National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Security Operations Centre Lead

Hemel Hempstead
1 month ago
Applications closed

Related Jobs

View all jobs

Security Control Room Manager

Security Operations Centre Consultant

Information Security Operations Manager

Security Architect Lead

Lead Cyber Security Analyst (6 month FTC)

Crime Intelligence Manager

Security Operations Centre Lead is required by Logic to work for a large scale industry leading organisation based in Hemel Hempstead.

As a SOC Shift Lead, you will ensure the smooth operation and continual enhancement of SOC processes and personnel. You will play a pivotal role in protecting client systems and guiding the team through sophisticated cyber defence challenges.

Your responsibilities will include:

  • Monitoring, triaging, and investigating alerts across host and network security systems

  • Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities

  • Providing line management to SOC Analysts (team of 4) -developing capability and supporting career progression

  • Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage

  • Analysing and optimising detection rules and use cases based on Mitre Att&ck

  • Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies

  • Acting as a representative of the SOC in key meetings and internal stakeholder engagements

    In order to be successful for this role you will need to be able to demonstrate the following experience:

  • Proven experience in a Security Operations Centre (SOC) environment

  • Experience working as a SOC Level 2

  • Previous people management or line management experience

  • Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk

  • Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis

  • In-depth understanding of:

    • Client-server applications and multi-tier web environments

    • Relational databases, firewalls, VPNs, enterprise AntiVirus solutions

    • Networking principles (eg TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP)

  • Please note this is a shift-based position, following a rotation of 2 days (6am-6pm), 2 nights (6pm-6am), 4 days off.*

    Due to the highly secure nature of this work all applicants will be required to gain UK Security Clearance to the highest level. You must be a British National who has been resident in the UK for at least the last 10 years and you cannot have been outside the UK for more than 28 days on any one occasion within the last 5 years.

    To apply for this role please send your CV in the first instance and if relevant you will be contacted with full role and company information.

    We are passionate about promoting diversity, inclusion, and equality, and are committed to working with clients who share our outlook. We offer equal opportunities to all candidates regardless of background, identity, sexuality, and disability. We strive to create inclusive cultures where diversity is seen as real value for the company. Our mission is for everyone to feel empowered to be their true authentic selves at work
National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.