IT Recruitment Solutions
Network Engineer with live DV clearance required for a permanent role with a leading consultancy who have partnered up with major players in the Defence industry. This Network Engineer role will see you join an established team of skilled engineers covering Cisco and Juniper Network Infrastructure, to work on an advanced project which is using Agile methodology. You must be DV cleared otherwise we cannot consider your application. As such, we are looking for a proven Network Engineer with live DV clearance, ideally with previously work experience in NOC/SOC (2nd/3rd line) environments and with the following experience: Proven experience with Cisco Routers and Switches platforms Strong understanding of TCP/IP and routing protocols - BGP, OSPF, RIP, EIGRP Experience of Cisco ACI, Hyperflex, UCS platforms, Firepower, ASA, ISE, BGP EVPN VXLAN, and IPSec/SSL VPNs Good understanding of Ethernet, VLANs, Port Aggregation, and 802.1Q Trunking Excellent verbal and written communication skills Ability to support and troubleshoot to resolve complex incidents CCNA minimum certification This Network Engineer is based in Hampshire full time, and they are offering a salary of £55,000 - £65,000 + benefits. Please note, due to the highly sensitive nature of the project we cannot accept any candidates who don't have live DV Clearance! To apply for this Network Engineer permanent position, please send your CV to Jennifer Palmer at IT Recruitment Solutions. Network Engineer, NOC, SOC, Network Support, Cisco, Juniper, CCNA, Permanent, DV Cleared, Developed Vetting, Hampshire, Defence £55,000 - £65,000 + benefits
Network Engineer with live DV clearance required for a permanent role with a leading consultancy who have partnered up with major players in the Defence industry. This Network Engineer role will see you join an established team of skilled engineers covering Cisco and Juniper Network Infrastructure, to work on an advanced project which is using Agile methodology. You must be DV cleared otherwise we cannot consider your application. As such, we are looking for a proven Network Engineer with live DV clearance, ideally with previously work experience in NOC/SOC (2nd/3rd line) environments and with the following experience: Proven experience with Cisco Routers and Switches platforms Strong understanding of TCP/IP and routing protocols - BGP, OSPF, RIP, EIGRP Experience of Cisco ACI, Hyperflex, UCS platforms, Firepower, ASA, ISE, BGP EVPN VXLAN, and IPSec/SSL VPNs Good understanding of Ethernet, VLANs, Port Aggregation, and 802.1Q Trunking Excellent verbal and written communication skills Ability to support and troubleshoot to resolve complex incidents CCNA minimum certification This Network Engineer is based in Hampshire full time, and they are offering a salary of £55,000 - £65,000 + benefits. Please note, due to the highly sensitive nature of the project we cannot accept any candidates who don't have live DV Clearance! To apply for this Network Engineer permanent position, please send your CV to Jennifer Palmer at IT Recruitment Solutions. Network Engineer, NOC, SOC, Network Support, Cisco, Juniper, CCNA, Permanent, DV Cleared, Developed Vetting, Hampshire, Defence £55,000 - £65,000 + benefits
Sanderson Government & Defence
Stoke-on-trent, Staffordshire
SOC Manager The Role The SOC Manager is responsible for managing and maintaining the security operations centre's day-to-day activities, including mentoring, supervising and developing SOC staff, developing and implementing security protocols, and ensuring the detection, analysis, response and resolution of security incidents. The role requires leadership in incident response, detection engineering, threat intelligence, and vulnerability management, while collaborating with other teams across the business to ensure enterprise-wide security measures are effective. UKSV is required for this position. Candidates must possess or be eligible to obtain clearance. To be eligible for UKSV you must be a UK National and/or have been a UK Resident for 5+ years. Role Responsibilities Key responsibilities include, but are not limited to: Leadership and Team Management: Lead and manage a team of SOC analysts and security engineers, ensuring operational excellence and maintaining high levels of motivation. Create and maintain shift schedules for the SOC team to ensure continuous coverage. Develop and implement training programs to enhance the team's skill set and knowledge in cybersecurity best practices. Conduct performance evaluations, mentoring, and career development for SOC staff. Incident Management: Lead the incident response process, ensuring that security incidents are properly identified, triaged, investigated, and resolved. Develop and refine incident response procedures, playbooks, and escalation protocols. Coordinate with internal stakeholders (eg, IT, legal, risk management) to respond to security incidents. Ensure that all incidents are properly documented and that lessons learned are integrated into security processes. Threat Monitoring and Detection: Oversee Real Time security monitoring activities to detect potential security threats or vulnerabilities. Ensure the proper configuration and use of security tools, such as SIEM (Security Information and Event Management) systems, intrusion detection systems (IDS), and Firewalls. Collaborate with other security and IT teams to identify and mitigate risks proactively. Strategic Planning and Process Improvement: Develop SOC strategies, policies, and procedures to improve overall security operations and incident response capabilities. Ensure continuous improvement of SOC operations through regular assessments, audits, and performance reviews. Stay current on the latest cybersecurity trends, threats, and technology developments to inform security strategy and improvements. Manage relationships with external partners, vendors, and managed security service providers (MSSPs). Compliance and Reporting: Ensure compliance with industry standards, regulations, and internal security policies. Prepare regular reports and metrics for senior management on SOC operations, incidents, and overall security posture. Ensure that logs, reports, and evidence are maintained in a way that supports regulatory and legal requirements. Budget and Resource allocation: Develop and manage the SOC budget, ensuring efficient use of resources and optimal toolset performance. Recommend investments in security technologies and upgrades based on risk assessments and identified gaps. Education and Experience Requirements As the SOC Manager, you will have: Experience: 5+ years of experience in cybersecurity, with at least 2-3 years in a SOC or incident response environment. Proven experience leading security teams in a SOC or similar environment. Strong background in security monitoring tools, incident detection, and response protocols. Education: Bachelor's degree in Computer Science, Information Security, or a related field or equivalent experience. Certifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, GCIA, GCIH, or others are highly desirable. Technical Skills: Proficiency in using security tools and technologies (SIEM, IDS/IPS, EDR, Firewalls, etc.). Strong knowledge of cybersecurity frameworks (NIST, ISO 27001, MITRE ATT&CK). Understanding of network protocols, malware analysis, threat intelligence, and vulnerability management. Familiarity with Scripting and automation for security operations. Soft Skills: Excellent leadership and team management abilities. Strong communication skills to collaborate with both technical and non-technical stakeholders. Ability to work well under pressure and manage multiple incidents simultaneously. Strong problem-solving skills and analytical thinking. Working Environment: Full-time, onsite in our new NOC/SOC workspace. Ability to work flexible hours, including after-hours support when necessary. On-call rotation for critical incident management.
