CrawlJobs Logo

SOC Deployment Specialist

dynamicsearch.co.uk Logo

Dynamic Search Solutions

Location Icon

Location:
United Kingdom

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

45000.00 - 50000.00 GBP / Year

Job Description:

An exciting opportunity at an award-winning Microsoft Partner for a SOC Deployment Specialist. The organisation is a fast-growing Managed Security Service Provider (MSSP) delivering Microsoft-native SOC services to public sector, government, and enterprise customers.

Job Responsibility:

  • Lead the deployment of Microsoft Sentinel for new customers, ensuring SOC readiness from day one
  • Integrate Microsoft Defender technologies (Defender XDR, Defender for Endpoint, Defender for Cloud, Defender for Identity) with Sentinel to deliver unified threat visibility
  • Work closely with SOC analysts to ensure detections are relevant, actionable, and aligned to SOC operating procedures
  • Engage directly with customer stakeholders to gather requirements, explain SOC capabilities, and support successful service onboarding
  • Validate data sources, detection coverage, and alert quality to ensure deployments meet operational and SLA requirements
  • Support transition of deployed environments into business-as-usual SOC operations, providing documentation and technical handover
  • Assist with tuning, optimisation, and ongoing improvement of customer SOC environments post-deployment

Requirements:

  • Hands-on experience deploying Microsoft Sentinel within a SOC or MSSP environment
  • Strong operational knowledge of the Microsoft security stack, including: Microsoft Defender XDR, Defender for Endpoint, Defender for Cloud, Entra ID (Azure Active Directory) and Microsoft 365 security tooling
  • Solid understanding of SOC operations, alert triage, and incident response workflows
  • Proven experience working in customer-facing roles, with the ability to communicate clearly with both technical teams and non-technical stakeholders
  • Strong understanding of cloud, identity, and endpoint security in Microsoft Azure environments
  • Eligibility for SC and NPPV3 security clearance
What we offer:
  • Opportunity to work with cutting-edge Microsoft security technologies
  • Strong emphasis on training and certification

Additional Information:

Job Posted:
February 13, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Deployment Specialist

Technical Account Specialist - SOC

The Technical Account Specialist - SOC role at NTT DATA involves implementing an...
Location
Location
India , Mumbai
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Extensive experience and hands-on knowledge implementing, configuring, and integrating enterprise SOC solutions
  • Strong design, deployment, and integration capabilities on Cisco NBA solution
  • Strong design, deployment, and integration capabilities on ForcePoint and McAfee DLP solutions
  • Strong design, deployment, and integration capabilities on Qradar and RSA MDR/SIEM solutions
  • Strong design, deployment, and integration capabilities on PAN Corex XOAR, Cyware SOAR solutions
  • Ability to manage software upgrade, patching of the NBA solutions
  • Excellent ability to investigate and review cyber alerts, identify relevant IOCs and TTPs in support of threat prevention and detection development
  • Research, build and maintain detection capabilities for the latest threats across SIEM correlations and security tool signatures
  • Strong support and integration ability with threat intelligence / incident response / overall cyber defence strategy as needed
  • Generate high quality documentation of research and analysis results, including findings and recommended processes to technical and non-technical audiences clearly and concisely
Job Responsibility
Job Responsibility
  • Design, implement and troubleshoot the security solutions deployment across NTT’s client network.
  • Collaborate with client support team and other cross-functional teams to ensure efficient and reliable services are delivery to the clients.
  • Fulltime
Read More
Arrow Right

