Apply to the vacancy...
Unfortunately, something went wrong while opening the page. Please try again.

Loading window...

Apply to the vacancy...
Unfortunately, something went wrong while opening the page. Please try again.

Loading window...

Sign up for Jobbird
An error occurred while opening the sign-up page. Please try again.

Loading window...

Forgot my password
Unfortunately, something went wrong while opening the page. Please try again.

Loading window...

Log out
Unfortunately, something went wrong while signing out. Please try again.

Loading window...

Job application sent
Something went wrong while logging in. Please try again.
Something went wrong while signing up. Please try again.

Loading window...

logo
  • 5 km
  • 10 km
  • 30 km
  • 50 km

  • All
  • 5 km
  • 10 km
  • 30 km
  • 50 km

  • All
Filters
Filters
Location and distance
  • 5 km
  • 10 km
  • 30 km
  • 50 km

  • All
Jobs posted from
Salary from (per month)
Filters
How our sorting works

The order in which job vacancies are displayed is determined by a composite score based on the following factors:

  • Keyword Relevance: How well your search terms match the vacancy details. We prioritize matches found in the job title, followed by job requirements, location names, and educational levels. Matches within general employer information or the organization's name carry a lower weight.
  • Commercial Prioritization (Premium Jobs): Vacancies paid for by employers ('Premium' or 'Sponsored') receive a ranking boost and will appear higher in the search results.
  • Recency (Date Relevance): Newer vacancies are prioritized. The relevance score of a vacancy is reduced by half once the posting is older than 30 days.
  • Proximity (Distance Relevance): Vacancies located closer to your search location are ranked higher. For vacancies located more than 30 km from the search center, the relevance score is halved.
The final ranking is established by multiplying all these individual factors to calculate the total relevance score.

Adecco

SOC / Cyber Threat Detection Analyst - SANS/GIAC

Adecco Wokingham
32 - 40 hour
new


Show Recently closed jobs

    Adecco

    SOC / Cyber Threat Detection Analyst - SANS/GIAC

    Adecco Wokingham
    32 - 40 hour
    new
    Status Open
    Apply now

    Apply on the employer's website


    What we ask

    Education

    No minimum education required

    What we offer

    Hours
    32 to 40 hours per week
    Employment type
    permanent

    Job description

    SOC / Cyber Threat Detection Analyst - SANS/GIAC

    Cyber Threat Detection Analyst

    Location: Wokingham, Berkshire (On-site)
    Salary: Competitive (dependent on experience) + excellent benefits & training
    Security Clearance: Ideally SC Cleared or eligible for SC

    Role Overview

    As a Cyber Threat Detection Analyst, you will play a hands-on role within an advanced cyber defence function, focused on proactive threat hunting, adversary behaviour analysis, and high-fidelity threat detection across enterprise environments.

    This role goes beyond reactive alert handling. You will actively hunt for malicious activity using telemetry, SIEM data, and threat intelligence, develop hypotheses based on MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs), and support incident management and response activities when threats are identified.

    We are open to experienced SOC Analysts where threat hunting, investigations, and proactive detection have formed a significant part of their role, and who are looking to further develop in a more hunting-led environment.

    This position is well suited to analysts who enjoy thinking like an attacker, have worked alongside or supported red team or purple team activities, and want to deepen their expertise in threat detection and detection engineering.

    Skills & Experience We're Seeking

    Experience in threat hunting, cyber threat detection, SOC, blue team, or cyber defence environments, with ideally around five years hands on experience.
    Strong hands-on experience using SIEM platforms, including:
    Microsoft Sentinel (KQL)
    Splunk (SPL)
    Elastic Security/Kibana (KQL, ESQL)
    Practical and operational understanding of MITRE ATT&CK, attacker techniques, and adversary tradecraft
    Experience working with Indicators of Compromise (IOCs) and threat intelligence feeds
    Solid experience across the security event life cycle, including detection, investigation, and incident management
    Hands-on experience with EDR/XDR technologies such as Microsoft Defender, CrowdStrike, SentinelOne, or Carbon Black
    Strong knowledge of networking fundamentals (TCP/IP, DNS, HTTP/S, Firewalls, VPNs, Proxy technologies)
    Experience analysing telemetry from Windows, Linux, identity, endpoint, and network sources
    Strong analytical mindset with the ability to clearly communicate findings, impact, and riskKey Responsibilities

    Conduct proactive threat hunting activities across log, endpoint, and network telemetry to identify suspicious, stealthy, or previously unknown threats
    Develop and execute hunt hypotheses aligned to MITRE ATT&CK TTPs, adversary behaviours, and emerging threat intelligence
    Write, refine, and optimise SIEM queries using KQL, SPL, Elastic/ESQL, and Kibana Query Language
    Perform IOC analysis, enrichment, and validation, integrating internal and external threat intelligence sources
    Lead investigations from initial detection through scoping, root cause analysis, and impact assessment
    Support incident management and incident response activities, including containment, remediation, escalation, and lessons learned
    Collaborate closely with SOC teams, incident responders, red teams, and purple teams to validate detections and improve defensive coverage
    Contribute to detection logic improvements, use-case development, and continuous enhancement of hunting methodologies
    Produce clear investigation write-ups, timelines, and recommendations for technical and non-technical stakeholdersSecurity Certifications (Highly Beneficial)

    SANS/GIAC certifications, including but not limited to:
    GCIH - Incident Handler
    GCIA - Intrusion Analyst
    GCED - Enterprise Defender
    GCTI - Cyber Threat Intelligence
    GMON - Continuous Monitoring
    GDAT - Defending Advanced Threats
    GCAT - Advanced Threat Intelligence
    OSCP or equivalent offensive security qualifications
    Crest certifications, such as:
    Crest Practitioner Intrusion Analyst (CPIA)
    Crest Registered Intrusion Analyst (CRIA)
    Crest Certified Threat Intelligence Analyst (CCTIA)
    Crest Certified Blue Team Professional (CCBTP)
    Microsoft SC-200 or related detection and response certifications
    Other recognised cyber security or threat intelligence credentials
    Apply now

    Apply on the employer's website

    Apply now

    Apply on the employer's website


    Vacancy actions

    Save as favorite
    Share vacancy
    Or apply later


    Wokingham England

    Jobs

    • Search for jobs
    • Jobs per location
    • Jobs per job profession
    • Jobs per employment
    • Jobs per educational attainment

    Jobbird

    • Switch to different region
    • Terms and Conditions
    © 2026 Jobbird