CrawlJobs Logo

SOC Deployment Specialist

dynamicsearch.co.uk Logo

Dynamic Search Solutions

Location Icon

Location:
United Kingdom

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

45000.00 - 50000.00 GBP / Year

Job Description:

An exciting opportunity at an award-winning Microsoft Partner for a SOC Deployment Specialist. The organisation is a fast-growing Managed Security Service Provider (MSSP) delivering Microsoft-native SOC services to public sector, government, and enterprise customers.

Job Responsibility:

  • Lead the deployment of Microsoft Sentinel for new customers, ensuring SOC readiness from day one
  • Integrate Microsoft Defender technologies (Defender XDR, Defender for Endpoint, Defender for Cloud, Defender for Identity) with Sentinel to deliver unified threat visibility
  • Work closely with SOC analysts to ensure detections are relevant, actionable, and aligned to SOC operating procedures
  • Engage directly with customer stakeholders to gather requirements, explain SOC capabilities, and support successful service onboarding
  • Validate data sources, detection coverage, and alert quality to ensure deployments meet operational and SLA requirements
  • Support transition of deployed environments into business-as-usual SOC operations, providing documentation and technical handover
  • Assist with tuning, optimisation, and ongoing improvement of customer SOC environments post-deployment

Requirements:

  • Hands-on experience deploying Microsoft Sentinel within a SOC or MSSP environment
  • Strong operational knowledge of the Microsoft security stack, including: Microsoft Defender XDR, Defender for Endpoint, Defender for Cloud, Entra ID (Azure Active Directory) and Microsoft 365 security tooling
  • Solid understanding of SOC operations, alert triage, and incident response workflows
  • Proven experience working in customer-facing roles, with the ability to communicate clearly with both technical teams and non-technical stakeholders
  • Strong understanding of cloud, identity, and endpoint security in Microsoft Azure environments
  • Eligibility for SC and NPPV3 security clearance
What we offer:
  • Opportunity to work with cutting-edge Microsoft security technologies
  • Strong emphasis on training and certification

Additional Information:

Job Posted:
February 13, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Deployment Specialist

Technical Account Specialist - SOC

The Technical Account Specialist - SOC role at NTT DATA involves implementing an...
Location
Location
India , Mumbai
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Extensive experience and hands-on knowledge implementing, configuring, and integrating enterprise SOC solutions
  • Strong design, deployment, and integration capabilities on Cisco NBA solution
  • Strong design, deployment, and integration capabilities on ForcePoint and McAfee DLP solutions
  • Strong design, deployment, and integration capabilities on Qradar and RSA MDR/SIEM solutions
  • Strong design, deployment, and integration capabilities on PAN Corex XOAR, Cyware SOAR solutions
  • Ability to manage software upgrade, patching of the NBA solutions
  • Excellent ability to investigate and review cyber alerts, identify relevant IOCs and TTPs in support of threat prevention and detection development
  • Research, build and maintain detection capabilities for the latest threats across SIEM correlations and security tool signatures
  • Strong support and integration ability with threat intelligence / incident response / overall cyber defence strategy as needed
  • Generate high quality documentation of research and analysis results, including findings and recommended processes to technical and non-technical audiences clearly and concisely
Job Responsibility
Job Responsibility
  • Design, implement and troubleshoot the security solutions deployment across NTT’s client network.
  • Collaborate with client support team and other cross-functional teams to ensure efficient and reliable services are delivery to the clients.
  • Fulltime
Read More
Arrow Right

DevOps Automation Specialist (SOC)

This job description provides a high-level review of the types of work performed...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5-8 years of relevant experience
  • Bachelor's Degree or higher preferred
  • Advanced proficiency with Microsoft Office tools and software
  • Experience utilizing a SOAR platform with SIEM and case management solution
  • Experience with various scripting languages - Python, PHP, etc.
  • Experience working in a SOC environment and familiar with SOC Incident Response process
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Team player with the ability to work independently
Job Responsibility
Job Responsibility
  • Work closely with the Security Operations Center (SOC) and Security Engineering teams to implement and improve existing SOC process automation
  • Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
  • Enhance current deployment of commercial tools used by Security Operations Center.
  • Evaluate new technologies against SOC requirements in proof of concept
  • Fulltime
Read More
Arrow Right