Security Engineer

As a SOC Engineer at NTT DATA, you will play a crucial role in defending clients...
Location
Location
United Kingdom , Birmingham
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven hands-on experience with SIEM platforms such as Splunk, QRadar, Sentinel, Microsoft Defender, or Chronicle
  • Expertise with SIEM query languages (e.g., KQL, SPL, AQL) and strong knowledge of log normalization and parsing
  • Proficiency in scripting (e.g., Python, PowerShell) to automate tasks and build SOC efficiencies
  • Deep familiarity with cyber threat detection techniques related to frameworks like MITRE ATT&CK and vulnerability management
  • Experience managing ITIL processes, including Incident, Problem, and Change Management
  • CISSP, GIAC, SC-200, Splunk Power User/Admin, QRadar Specialist, or Chronicle Security Engineer certifications preferred
  • Candidates must be eligible to obtain UK SC clearance
  • Strong analytical and communication skills to present complex information to technical and non-technical stakeholders
  • Experienced in collaborative team dynamics and independent problem-solving
  • Proven ability to transfer knowledge and mentor junior SOC team members effectively
Job Responsibility
Job Responsibility
  • Deploy, configure, and maintain SIEM platforms such as Splunk, QRadar, Sentinel, and Chronicle to enable robust threat detection
  • Normalize and onboard diverse log sources from cloud and on-premises environments for seamless monitoring
  • Develop and continually refine SIEM rules and queries for use cases involving advanced threat behaviors and anomaly detection
  • Design and implement incident response playbooks for threats such as phishing, lateral movement, malware infections, and more
  • Integrate response automation into SOAR platforms (e.g., XSOAR, Azure Logic Apps), reducing response times and manual overhead
  • Use feedback from simulated incidents and threat intelligence to refine existing playbooks and workflows
  • Monitor security alerts for potential threats, investigate incidents, and coordinate cross-team response activities
  • Collaborate with threat intelligence teams to enhance detection logic and fine-tune resolution processes
  • Perform root-cause analysis (RCA) of recurring incidents and help define corrective actions to reduce future risks
  • Perform threat modeling using industry frameworks such as MITRE ATT&CK, STRIDE, or the Cyber Kill Chain
What we offer
What we offer
  • We offer a range of tailored benefits that support your physical, emotional, and financial wellbeing
  • Our Learning and Development team ensure that there are continuous growth and development opportunities for our people
  • We also offer the opportunity to have flexible work options
Read More
Arrow Right

Cyber Security IAM & PKI Specialist

At Bombardier, we design, build and maintain the world’s peak-performing aircraf...
Location
Location
Canada
Salary
Salary:
Not provided
bombardier.com Logo
Bombardier
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • You hold a bachelor’s degree in cyber security, information security, computer science, or relevant field of study
  • You have over 6 years of experience with identity lifecycle management (Joiner/Mover/Leaver), access governance, and least‑privilege access models
  • You have a strong knowledge of authentication and authorization protocols (SAML, OAuth 2.0, OpenID Connect, LDAP, Kerberos)
  • You have hands‑on experience with enterprise IAM platforms (e.g., Azure Entra ID, SailPoint, Okta, CyberArk, MFA)
  • You have proven experience designing, operating, and evolving enterprise PKI environments (internal and public CAs)
  • You have a strong understanding of certificate lifecycle management, TLS/SSL, and cryptographic trust models
  • You have experience securing non‑human identities such as applications, services, workloads, and APIs
  • You have experience with human identities in medium to high trust environments such as formal digital signature of documents and software
  • You are familiar with key management practices, HSMs, and cloud‑native key services
  • You have experience integrating IAM and PKI signals into SIEM/XDR platforms
Job Responsibility
Job Responsibility
  • Identity Architect - Act as the SME (Subject Matter Expert) for the identity technology stack, plan and prioritize the technology roadmap, track deployments
  • PKI (Public Key Infrastructure) Specialist - Own, develop and drive the current state and future state plan for PKI
  • Identity Threat Engineer/Specialist - Collaborate with the SOC (Security Operations Centre) to mature and enhance telemetry, processes and response to cyber threats
What we offer
What we offer
  • Insurance plans (Dental, medical, life insurance, disability, and more)
  • Competitive base salary
  • Retirement savings plan
  • Employee Assistance Program
  • Tele Health Program
  • Fulltime
Read More
Arrow Right

