies used within the team
  • Deep knowledge of IPv4/IPv6, TCP networking protocols
  • Deep knowledge of Windows/Linux operating systems
  • Exceptional working knowledge of security technologies such as SIEM (ArcSight, Sentinel, QRadar, LogRhythm, Splunk), EDR (Microsoft Defender, FireEye, Tanium), IDS/IPS, firewalls, proxies, web application firewalls, anti-virus, etc.
  • Comprehensive understanding of Window Security Event logs and Syslog
  • Excellent familiarity with endpoint/perimeter security attack vectors and detection (blue/purple teaming)
  • Excellent familiarity with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies
  • Outstanding knowledge of cloud platforms such as Azure, O365, Google cloud, AWS, Oracle
Job Responsibility
Job Responsibility
  • Contribute to continuous improvement initiatives across multiple technologies by developing and refining content that enhanced threat detection and response capabilities
  • Contribute to the development and optimisation of threat detection content, including the tuning of threat and vulnerability management technologies and the continual refinement of SIEM rules and logic to enhance detection accuracy and operational performance
  • Lead and contribute to the optimisation and modernisation of SIEM content, supporting the adoption of next-generation SIEM technologies and cloud-native security tools
  • Manage the lifecycle of detection content, including development, testing, release, and retirement, using version control and documentation best practices
  • Collaborate with DevOps/SecOps teams to integrate security content into broader CI/CD workflows
  • Collaborate with the CSOC Manager to support improvements in security operations through effective content contributions
  • Support security event analysis by participating in and may drive security event analysis activities to address current cyber threats
  • Assist in threat response activities, providing analytical input from a blue team perspective to help identify potential threat group behaviours
  • Contribute to the creation of cyber security reports and advisories, ensuring timely and accurate dissemination to key stakeholders
  • Participate in residual risk assessments, supporting post-incident analysis and the documentation of operational and technical lessons learned
What we offer
What we offer
  • Yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity leave: 52 weeks: the first 13 weeks are fully paid, followed by 26 weeks of half pay
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
  • Fulltime
Read More
Arrow Right

Cloud Defensive Security Engineer

As a Defensive Security Engineer, you will be part of the Cloud Defense team wit...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
adevinta.com Logo
Adevinta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong hands-on experience designing, operating and troubleshooting Elastic deployments in production (on-prem or cloud-managed)
  • Experience building and operating log/telemetry pipelines into Elastic (Filebeat/Metricbeat/other Beats, Elastic Agent, Logstash, ingest pipelines)
  • Proficiency with Kibana: dashboards, visualisations, Lens, saved searches, alerting and spaces
  • Solid understanding of distributed systems basics relevant to Elastic (indexing, sharding, replication, cluster health)
  • Elastic Certified Engineer (or equivalent depth of experience), however certification is a plus
  • Experience with infrastructure-as-code (e.g. Terraform, Ansible, CloudFormation) to deploy and manage infrastructure
  • Experience with CI/CD pipelines (GitHub Actions, Jenkins, etc…) to automate configuration and infrastructure deployments
  • Hands-on experience with Linux systems, containers and Kubernetes (EKS or vanilla deployments)
  • Experience with public cloud environments, preferably AWS and/or GCP (cloud logging, IAM basics, network fundamentals)
  • Good understanding of core security and SOC concepts: logs vs events vs alerts, detections, triage and investigations
Job Responsibility
Job Responsibility
  • Redesign, evolve and operate our Elastic stack (Elasticsearch, Kibana, Elastic Security/Observability) as a core part of the Defensive platform
  • Own the ingestion pipelines for security and infrastructure telemetry (e.g. AWS/GCP audit logs, EDR telemetry, OS/syslog from Linux fleets and key application logs from our core products), including Beats/Agents, ingest pipelines and index lifecycle management
  • Pragmatically optimise Elastic for performance, scalability, cost and reliability (index strategy, shard planning, hot/warm/cold, retention policies)
  • Define and maintain standards and templates for indices, data streams, mappings and dashboards
  • Implement and maintain detection content in Elastic (KQL/EQL queries, rules, anomaly jobs) following defense-as-code practices: versioning, code reviews, testing and CI/CD
  • Collaborate with engineering teams, SOC and Incident Response to translate threat scenarios and cloud/runtime risks into Elastic rules, alerts and dashboards
  • Improve detections to reduce false positives and improve signal quality, based on feedback from SOC, IR and product teams
  • Contribute to internal tooling that improves detection engineering (e.g. shared rule templates, test harnesses, linters, rule packaging)
  • Manage Elastic infrastructure, data pipelines, and content deployments using IaC tools (Terraform, CloudFormation) and CI/CD platforms (GitHub Actions, Argo CD)
  • Integrate Elastic with other security and cloud services (e.g. EDR agents, cloud-native security tools, ticketing, notification channels, SOAR) to support end-to-end defensive workflows
What we offer
What we offer
  • An attractive Base Salary
  • Participation in our Short Term Incentive plan (annual bonus)
  • Work From Anywhere: Enjoy up to 20 days a year of working from anywhere
  • A 24/7 Employee Assistance Program for you and your family
  • Fulltime
Read More
Arrow Right