Cyber Security IAM & PKI Specialist

At Bombardier, we design, build and maintain the world’s peak-performing aircraf...
Location
Location
Canada , Dorval; Mississauga
Salary
Salary:
Not provided
bombardier.com Logo
Bombardier
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • You hold a bachelor’s degree in cyber security, information security, computer science, or relevant field of study.
  • You have over 6 years of experience with identity lifecycle management (Joiner/Mover/Leaver), access governance, and least‑privilege access models.
  • You have a strong knowledge of authentication and authorization protocols (SAML, OAuth 2.0, OpenID Connect, LDAP, Kerberos).
  • You have hands‑on experience with enterprise IAM (Identity & Access Management) platforms (e.g., Azure Entra ID, SailPoint, Okta, CyberArk, MFA).
  • You have proven experience designing, operating, and evolving enterprise PKI (Public Key Infrastructure) environments (internal and public CAs).
  • You have a strong understanding of certificate lifecycle management, TLS/SSL, and cryptographic trust models.
  • You have experience securing non‑human identities such as applications, services, workloads, and APIs.
  • You have experience with human identities in medium to high trust environments such as formal digital signature of documents and software.
  • You are familiar with key management practices, HSMs (Hardware Security Modules), and cloud‑native key services.
  • You have experience integrating IAM (Identity & Access Management) and PKI signals into SIEM/XDR platforms.
Job Responsibility
Job Responsibility
  • Identity Architect - Act as the SME (Subject Matter Expert) for the identity technology stack, plan and prioritize the technology roadmap, track deployments.
  • PKI (Public Key Infrastructure) Specialist - Own, develop and drive the current state and future state plan for PKI.
  • Identity Threat Engineer/Specialist - Collaborate with the SOC (Security Operations Centre) to mature and enhance telemetry, processes and response to cyber threats.
What we offer
What we offer
  • Insurance plans (Dental, medical, life insurance, disability, and more)
  • Competitive base salary
  • Retirement savings plan
  • Employee Assistance Program
  • Tele Health Program
  • Fulltime
Read More
Arrow Right
New

Senior SOC Engineer

At Paribu, every team member plays a crucial role in driving innovation and deli...
Location
Location
Türkiye , İstanbul
Salary
Salary:
Not provided
paribu.com Logo
Paribu
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Electronics Engineering, or related fields
  • 3+ years of IT security experience and relevant SOC Operations & Incident Management skills
  • Strong verbal and written communication skills in English
  • In-depth understanding of Incident Response methodologies and taxonomy
  • Proven experience in implementing SOC tools, including design, migration, implementation, and operation
  • Proficiency in using Security Analytics for threat detection
  • Hands-on experience with Splunk Enterprise Security tools
  • Strong knowledge of log sources (Windows Event Logs, Linux Syslog, Firewalls, IPS/IDS, EDR, DLP, Cloud Environments, etc.)
  • Proficiency in Splunk SPL Queries and ability to create unique dashboards, alerts, and correlation searches
  • Passionate about security technology and staying current with industry trends
Job Responsibility
Job Responsibility
  • Continuously monitoring emerging threats and Indicators of Compromise (IOCs), and proactively implementing timely detection and prevention measures
  • Developing and implementing threat modelling maps using the MITRE ATT&CK framework
  • Acting as a Level 3 Incident Response Specialist, providing pivotal support to SOC Analysts
  • Overseeing system triage activities to ensure efficient response and resolution
  • Playing a significant role in resilience activities against cybercrimes
  • Leading major SOC modernization projects, including adopting and implementing new technologies, managing large-scale migrations, and designing end-to-end processes
  • Architecting, deploying, managing, and securing SIEM, EDR, and Threat Intelligence systems
  • Establishing advanced correlation rules for various use cases to enhance detection capabilities
  • Creating and publishing data models to facilitate ease of access and analysis for data requestors
  • Building custom solutions to address specific security challenges
What we offer
What we offer
  • Meal allowance – Generous support with a flexible meal card
  • Private health insurance – Comprehensive coverage for employees, including spouse and children
  • Commuting support – Financial support for commuting based on your office route
  • S.O.S. leave (10 days) – Additional leave days up to 10 days per year for urgent and unexpected matters, apart from annual leave
  • Birthday leave – One extra day off during your birthday month
  • Language learning support – Resources to enhance English communication skills
  • Personal development support – Budget for exploring hobbies, attending professional courses, and personal growth
  • Well-being & health platform – Access to digital health and wellness services, including mental health support, and well-being resources
  • Relocation allowance – Financial support for relocation within a 15-km radius of the Paribu’s office
  • Top-tier work equipment – High-performance devices and all the essential tools you need to do your best work
  • Fulltime
Read More
Arrow Right
New

