National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Security Engineer (SOC)

ASOS.com
London
2 months ago
Applications closed

Related Jobs

View all jobs

Security Engineer

Security Engineer

Security Engineer / Cloud / DSOMM / OWASP / Salesforce

Security Engineer

Security Engineer

Security Engineer

Get AI-powered advice on this job and more exclusive features.

Company Description

We’re ASOS, the online retailer for fashion lovers all around the world.

We exist to give our customers the confidence to be whoever they want to be, and that goes for our people too. At ASOS, you’re free to be your true self without judgement, and channel your creativity into a platform used by millions.

We’re proud members of Inclusive Companies, are Disability Confident Committed, and have signed the Business in the Community Race at Work Charter. We placed 8th in the Inclusive Top 50 Companies Employer list.

Everyone needs some help showing up as their best self. Let our Talent team know if you need any adjustments throughout the process in whatever way works best for you.

Job Description

Were looking to hire a Security Operations Engineer to enhance our security operations and ensure robust protection against sophisticated threats. This role reports to the SOC and IR Manager and is crucial for maintaining a high-performing and resilient Security Operations team. You will refine our SOC capabilities by monitoring network traffic, automating processes, analyzing security incidents, managing security tools, and providing expertise to Security Specialists and SOC analysts. Collaborating with cross-functional teams, you will build defenses, respond to incidents, and design strategies for a robust cybersecurity posture. You will also work with cutting-edge technologies and automation tools, including SIEM, SOAR, EDR, and cloud-native security technologies.

The role involves:

  1. Security Engineering & Automation:Drive improvements in SOC workflows, automate enrichment processes using SOAR and other tools, develop playbooks, oversee deployment and tuning of security tools to improve detection and reduce false positives, and manage EDR operations.
  2. Cloud Security Monitoring:Analyze and manage security logs through SIEM.
  3. Security Monitoring & Threat Detection:Continuously monitor alerts, events, and IoCs; build queries, scripts, dashboards, and workflows to improve visibility and reporting.
  4. Proactive Threat Hunting:Develop and implement threat hunting procedures to identify risks proactively.
  5. Incident Response:Enhance the IRP, coordinate during incident lifecycle stages, focusing on containment, eradication, recovery, and post-incident analysis.

Qualifications

About you:

  • Experience in SOC or incident response roles, with hands-on threat detection and mitigation skills.
  • Technical Skills: Strong in threat detection, incident response, analyzing attack patterns, especially in cloud environments. Skilled in writing SIEM queries, alerts, and dashboards.
  • Scripting & Automation: Knowledge of Python, SQL, Bash for automating workflows.
  • SOAR: Experience managing platforms like Google Chronicle, Swimlane, Cortex XSOAR.
  • EDR: Hands-on experience with EDR tools, including deployment, configuration, analysis, and response.

Additional Information

BENEFITS

  • Employee discount (hello ASOS discount!)
  • Personal development opportunities through ASOS Develops
  • Employee sample sales
  • Access to LinkedIn Learning materials
  • 25 days paid annual leave + a celebration day
  • Discretionary bonus scheme
  • Private medical care
  • Flexible benefits allowance

Discover life at ASOS by searching #InsideASOS on social media. Check out our tech insights through the ASOS Tech Podcast and Tech Blog links provided.

Seniority level

  • Mid-Senior level

Employment type

  • Full-time

Job function

  • Information Technology

Industries

  • Retail

Referrals increase your chances of interviewing at ASOS.com by 2x. Sign in to set job alerts for “Security Engineer” roles.

Location: London, England, United Kingdom

J-18808-Ljbffr

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.