Copyright © 2026

Above analytics are generated algorithmically based on job titles and may not always be the same as the company's job classification. You can also check detailed occupation eligibility, and salary criteria on our UK Visa Eligible Occupations & Salary Thresholds page.
Disclaimer: Hunt UK Visa Sponsors aggregates job listings from publicly available sources, such as search engines, to assist with your job hunting. We do not claim affiliation with Eames Consulting. For the most up-to-date job details, please visit the official website by clicking "Apply Now."
We are seeking an experienced Cyber Security Analyst to join our team on an initial six-month contract, playing a key role in strengthening our security operations capability. £350 per day INSIDE IR35
MUST BE ABLE TO START BY 13TH FEBRUARY
This role sits at the core of our SOC and SIEM services, with a strong focus on governance, oversight, and continuous improvement across incident detection and response. You will also support the Cyber Threat Intelligence (CTI) function, help ensure the ongoing effectiveness of security controls, and assist with shared team mailbox management.
If you have a strong SOC background and enjoy working across technical, operational, and governance domains, this is an excellent opportunity to broaden your impact.
What You’ll Be Doing
Incident Detection and Response
Oversee SOC responses to alerts from SIEM and other security tooling
Act as an escalation point for triage, investigation, and real-time incident response
Conduct investigations and root cause analysis
Lead lessons-learned sessions following incidents and near misses
Support the onboarding of new log sources and the development of SIEM use cases
Threat Intelligence and Analysis
Analyse threat intelligence feeds and correlate findings with internal data
Identify emerging threats and recommend proactive mitigation strategies
Support CTI resources to ensure a consistent, high-quality service
Collaboration and Communication
Work closely with SOC analysts, CTI teams, IT teams, and external partners
Clearly communicate incident status, impact, and remediation to stakeholders
Assist with shared team mailbox management, including approvals and queries
Documentation and Reporting
Ensure the operation and attestation of ISAE3000 controls within Cyber Security
Maintain detailed incident records and post-incident reporting
Contribute to the development and maintenance of incident response playbooks and runbooks
Provide oversight and reporting against agreed SLAs, KPIs, and KRIs
Continuous Improvement
Participate in incident response exercises and simulations
Recommend improvements to detection, response, and recovery processes
You’ll Enjoy This Role If You
Take pride in proactively identifying and managing cyber threats
Are driven to improve cyber security capabilities and maturity
Enjoy collaborating with stakeholders and advising on security matters
Value ownership and accountability as a key contact for SOC and SIEM operations
Appreciate the importance of governance, compliance, and operational resilience
What We’re Looking For
Proven experience in cyber security incident response and/or SOC operations
Strong understanding of network protocols, operating systems, and security technologies
Hands-on SIEM experience, particularly Microsoft Sentinel
Knowledge of the MITRE ATT&CK framework and threat hunting methodologies
Ability to work under pressure and manage multiple incidents simultaneously
Strong analytical, problem-solving, and communication skills