Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Hiring an experienced L2 SOC Incident Responder to strengthen a growing cyber defence function. This role is ideal for someone who enjoys deep-dive investigations, owns incidents end-to-end, and wants real influence over detection and response maturity.
What you’ll be doing
- Investigate and validate security incidents escalated from L1, performing in-depth log, packet and endpoint analysis to determine impact and scope.
- Lead containment and eradication actions across endpoints, network, cloud and identities, working closely with IT and security engineering teams.
- Tune SIEM rules, use-cases and security tooling to reduce false positives and improve detection quality over time.
- Contribute to playbooks and incident response procedures, and support post-incident reviews and reporting.
- Stay current on emerging threats, TTPs and vulnerabilities, applying relevant threat intelligence to ongoing investigations.
What we’re looking for
- 2–4 years’ hands-on experience in a SOC / incident response role (L2 or strong L1 ready to step up).
- Solid experience with SIEM platforms and EDR tools, plus comfort working with logs from firewalls, proxies, servers and cloud environments.
- Good understanding of core security concepts such as incident handling, malware, lateral movement, phishing, and common attack techniques (MITRE ATT&CK familiarity a plus).
- Strong analytical mindset, clear communication skills, and the ability to remain calm and structured during live incidents.
Nice to have
- Experience contributing to or running incident response playbooks and table-top exercises.
- Relevant certifications such as GCIA, GCIH, GCED, CySA+, or equivalent practical experience.
How to apply
If this sounds like your next step, please apply with your CV or reach out directly for a confidential discussion. Shortlisted candidates will be contacted to discuss the environment, team setup and progression path in more detail.
Key Skills
Ranked by relevanceReady to apply?
Join Eames Consulting and take your career to the next level!
Application takes less than 5 minutes

