Location: Crawley (Hybrid - 2 days onsite: Monday & Tuesday)
Contract: 6 months (likely extension)
Day Rate: ~£800/day (Outside IR35 likely)
My client is seeking an experienced Senior SOC Analyst (L3) with strong incident management and leadership capability to join a high-performing cyber security team supporting critical national infrastructure.
This role is focused on leading and managing cyber security incidents, acting as an Incident Commander during high-severity events, while also contributing to BAU SOC activities and continuous improvement initiatives.
Key Responsibilities Incident Management & LeadershipAct as Incident Lead/Commander during major cyber incidents
Assign tasks clearly across analysts (eg investigations in SIEM, EDR, Firewalls)
Manage escalation, stakeholder communication, and decision-making under pressure
Take ownership of incidents from identification through to resolution
Operate at L3 level across SOC functions, including:
Threat hunting
Phishing investigations
SIEM analysis (eg QRadar or similar)
Endpoint security (eg Microsoft Defender)
Firewall and network investigations
Support and collaborate with MSSPs and internal teams
Handle a mix of low-level and high-severity incidents
Lead and contribute to post-incident reviews (lessons learned)
Identify trends and recurring issues, driving preventative improvements
Enhance processes, playbooks, and response procedures
Support the organisation's goal of maturing toward a "Gold Standard" incident response capability
Proven experience as a Senior SOC Analyst (L3) or similar
Strong track record of leading cyber security incidents end-to-end
Experience acting as an Incident Manager/Incident Commander
Ability to coordinate teams and direct technical resources during incidents
Hands-on experience with:
SIEM platforms (eg QRadar, Splunk, Sentinel)
Endpoint security tools (eg Microsoft Defender)
Network/Firewall analysis
Exposure to Operational Technology (OT) environments (not essential)
Understanding of Critical National Infrastructure (CNI) environments
Familiarity with incident response frameworks and maturity models
Strong leadership and decision-making under pressure
Ability to "direct traffic" rather than purely technical execution
Proactive mindset - focused on preventing incidents, not just reacting
Excellent communication skills, particularly during high-pressure scenarios
Part of a ~12-person L3 cyber security team
Works closely with senior leadership and escalation points
Hybrid working model with collaboration days in Crawley
Fast-paced environment supporting critical infrastructure operations
Immediate interview availability for suitable candidates
Fast-moving process (subject to internal approvals)
Opportunity to play a key role in evolving and maturing cyber defence capabilities