SOC Manager The Role The SOC Manager is responsible for managing and maintaining the security operations centre's day-to-day activities, including mentoring, supervising and developing SOC staff, developing and implementing security protocols, and ensuring the detection, analysis, response and resolution of security incidents. The role requires leadership in incident response, detection engineering, threat intelligence, and vulnerability management, while collaborating with other teams across the business to ensure enterprise-wide security measures are effective. UKSV is required for this position. Candidates must possess or be eligible to obtain clearance. To be eligible for UKSV you must be a UK National and/or have been a UK Resident for 5+ years. Role Responsibilities Key responsibilities include, but are not limited to: Leadership and Team Management: Lead and manage a team of SOC analysts and security engineers, ensuring operational excellence and maintaining high levels of motivation. Create and maintain shift schedules for the SOC team to ensure continuous coverage. Develop and implement training programs to enhance the team's skill set and knowledge in cybersecurity best practices. Conduct performance evaluations, mentoring, and career development for SOC staff. Incident Management: Lead the incident response process, ensuring that security incidents are properly identified, triaged, investigated, and resolved. Develop and refine incident response procedures, playbooks, and escalation protocols. Coordinate with internal stakeholders (eg, IT, legal, risk management) to respond to security incidents. Ensure that all incidents are properly documented and that lessons learned are integrated into security processes. Threat Monitoring and Detection: Oversee Real Time security monitoring activities to detect potential security threats or vulnerabilities. Ensure the proper configuration and use of security tools, such as SIEM (Security Information and Event Management) systems, intrusion detection systems (IDS), and Firewalls. Collaborate with other security and IT teams to identify and mitigate risks proactively. Strategic Planning and Process Improvement: Develop SOC strategies, policies, and procedures to improve overall security operations and incident response capabilities. Ensure continuous improvement of SOC operations through regular assessments, audits, and performance reviews. Stay current on the latest cybersecurity trends, threats, and technology developments to inform security strategy and improvements. Manage relationships with external partners, vendors, and managed security service providers (MSSPs). Compliance and Reporting: Ensure compliance with industry standards, regulations, and internal security policies. Prepare regular reports and metrics for senior management on SOC operations, incidents, and overall security posture. Ensure that logs, reports, and evidence are maintained in a way that supports regulatory and legal requirements. Budget and Resource allocation: Develop and manage the SOC budget, ensuring efficient use of resources and optimal toolset performance. Recommend investments in security technologies and upgrades based on risk assessments and identified gaps. Education and Experience Requirements As the SOC Manager, you will have: Experience: 5+ years of experience in cybersecurity, with at least 2-3 years in a SOC or incident response environment. Proven experience leading security teams in a SOC or similar environment. Strong background in security monitoring tools, incident detection, and response protocols. Education: Bachelor's degree in Computer Science, Information Security, or a related field or equivalent experience. Certifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, GCIA, GCIH, or others are highly desirable. Technical Skills: Proficiency in using security tools and technologies (SIEM, IDS/IPS, EDR, Firewalls, etc.). Strong knowledge of cybersecurity frameworks (NIST, ISO 27001, MITRE ATT&CK). Understanding of network protocols, malware analysis, threat intelligence, and vulnerability management. Familiarity with Scripting and automation for security operations. Soft Skills: Excellent leadership and team management abilities. Strong communication skills to collaborate with both technical and non-technical stakeholders. Ability to work well under pressure and manage multiple incidents simultaneously. Strong problem-solving skills and analytical thinking. Working Environment: Full-time, onsite in our new NOC/SOC workspace. Ability to work flexible hours, including after-hours support when necessary. On-call rotation for critical incident management.