At a Glance
- Tasks: Lead complex incident investigations and develop new detection rules in a greenfield SecOps environment.
- Company: Join a cutting-edge UK Fintech firm focused on building robust Cyber Defence capabilities.
- Benefits: Enjoy a fully remote role with a competitive salary, bonuses, and great corporate perks.
- Why this job: Shape the future of cyber security in a dynamic team while making a real impact.
- Qualifications: 4+ years in SOC environments, experience with DAC/IAC, and knowledge of Microsoft Security stack required.
- Other info: Opportunity to mentor junior team members and work alongside Cyber Security experts.
The predicted salary is between 80000 - 90000 £ per year.
What you’ll be doing:
- Operate and optimise the Microsoft E5 security stack (Defender, Sentinel, Entra ID) to strengthen detection and response.
- Support in maturing the cyber threat intelligence function to help improve alerts, playbooks, and risk awareness.
- Provide incident response support across identity, cloud, endpoint, and email environments, whilst building IR playbooks & SOC workflows using E5 and SOAR capabilities.
- Communicate security risk and incidents to stakeholders across the business.
What you’ll need:
- MUST have strong competence across Microsoft E5 tooling (Defender, Sentinel, Entra ID, Purview etc.).
- Proficiency working across Windows & KQL.
- Strong experience working within a Security Operations environment.
- Have a comprehensive understanding and passion for Cyber Security.
- Good commercial acumen.
Bonus points if you have:
- Worked within or contributed towards a Cyber Threat Intelligence capability.
Lawrence Harvey are partnered with a market-leading Law Firm that are bolstering their cyber security capabilities due to an influx of exciting projects. You’ll be hands‑on with the Microsoft E5 security stack, helping shape and mature their Cyber Threat Intelligence program, whilst supporting on Incident Response.
This is an excellent opportunity if you currently feel pigeon‑holed technology‑wise, and want exposure to a multitude of exciting projects within different areas of security. You’ll be working within a well‑established cyber security function that is comprised of a team of respective experts in their fields, while reporting directly to a hands‑on leader that is well respected within the business.
Team structure is completely flat, you’ll have the autonomy, support and backing to elevate your career from a technical, personal and professional perspective.
If you’re looking for an exciting in‑house opportunity within a business that supports a multitude of customers across a diverse range of industries – whilst finetuning your technical skills and having an influence over decision making – this is for you!
Apply using the link or send a resume to
#J-18808-Ljbffr
Senior SecOps Engineer employer: Lawrence Harvey
Contact Detail:
Lawrence Harvey Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior SecOps Engineer
✨Tip Number 1
Familiarise yourself with the specific tools and technologies mentioned in the job description, such as Microsoft Security stack, Azure, and AWS. Having hands-on experience or relevant certifications can give you an edge during discussions.
✨Tip Number 2
Prepare to discuss your previous experiences in SOC environments, particularly focusing on high-profile incidents you've managed. Be ready to articulate how you approached these situations and the outcomes of your actions.
✨Tip Number 3
Showcase your understanding of Detection-as-Code (DAC) and Infrastructure-as-Code (IAC) by discussing any projects where you've implemented these practices. This will demonstrate your alignment with the company's automation-first mindset.
✨Tip Number 4
Highlight your mentoring experience, especially if you've trained junior team members in complex incident response. This will show your leadership potential and ability to contribute to team development.
We think you need these skills to ace Senior SecOps Engineer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in SecOps, particularly in cloud-native environments and automation. Include specific projects where you've implemented Detection-as-Code (DAC) and Infrastructure-as-Code (IAC).
Craft a Compelling Cover Letter: In your cover letter, express your passion for cybersecurity and detail how your background aligns with the role's requirements. Mention your experience in mentoring junior team members and your proactive approach to threat research.
Showcase Relevant Skills: Clearly outline your skills with the Microsoft Security stack, including Defender and Sentinel. Provide examples of how you've fine-tuned these tools in previous roles to enhance security measures.
Prepare for Technical Questions: Anticipate technical questions related to incident response and SOC operations. Be ready to discuss complex incidents you've handled and the methodologies you used to resolve them.
How to prepare for a job interview at Lawrence Harvey
✨Showcase Your Experience
Be prepared to discuss your significant experience in a SOC environment, particularly focusing on high-profile incidents you've managed. Highlight specific projects where you implemented Detection-as-Code (DAC) and Infrastructure-as-Code (IAC), as this will demonstrate your hands-on expertise.
✨Demonstrate Your Technical Skills
Familiarise yourself with the Microsoft Security stack, including Defender and Sentinel. Be ready to articulate how you've utilised these tools in past roles, especially in relation to fine-tuning and enhancing security measures.
✨Research the Company
Understand the company's current Cyber Defence capabilities and their goals for the future. This knowledge will allow you to tailor your responses and show how your skills align with their needs, particularly in building out their SOC monitoring and detection functions.
✨Prepare for Scenario-Based Questions
Expect questions that assess your problem-solving abilities in complex incident scenarios. Prepare examples of how you've approached similar situations in the past, focusing on your analytical skills and your ability to mentor junior team members during investigations.