SOC Lead - #1717487
Genesys Logic, Inc.
Date: 11 hours ago
City: Leeds
Contract type: Full time
Work schedule: Full day

Lead SOC Analyst
Leeds
SC Clearance essential
Day Shift / On-site
A leading UK-based consultancy specialising in Defence and Security is seeking an experienced Lead SOC Analyst to support the day-to-day operations and continuous improvement of a dedicated SOC for a high-profile Critical National Infrastructure (CNI) organisation. This opportunity involves working at the forefront of cyber defence, helping to secure hundreds of cloud-hosted systems across AWS and Azure environments from persistent and advanced threats.
This strategic SOC is designed to be a benchmark of cyber security excellence, blending in-house and consultancy staff across multiple sites. Core operational duties will be conducted from a secure facility in Leeds, due to essential connectivity with the customers network.
The role is shift-based, supporting 24/7 operations as part of a structured four-team rotation. The successful candidate will play a vital role in detecting, analysing, and responding to security threats using industry-leading Security Information and Event Management (SIEM) and orchestration tools. Due to the nature of the project applicants must hold an active SC Clearance and be eligible for enhanced clearance checks
Key Responsibilities
Leeds
SC Clearance essential
Day Shift / On-site
A leading UK-based consultancy specialising in Defence and Security is seeking an experienced Lead SOC Analyst to support the day-to-day operations and continuous improvement of a dedicated SOC for a high-profile Critical National Infrastructure (CNI) organisation. This opportunity involves working at the forefront of cyber defence, helping to secure hundreds of cloud-hosted systems across AWS and Azure environments from persistent and advanced threats.
This strategic SOC is designed to be a benchmark of cyber security excellence, blending in-house and consultancy staff across multiple sites. Core operational duties will be conducted from a secure facility in Leeds, due to essential connectivity with the customers network.
The role is shift-based, supporting 24/7 operations as part of a structured four-team rotation. The successful candidate will play a vital role in detecting, analysing, and responding to security threats using industry-leading Security Information and Event Management (SIEM) and orchestration tools. Due to the nature of the project applicants must hold an active SC Clearance and be eligible for enhanced clearance checks
Key Responsibilities
- Lead operational cyber defence activities across a 24/7 SOC environment.
- Deliver comprehensive shift handover briefings and ensure continuity across teams.
- Monitor and analyse SIEM alerts, logs, and network traffic to identify and respond to security threats.
- Triage and categorise incidents in accordance with established security policies.
- Detect and investigate intrusion attempts and determine their scope and impact.
- Document high-quality security incident reports, supported by threat intelligence and independent research.
- Conduct or support remediation efforts to neutralise threats, restore systems, and prevent recurrence.
- Produce post-incident review reports and provide actionable security improvement recommendations.
- Apply threat intelligence to improve detection capabilities and situational awareness.
- Support national-scale cyber incident response activities in a coaching or mentoring capacity.
- Collaborate with internal and client teams to enhance SOC services and align with evolving threat landscapes.
- Develop automated response workflows for SOAR platforms targeting common attack vectors.
- Drive continuous improvement by refining detection use cases and enhancing SOC processes.
- Hands-on experience with SIEM tools such as Splunk (Enterprise Security) and Microsoft Sentinel.
- Proficiency in Python and scripting for automation and analysis tasks.
- Strong understanding of security architecture, especially in cloud (AWS/Azure) and network environments.
- Experience with cyber threat intelligence, including threat actor tactics, techniques, and procedures (TTPs).
- Proven track record of investigating complex intrusions, including nation-state or targeted ransomware attacks.
- Solid knowledge of TCP/IP, network traffic analysis, and anomaly detection.
- Familiarity with a broad range of security tools and platforms.
- Experience in developing custom detection content and automation scripts.
- Excellent communication and consulting skills, with the ability to brief stakeholders and produce clear reports.
- Proven leadership and coaching mindset to mentor junior analysts.
- Strong stakeholder engagement and client-facing experience.
- Self-motivated with the ability to work independently in high-pressure environments.
- Adaptability to work across diverse teams and organisational cultures.
How to apply
To apply for this job you need to authorize on our website. If you don't have an account yet, please register.
Post a resumeSimilar jobs
Financial Planning Graduate
The Private Office LLP,
1 hour ago
Are you a graduate with ambitions to become a Chartered Financial Planner? Our Graduate Programme is designed to fast-track your development by giving you hands-on experience across key areas of the financial planning journey. This 3-year rotational scheme provides a...
Area Manager - Yorkshire / Leeds
Thorn Baker Recruitment Ltd,
2 hours ago
Job Title: Cleaning Area Manager Thorn Baker is collaborating with an established Facilities Management company in North West Yorkshire. We are seeking a dedicated Cleaning Area Manager to oversee and monitor 16 retail sites across the region. The ideal candidate...
Associate / Associate Director, Heritage Consultant
WSP in the UK & Ireland,
3 hours ago
What if you could do the kind of work the world needs? At WSP, you can access our global scale, contribute to landmark projects and connect with the brightest minds in your field to do the best work of your...