Cyber Security IAM & PKI Specialist

At Bombardier, we design, build and maintain the world’s peak-performing aircraf...
Location
Location
Canada , Dorval; Mississauga
Salary
Salary:
Not provided
bombardier.com Logo
Bombardier
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • You hold a bachelor’s degree in cyber security, information security, computer science, or relevant field of study.
  • You have over 6 years of experience with identity lifecycle management (Joiner/Mover/Leaver), access governance, and least‑privilege access models.
  • You have a strong knowledge of authentication and authorization protocols (SAML, OAuth 2.0, OpenID Connect, LDAP, Kerberos).
  • You have hands‑on experience with enterprise IAM (Identity & Access Management) platforms (e.g., Azure Entra ID, SailPoint, Okta, CyberArk, MFA).
  • You have proven experience designing, operating, and evolving enterprise PKI (Public Key Infrastructure) environments (internal and public CAs).
  • You have a strong understanding of certificate lifecycle management, TLS/SSL, and cryptographic trust models.
  • You have experience securing non‑human identities such as applications, services, workloads, and APIs.
  • You have experience with human identities in medium to high trust environments such as formal digital signature of documents and software.
  • You are familiar with key management practices, HSMs (Hardware Security Modules), and cloud‑native key services.
  • You have experience integrating IAM (Identity & Access Management) and PKI signals into SIEM/XDR platforms.
Job Responsibility
Job Responsibility
  • Identity Architect - Act as the SME (Subject Matter Expert) for the identity technology stack, plan and prioritize the technology roadmap, track deployments.
  • PKI (Public Key Infrastructure) Specialist - Own, develop and drive the current state and future state plan for PKI.
  • Identity Threat Engineer/Specialist - Collaborate with the SOC (Security Operations Centre) to mature and enhance telemetry, processes and response to cyber threats.
What we offer
What we offer
  • Insurance plans (Dental, medical, life insurance, disability, and more)
  • Competitive base salary
  • Retirement savings plan
  • Employee Assistance Program
  • Tele Health Program
  • Fulltime
Read More
Arrow Right

Senior SOC Engineer

At Paribu, every team member plays a crucial role in driving innovation and deli...
Location
Location
Türkiye , İstanbul
Salary
Salary:
Not provided
paribu.com Logo
Paribu
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Electronics Engineering, or related fields
  • 3+ years of IT security experience and relevant SOC Operations & Incident Management skills
  • Strong verbal and written communication skills in English
  • In-depth understanding of Incident Response methodologies and taxonomy
  • Proven experience in implementing SOC tools, including design, migration, implementation, and operation
  • Proficiency in using Security Analytics for threat detection
  • Hands-on experience with Splunk Enterprise Security tools
  • Strong knowledge of log sources (Windows Event Logs, Linux Syslog, Firewalls, IPS/IDS, EDR, DLP, Cloud Environments, etc.)
  • Proficiency in Splunk SPL Queries and ability to create unique dashboards, alerts, and correlation searches
  • Passionate about security technology and staying current with industry trends
Job Responsibility
Job Responsibility
  • Continuously monitoring emerging threats and Indicators of Compromise (IOCs), and proactively implementing timely detection and prevention measures
  • Developing and implementing threat modelling maps using the MITRE ATT&CK framework
  • Acting as a Level 3 Incident Response Specialist, providing pivotal support to SOC Analysts
  • Overseeing system triage activities to ensure efficient response and resolution
  • Playing a significant role in resilience activities against cybercrimes
  • Leading major SOC modernization projects, including adopting and implementing new technologies, managing large-scale migrations, and designing end-to-end processes
  • Architecting, deploying, managing, and securing SIEM, EDR, and Threat Intelligence systems
  • Establishing advanced correlation rules for various use cases to enhance detection capabilities
  • Creating and publishing data models to facilitate ease of access and analysis for data requestors
  • Building custom solutions to address specific security challenges
What we offer
What we offer
  • Meal allowance – Generous support with a flexible meal card
  • Private health insurance – Comprehensive coverage for employees, including spouse and children
  • Commuting support – Financial support for commuting based on your office route
  • S.O.S. leave (10 days) – Additional leave days up to 10 days per year for urgent and unexpected matters, apart from annual leave
  • Birthday leave – One extra day off during your birthday month
  • Language learning support – Resources to enhance English communication skills
  • Personal development support – Budget for exploring hobbies, attending professional courses, and personal growth
  • Well-being & health platform – Access to digital health and wellness services, including mental health support, and well-being resources
  • Relocation allowance – Financial support for relocation within a 15-km radius of the Paribu’s office
  • Top-tier work equipment – High-performance devices and all the essential tools you need to do your best work
  • Fulltime
Read More
Arrow Right