Senior Specialist Operational Technology Security

SIG is a leading provider of packaging systems and solutions. We work in partner...
Location
Location
Salary
Salary:
Not provided
sig.biz Logo
SIG Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Cybersecurity, Electrical/Mechanical Engineering, or related field
  • 3+ years of combined OT engineering and cybersecurity experience, including work in Aseptic & Chilled or BiB environments
  • Hands-on expertise with SCADA, PLC, DCS platforms and industrial protocols (Modbus, DNP3, OPC, Ethernet/IP)
  • Proven ability to implement and manage OT security frameworks (IEC 62443, NIST CSF, ISO 27001)
  • Experience with vulnerability assessment and penetration testing tools for OT (e.g., Nozomi, Claroty, SCADAfence)
  • Strong understanding of network segmentation, firewalls, IDS/IPS in industrial settings
  • Solid grasp of automation, mechanical, and electrical control systems
  • Excellent analytical, problem-solving, and communication skills
Job Responsibility
Job Responsibility
  • Discover and catalog OT assets, build and maintain accurate asset inventories, and develop and maintain full asset lifecycle management
  • Conduct risk management and vulnerability management on OT networks, devices, and processes
  • Collaborate with IT, Production, engineering, QC, and maintenance teams for the vulnerability management implementation
  • Extend IT security processes to OT environments. Develop, document, and enforce Global OT security policies and procedures aligned to IEC 62443, NIST CSF, and ISO 27001
  • Design and implement network segmentation, zone-based firewalls, and secure architectures for OT environments
  • Deploy and manage OT-focused security tools (Cyber Physical System Protection Platform) to detect and mitigate advanced threats
  • Coordinate with the global SOC for security incident and event monitoring and analysis in OT operations, including plan and execute penetration tests and red team exercises in OT landscapes
  • Supplier relationships security management and embedding security requirements into contracts
  • Define and roll out a global Secure Development Lifecycle (SDLC) for OT environment
  • Provide training and awareness sessions on secure OT practices and emergency response protocols
What we offer
What we offer
  • Competitive compensation
  • Opportunity to partially work from home
  • Part of a globally successful international company
  • Real work, real experience, real opportunities to build skills
  • Part of a highly motivated and dynamic team
  • Personal development opportunities
  • Trainings and coaching opportunities from senior team members
Read More
Arrow Right