IT Systems & Security Specialist

We’re looking for an IT Systems & Security Specialist to join our IT team in Dub...
Location
Location
Ireland , Dublin
Salary
Salary:
Not provided
supermetrics.com Logo
Supermetrics
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of work experience, including responsibilities in device management, identity and access management, endpoint security and system administration with strong involvement in securing systems and devices
  • Strong hands-on experience securing Google Workspace, including Context-Aware Access (or equivalent conditional access), DLP/data protection, security investigations, and Gmail security controls
  • Experience with supporting users using Windows, MacOS, iOS, Android and Linux devices
  • Proven ability to design and roll out endpoint management, including greenfield deployments
  • Strong working knowledge of MDM systems such as Jamf (macOS), Intune, FleetDM, Google MDM
  • Experience supporting SOC 2 and/or ISO 27001 implementations
  • Able to work independently as the Dublin on-site support while collaborating effectively with central Security and remote stakeholders
Job Responsibility
Job Responsibility
  • Unify IdP + device posture + access into a practical Zero Trust loop, including exceptions and break-glass access
  • Administer Google Workspace (users, groups, policies, and security settings within IT scope), including Context-Aware Access, MFA, admin hygiene, OAuth app controls, DLP/data protection, investigations, and Gmail security controls
  • Build a cohesive multi-OS endpoint management approach, enforcing posture standards and lifecycle visibility
  • Run asset management end-to-end: inventory, lifecycle, repairs/replacements, and license tracking
  • Run (and improve/automate) onboarding/offboarding: accounts, groups, permissions, device provisioning, and access removal
  • Partner with Security on SOC 2 / ISO 27001 by implementing controls, maintaining evidence, and driving remediation
  • Provide great customer service through hands-on IT support for global employees and essential Dublin office needs
What we offer
What we offer
  • Attractive pay and benefits package, including equity participation
  • Great work equipment
  • Health care benefit and leisure time insurance
  • Annual personal learning budget
  • Sports and wellbeing allowance
  • Fulltime
Read More
Arrow Right

IT Security Specialist

Amla Commerce is looking for an experienced IT Security Specialist to join our t...
Location
Location
United States , Milwaukee
Salary
Salary:
Not provided
amla.io Logo
Amla Commerce
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Technology, or a related field
  • Minimum 2 Years of relevant work experience
  • Proven experience in infrastructure security, manual penetration testing, vulnerability assessment, and web application security
  • Strong knowledge of penetration testing tools and frameworks, including Burp Suite, Owasp Zap, and Metasploit Framework
  • Familiarity with OWASP Top 10 vulnerabilities and best practices for securing web applications
  • Experience with IDS/IPS tools for monitoring and preventing intrusions
  • Familiarity with wireless/Wi-Fi security protocols, encryption standards, and best practices
  • Knowledge of network and system security protocols, technologies, and best practices
  • Strong problem-solving skills and ability to think strategically about security risks and solutions
  • Excellent communication and interpersonal skills to effectively collaborate with cross-functional teams and stakeholders
Job Responsibility
Job Responsibility
  • Conduct manual penetration testing of infrastructure systems, networks, and applications to identify security vulnerabilities and potential risks
  • Utilize various penetration testing tools such as Nmap, Nessus, Burp Suite, Owasp Zap, and Metasploit Framework to identify and exploit vulnerabilities
  • Perform vulnerability assessments using both manual approaches and vulnerability assessment and penetration testing (VAPT) tools like Nessus, OpenVAS, and Qualys
  • Collaborate with the development team to enhance the security of web applications by implementing secure coding practices and addressing OWASP Top 10 vulnerabilities
  • Configure and manage web application firewalls (WAF) to protect against common web-based attacks
  • Implement and maintain infrastructure firewalls, ensuring that proper configurations are in place to protect the network and systems from unauthorized access
  • Manage IP access control lists and handle blocking/unblocking requests as per security policies
  • Ensure compliance with SOC (Security Operations Center) standards and participate in audits and assessments
  • Provide end user system security by deploying and managing antivirus solutions, conducting security awareness training, and responding to security incidents
  • Stay up-to-date with the latest security threats, vulnerabilities, and industry best practices to proactively identify potential risks and recommend mitigation strategies
Read More
Arrow Right