IT Security Specialist

Amla Commerce is looking for an experienced IT Security Specialist to join our t...
Location
Location
United States , Milwaukee
Salary
Salary:
Not provided
amla.io Logo
Amla Commerce
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Technology, or a related field
  • Minimum 2 Years of relevant work experience
  • Proven experience in infrastructure security, manual penetration testing, vulnerability assessment, and web application security
  • Strong knowledge of penetration testing tools and frameworks, including Burp Suite, Owasp Zap, and Metasploit Framework
  • Familiarity with OWASP Top 10 vulnerabilities and best practices for securing web applications
  • Experience with IDS/IPS tools for monitoring and preventing intrusions
  • Familiarity with wireless/Wi-Fi security protocols, encryption standards, and best practices
  • Knowledge of network and system security protocols, technologies, and best practices
  • Strong problem-solving skills and ability to think strategically about security risks and solutions
  • Excellent communication and interpersonal skills to effectively collaborate with cross-functional teams and stakeholders
Job Responsibility
Job Responsibility
  • Conduct manual penetration testing of infrastructure systems, networks, and applications to identify security vulnerabilities and potential risks
  • Utilize various penetration testing tools such as Nmap, Nessus, Burp Suite, Owasp Zap, and Metasploit Framework to identify and exploit vulnerabilities
  • Perform vulnerability assessments using both manual approaches and vulnerability assessment and penetration testing (VAPT) tools like Nessus, OpenVAS, and Qualys
  • Collaborate with the development team to enhance the security of web applications by implementing secure coding practices and addressing OWASP Top 10 vulnerabilities
  • Configure and manage web application firewalls (WAF) to protect against common web-based attacks
  • Implement and maintain infrastructure firewalls, ensuring that proper configurations are in place to protect the network and systems from unauthorized access
  • Manage IP access control lists and handle blocking/unblocking requests as per security policies
  • Ensure compliance with SOC (Security Operations Center) standards and participate in audits and assessments
  • Provide end user system security by deploying and managing antivirus solutions, conducting security awareness training, and responding to security incidents
  • Stay up-to-date with the latest security threats, vulnerabilities, and industry best practices to proactively identify potential risks and recommend mitigation strategies
Read More
Arrow Right