SOC Solutions Engineer - QRadar and Splunk

Join a leading Managed Service Provider as a SOC Solutions Engineer specializing...
Location
Location
United Kingdom , Birmingham; London; Glasgow
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be able to obtain SC Clearance or already hold SC clearance
  • Hands-on experience of IBM QRadar
  • Strong knowledge of log formats, parsing, and normalization
  • Experience with KQL, SPL, AQL, or other SIEM query languages
  • Familiarity with scripting (Python, PowerShell) for automation and enrichment
  • Deep understanding of threat detection, incident response, and cyber kill chain
  • Familiarity with MITRE ATT&CK, NIST, and CIS frameworks
  • Strong verbal and written English communication
  • Strong interpersonal and presentation skills
  • Strong analytical skills
Job Responsibility
Job Responsibility
  • Deploy, configure, and maintain SIEM platforms (Splunk, QRadar, Sentinel, Defender, Chronicle)
  • Onboard and normalize log sources across cloud and on-prem environments
  • Develop and optimize analytical rules for threat detection, anomaly detection, and behavioural analysis
  • Design and implement incident response playbooks for various threat scenarios (e.g., phishing, lateral movement, data exfiltration)
  • Integrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to automate triage and response
  • Continuously refine playbooks based on threat intelligence and incident feedback
  • Monitor and analyse security alerts and events to identify potential threats
  • Perform in-depth investigations and coordinate incident response activities
  • Collaborate with threat intelligence teams to enrich detection logic
  • Conduct threat modelling exercises using frameworks like MITRE ATT&CK, STRIDE, or Kill Chain
What we offer
What we offer
  • Range of tailored benefits that support your physical, emotional, and financial wellbeing
  • Continuous growth and development opportunities
  • Flexible work options
  • Inclusive work environment
  • Range of Inclusion Networks such as: the Women’s Business Network, Cultural and Ethnicity Network, LGBTQ+ & Allies Network, Neurodiversity Network and the Parent Network
  • Fulltime
Read More
Arrow Right

Manager, Corporate IT

As the Manager of Corporate IT, you'll lead our global IT infrastructure, servic...
Location
Location
Canada , Vancouver
Salary
Salary:
117600.00 - 145200.00 CAD / Year
dialpad.com Logo
Dialpad
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8-10 years of progressive experience in Information Technology, Infrastructure Management, or Corporate IT Security
  • Demonstrated experience managing scalable IT infrastructure and security programs within a SaaS company is highly preferred
  • 3-5 years of experience successfully managing and leading a technical team, preferably in a global environment
  • A customer-service mindset with a focus on delivering high-quality user experiences
  • Proven experience in operating and managing security, automation technology, and automation programs
  • Experience in configuring, deploying, and leading: Implementation and governance of cloud-based identity and access management (IAM) and identity provider (IdP), including Okta, Google Workspace, SSO, SAML, and SCIM across enterprise environments
  • Mobile Device Management systems (MDM), such as Jamf, Kandji, Microsoft Intune
  • Administration of core enterprise SaaS platforms (e.g., Google Workspace, Atlassian), including provisioning automations and integration workflows
  • IT assets including endpoints, office networking, and A/V conferencing systems
  • Demonstrated ability to own and deliver complex, cross-functional IT projects
Job Responsibility
Job Responsibility
  • Lead, mentor, and manage a current global team of six (6) IT specialists, fostering a culture of high performance, collaboration, and continuous improvement
  • Conduct performance reviews, identify training opportunities, and manage career development plans for direct reports
  • Oversee and coordinate all IT service delivery and support across 11 international office locations and the distributed remote workforce, ensuring consistent quality and availability of services
  • Partner effectively with various departments (e.g., HR, Finance, Facilities/Workplace) globally to understand their IT needs, align service delivery, and support business objectives
  • Take ownership of major IT projects from initiation through deployment, ensuring they are delivered on time, within budget, and meet established technical and business requirements
  • Oversee the design, implementation, and maintenance of all corporate IT infrastructure, including networking, servers (on-premises and cloud), telecommunications, and end-user computing
  • Ensure the efficient operation and continuous improvement of the global IT service desk, focusing on high service levels and user satisfaction
  • Develop and execute the long-term technology roadmap for corporate IT, ensuring it scales with the company's growth and remains current with industry best practices and technology innovations (e.g., AI, Agentic AI)
  • Partner closely with the Security team to design, deploy, and operate robust IT security solutions, ensuring the protection of corporate infrastructure and data
  • Collaborate with the Security team in supporting threat detection and response processes within the Corporate IT environment
What we offer
What we offer
  • Competitive benefits and perks
  • Robust training program
  • Inclusive office environment
  • Recognized Great Place to Work culture
  • Fulltime
Read More
Arrow Right