Salary: £30,000 - 55,000 per year Requirements: We are looking for candidates who hold active DV clearance and have a proven background in Cyber Security. The ideal candidate must possess experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM) tools, including Splunk, Defender, and Tenable Threat Modelling System solutions, as well as familiarity with IDS/IPS and vulnerability scanners, is essential. You should be capable of performing triage of security events to determine their scope, priority, and impact, and be able to make recommendations for efficient remediation. A solid understanding of network security principles, firewalls, and access control mechanisms is required. Industry certifications such as CompTIA Security, CISSP, CISM, CEH, or GIAC are highly desirable. Responsibilities: As a Cyber Security Analyst within our Security Operations Centre (SOC), your primary responsibilities will include managing SOC operations, responding to incidents, and conducting forensic analysis. You will use SIEM tools to monitor and analyze security events, identify potential threats, and implement appropriate responses. You will also provide recommendations for remediation and ensure that security protocols are followed to maintain a secure environment. Your expertise in network security will be critical in protecting our clients’ resources. Technologies: Network Security Splunk More: This position is based in London and offers hybrid and remote work options. The initial assignment is for 12 months, with the possibility of extension based on performance and business needs. We invite you to submit your latest CV for review if you meet the qualifications and are interested in this opportunity to contribute to our client’s mission in Central Government. last updated 12 week of 2026