NOC & SOC Technician Diagnose. Remediate. Automate. Protect. Are you at your best when solving complex technical issues others can’t? Do you enjoy digging into alerts, fixing root causes, and improving systems so problems don’t come back? If you thrive in fast moving MSP environments where automation, performance, and security matter… If so, this could be the role for you. The Opportunity We’re looking for a hands on NOC & SOC Technician to operate at the core of our monitoring, automation, and security function across multi-client environments. This isn’t a ticket processing role. You’ll work on complex alerts, resolve issues end-to-end, and contribute to building a modern, automation-first NOC/SOC that delivers real outcomes. You’ll be part of a team that’s shifting from reactive support to proactive, engineered operations. What You’ll Own Complex Incident Diagnosis & Resolution You’ll take ownership of alerts across infrastructure and security platforms, not just triaging, but resolving. You’ll handle: Server and VM performance issues Storage (NAS/SAN, RAID, IOPS) alerts Network issues (SD-WAN, VPN, VLANs, routing) Firewall, switching, and wireless alerts Microsoft 365 and Azure signals Backup failures and DR anomalies You won’t just fix symptoms, you’ll identify root causes and prevent recurrence. Automation Driven Operations You’ll play a key role in shifting automation into the NOC/SOC function. You will: Identify repeat issues and convert them into automation opportunities Contribute to scripts and remediation workflows Support automation platforms (e.g. Rewst) Help reduce manual workload across the business This team owns automation and you’ll help build it. Advanced Scripting & Engineering Contribution This isn’t basic scripting. You’ll be working in environments where automation runs across thousands of endpoints. You will: Develop and refine PowerShell scripts Work with Bash, JSON, and templating logic Support automation workflows and integrations (APIs) You don’t need to know everything but you need to be serious about developing here. Security Detection & Response You’ll actively investigate and respond to security events across modern tooling. You’ll work with: EDR/XDR detections Huntress alerts Microsoft Sentinel (KQL-based alerts) Identity risks (Entra ID / ITDR) And perform: Device isolation Malware remediation Identity enforcement (MFA / Conditional Access) Root cause analysis You’ll help improve detection quality and reduce noise over time. Proactive Monitoring & Signal Quality You’ll help ensure alerts are meaningful, not noise. You will: Improve monitoring thresholds Reduce false positives Validate patching and system health Contribute to ≥95% patch compliance Continuous Improvement & Root Cause Elimination We don’t believe in fixing the same problem twice. You will: Analyse recurring issues and propose permanent fixes Contribute to automation-driven ticket reduction Feed improvements back into monitoring and tooling Take part in structured NOC/SOC improvement cycles You’re expected to think beyond the ticket and improve the system. Customer Experience & Ownership You’ll own issues through to resolution. You will: Communicate clearly and confidently during incidents Minimise handoffs and friction Deliver a low-effort, high-confidence customer experience What Makes This Role Different This role combines: Operational Execution (Run) Owning alerts, incidents, and service quality day-to-day Engineering Contribution (Improve & Automate) Helping build automation, eliminate root causes, and improve systems You won’t just respond to issues… You’ll help engineer them out of existence. Who You Are You’ll thrive if you: Enjoy solving complex technical problems Are proactive — you fix and prevent, not just respond Are curious and always improving your technical depth Care about quality, documentation, and doing things properly Stay calm and structured under pressure Technical Background We’re Looking For You don’t need to tick every box but you should be comfortable operating at this level: 2–4 years in an MSP, NOC, SOC, or infrastructure support role Strong troubleshooting across servers, networking, endpoints, and identity Experience with RMM platforms and monitoring tools Exposure to security tooling (EDR, SIEM, identity protection) Understanding of patching, system health, and infrastructure operations Scripting & Automation (Important) PowerShell experience (developing toward advanced) Exposure to automation workflows or scripting logic Interest in APIs, automation platforms, or orchestration Certifications (or Equivalent Experience) We value capability over certificates, but the following are advantageous: CompTIA Network CompTIA Security Microsoft MD-102 (Endpoint Management) SC-200 / SC-900 (Security Operations) Vendor firewall certifications (Fortinet, WatchGuard, etc.) Huntress platform exposure Why Join Us? Because you’ll be part of a modern, automation first NOC & SOC function where: Your work improves real systems — not just tickets You’ll work with modern tooling (RMM, EDR, SIEM, automation platforms) Automation and engineering are valued — not just support You’ll grow your technical depth and capability Your impact is visible and meaningful Additional Information A full job description is available on request and will be provided to shortlisted candidates. Apply Now Ready to be part of a team that’s redefining proactive IT operations? If you want to work in an environment where automation, security, and engineering matter… we want to hear from you. Closing Date: 24th April 2026 We reserve the right depending on application numbers to close or extend the closing dates for positions; we would therefore recommend an early application. Due to the high number of applications, we thank all applicants for their interest; however, only those selected for an interview will be contacted.