API Developer & Integration Specialist

We are seeking a highly skilled, self-directed Part-Time API Developer & Integra...
Location
Location
Salary
Salary:
Not provided
zazz.io Logo
Zazz
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Advanced, hands-on experience with one or more of: N8N, Zapier, Make (Integromat), Paragon, Keragon, or comparable middleware
  • Ability to architect multi-step, conditional, and error-handled automation workflows from scratch
  • Experience with trigger/action design, webhook configuration, and real-time vs. scheduled sync patterns
  • Deep expertise in RESTful API consumption, authentication methods (API keys, OAuth 2.0, JWT, Basic Auth), and API documentation interpretation
  • Experience integrating with platforms such as: HubSpot, Salesforce, Practice Fusion, JotForm, Airtable, Asana, Smartsheet, Egnyte, and similar enterprise SaaS tools
  • Proficiency with JSON/XML data transformation, field mapping, and schema normalization across disparate platforms
  • Strong scripting ability in at least one language (Python, JavaScript/Node.js, or similar) for custom API logic, data wrangling, and error handling
  • Working knowledge of Model Context Protocol (MCP) and experience deploying MCP packages to integrate AI capabilities into automated workflows
  • Familiarity with AI API platforms and how to route, format, and handle LLM-based inputs/outputs within integration pipelines
  • Strong understanding of secure API integration practices: secret management, token rotation, encrypted storage of credentials, and principle of least privilege
Job Responsibility
Job Responsibility
  • Design, build, and maintain API integrations between myriad SaaS platforms across multiple client environments and use cases
  • Leverage middleware platforms — including N8N, Zapier, Make (Integromat), Paragon, Keragon, and similar tools — to orchestrate multi-step automation workflows
  • Implement field and form mapping to push structured data between platforms (e.g., CRM to ERP, RMM to PSA, intake form to practice management system)
  • Develop and maintain integrations using RESTful APIs, webhooks, OAuth 2.0, and API token-based authentication
  • Build and deploy MCP (Model Context Protocol) package integrations to enable AI-assisted workflows and agentic automation
  • Ensure all integrations meet HIPAA, SOC 2, and ISO compliance requirements, with secure credential handling and appropriate data governance practices
  • Document integration architectures, data flows, field mappings, and credentials in a clear and maintainable format
  • Proactively identify inefficiencies in existing workflows and propose or implement improvements
  • Coordinate with internal stakeholders and clients to gather requirements and translate them into precise, executable integration specifications
  • Manage multiple integration projects concurrently with strong prioritization and clear communication
Read More
Arrow Right

SIEM Content Development Specialist

The SIEM Content Development Specialist plays a critical role in advancing the C...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 2-5 years’ experience in SIEM content (rule logic and code) development role
  • Minimum of 2 years of SOC analyst experience (Level2 or above) required
  • In depth and extensive hands-on experience in security event analysis, create and refine SIEM/EDR rules and deliver efficiency within the SIEM and all other technologies used within the team
  • Deep knowledge of IPv4/IPv6, TCP networking protocols
  • Deep knowledge of Windows/Linux operating systems
  • Exceptional working knowledge of security technologies such as SIEM (ArcSight, Sentinel, QRadar, LogRhythm, Splunk), EDR (Microsoft Defender, FireEye, Tanium), IDS/IPS, firewalls, proxies, web application firewalls, anti-virus, etc.
  • Comprehensive understanding of Window Security Event logs and Syslog
  • Excellent familiarity with endpoint/perimeter security attack vectors and detection (blue/purple teaming)
  • Excellent familiarity with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies
  • Outstanding knowledge of cloud platforms such as Azure, O365, Google cloud, AWS, Oracle
Job Responsibility
Job Responsibility
  • Contribute to continuous improvement initiatives across multiple technologies by developing and refining content that enhanced threat detection and response capabilities
  • Contribute to the development and optimisation of threat detection content, including the tuning of threat and vulnerability management technologies and the continual refinement of SIEM rules and logic to enhance detection accuracy and operational performance
  • Lead and contribute to the optimisation and modernisation of SIEM content, supporting the adoption of next-generation SIEM technologies and cloud-native security tools
  • Manage the lifecycle of detection content, including development, testing, release, and retirement, using version control and documentation best practices
  • Collaborate with DevOps/SecOps teams to integrate security content into broader CI/CD workflows
  • Collaborate with the CSOC Manager to support improvements in security operations through effective content contributions
  • Support security event analysis by participating in and may drive security event analysis activities to address current cyber threats
  • Assist in threat response activities, providing analytical input from a blue team perspective to help identify potential threat group behaviours
  • Contribute to the creation of cyber security reports and advisories, ensuring timely and accurate dissemination to key stakeholders
  • Participate in residual risk assessments, supporting post-incident analysis and the documentation of operational and technical lessons learned
What we offer
What we offer
  • Yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity leave: 52 weeks: the first 13 weeks are fully paid, followed by 26 weeks of half pay
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
  • Fulltime
Read More
Arrow Right