SIEM Content Development Specialist

The SIEM Content Development Specialist plays a critical role in advancing the C...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 2-5 years’ experience in SIEM content (rule logic and code) development role
  • Minimum of 2 years of SOC analyst experience (Level2 or above) required
  • In depth and extensive hands-on experience in security event analysis, create and refine SIEM/EDR rules and deliver efficiency within the SIEM and all other technologies used within the team
  • Deep knowledge of IPv4/IPv6, TCP networking protocols
  • Deep knowledge of Windows/Linux operating systems
  • Exceptional working knowledge of security technologies such as SIEM (ArcSight, Sentinel, QRadar, LogRhythm, Splunk), EDR (Microsoft Defender, FireEye, Tanium), IDS/IPS, firewalls, proxies, web application firewalls, anti-virus, etc.
  • Comprehensive understanding of Window Security Event logs and Syslog
  • Excellent familiarity with endpoint/perimeter security attack vectors and detection (blue/purple teaming)
  • Excellent familiarity with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies
  • Outstanding knowledge of cloud platforms such as Azure, O365, Google cloud, AWS, Oracle
Job Responsibility
Job Responsibility
  • Contribute to continuous improvement initiatives across multiple technologies by developing and refining content that enhanced threat detection and response capabilities
  • Contribute to the development and optimisation of threat detection content, including the tuning of threat and vulnerability management technologies and the continual refinement of SIEM rules and logic to enhance detection accuracy and operational performance
  • Lead and contribute to the optimisation and modernisation of SIEM content, supporting the adoption of next-generation SIEM technologies and cloud-native security tools
  • Manage the lifecycle of detection content, including development, testing, release, and retirement, using version control and documentation best practices
  • Collaborate with DevOps/SecOps teams to integrate security content into broader CI/CD workflows
  • Collaborate with the CSOC Manager to support improvements in security operations through effective content contributions
  • Support security event analysis by participating in and may drive security event analysis activities to address current cyber threats
  • Assist in threat response activities, providing analytical input from a blue team perspective to help identify potential threat group behaviours
  • Contribute to the creation of cyber security reports and advisories, ensuring timely and accurate dissemination to key stakeholders
  • Participate in residual risk assessments, supporting post-incident analysis and the documentation of operational and technical lessons learned
What we offer
What we offer
  • Yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity leave: 52 weeks: the first 13 weeks are fully paid, followed by 26 weeks of half pay
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
  • Fulltime
Read More
Arrow Right

Cloud Defensive Security Engineer

As a Defensive Security Engineer, you will be part of the Cloud Defense team wit...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
adevinta.com Logo
Adevinta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong hands-on experience designing, operating and troubleshooting Elastic deployments in production (on-prem or cloud-managed)
  • Experience building and operating log/telemetry pipelines into Elastic (Filebeat/Metricbeat/other Beats, Elastic Agent, Logstash, ingest pipelines)
  • Proficiency with Kibana: dashboards, visualisations, Lens, saved searches, alerting and spaces
  • Solid understanding of distributed systems basics relevant to Elastic (indexing, sharding, replication, cluster health)
  • Elastic Certified Engineer (or equivalent depth of experience), however certification is a plus
  • Experience with infrastructure-as-code (e.g. Terraform, Ansible, CloudFormation) to deploy and manage infrastructure
  • Experience with CI/CD pipelines (GitHub Actions, Jenkins, etc…) to automate configuration and infrastructure deployments
  • Hands-on experience with Linux systems, containers and Kubernetes (EKS or vanilla deployments)
  • Experience with public cloud environments, preferably AWS and/or GCP (cloud logging, IAM basics, network fundamentals)
  • Good understanding of core security and SOC concepts: logs vs events vs alerts, detections, triage and investigations
Job Responsibility
Job Responsibility
  • Redesign, evolve and operate our Elastic stack (Elasticsearch, Kibana, Elastic Security/Observability) as a core part of the Defensive platform
  • Own the ingestion pipelines for security and infrastructure telemetry (e.g. AWS/GCP audit logs, EDR telemetry, OS/syslog from Linux fleets and key application logs from our core products), including Beats/Agents, ingest pipelines and index lifecycle management
  • Pragmatically optimise Elastic for performance, scalability, cost and reliability (index strategy, shard planning, hot/warm/cold, retention policies)
  • Define and maintain standards and templates for indices, data streams, mappings and dashboards
  • Implement and maintain detection content in Elastic (KQL/EQL queries, rules, anomaly jobs) following defense-as-code practices: versioning, code reviews, testing and CI/CD
  • Collaborate with engineering teams, SOC and Incident Response to translate threat scenarios and cloud/runtime risks into Elastic rules, alerts and dashboards
  • Improve detections to reduce false positives and improve signal quality, based on feedback from SOC, IR and product teams
  • Contribute to internal tooling that improves detection engineering (e.g. shared rule templates, test harnesses, linters, rule packaging)
  • Manage Elastic infrastructure, data pipelines, and content deployments using IaC tools (Terraform, CloudFormation) and CI/CD platforms (GitHub Actions, Argo CD)
  • Integrate Elastic with other security and cloud services (e.g. EDR agents, cloud-native security tools, ticketing, notification channels, SOAR) to support end-to-end defensive workflows
What we offer
What we offer
  • An attractive Base Salary
  • Participation in our Short Term Incentive plan (annual bonus)
  • Work From Anywhere: Enjoy up to 20 days a year of working from anywhere
  • A 24/7 Employee Assistance Program for you and your family
  • Fulltime
Read More
Arrow Right