HomeJobsLondonSecOps Engineer
Back to all jobs
⚡ Source: ReedRef: 56828572

SecOps Engineer

Context Recruitment Limited·London·Posted 6 days ago
🟢 Permanent🏠 Hybrid💰 70-75k GBP/year
Tailor my CV for this job — Free

Job description

Original text imported from Reed

SecOps Engineer - Central London (hybrid working)

Up to £75,000 PA


Well-established and highly profitable construction engineering business is seeking an experienced SecOps Engineer to join them on a permanent basis. This is a critical leadership role within an organisation undergoing significant digital transformation, with ambitious growth and acquisition plans driving demand for scalable, standardised and efficient business applications.

This role is ideal for a proactive security professional with strong technical expertise across application, network and infrastructure security. You will play a key part in implementing security controls, mitigating risk and contributing to the continuous improvement of the company's overall security posture.


Responsibilities:

  • Monitor security tools including SIEM (QRadar) and respond to threat detection alerts
  • Triage, analyse and prioritise security (via ServiceNow)
  • Investigate root causes of security issues and design effective remediation solutions
  • Oversee Patch Management
  • Conduct vulnerability scans with Qualys, analyse results and prioritise remediation
  • Document SecOps processes and create knowledge base articles in line with best practices
  • Automate security tasks and toolchains using scripting (PowerShell, Batch, etc.)
  • Collaborate with external SOC teams
  • Prepare post-incident reports and root cause analyses
  • Manage end-user device (EUD) security via MS Intune, Sophos and NinjaOne
  • Schedule and assess vulnerability scans on critical infrastructure
  • Maintain patching compliance for OS, Microsoft Office and third-party applications
  • Support infrastructure teams to deploy systems, enhance security policies and manage security-driven changes
  • Produce weekly security operations reports
  • Manage Cisco Umbrella web filtering and SSL inspection policies


Requirements:

  • Previous hands-on experience in SecOps or Incident Response
  • Recognised Security certifications such as Security+, CEH, or Microsoft security certifications
  • Strong knowledge of Microsoft Windows OS security and hardening
  • Working PowerShell scripting ability for automation tasks
  • Solid understanding of cloud-native security across M365, Azure and AWS
  • Experience with enterprise IT infrastructure


Any experience with the following will be highly favoured:

  • Strong experience with Qualys
  • Exposure to Varonis
  • Network security knowledge or relevant certifications (TCP/IP, VPNs, routing, segmentation)
  • Experience working with ServiceNow


Initially 4 days per week onsite, dropping to 3 once passed probation (this is not negotiable).




SpeedCV AI

Key skills

AI-extracted from the job advert

Must-have skills
SecOps experienceIncident ResponseSecurity+ certificationMicrosoft Windows OS securityPowerShell scriptingM365 securityAzure securityAWS security
Nice-to-have
Qualys experienceVaronisNetwork security certificationsServiceNow experience
Soft skills
Analytical thinkingProblem solvingCommunicationCollaborationAttention to detailInitiative
SpeedCV AI

Application advice

5 AI-generated recommendations to maximise your chances.

1

⭐ Highlight your SIEM experience prominently, specifically QRadar as it's the exact tool they use for threat detection monitoring

2

📊 Quantify your security achievements: "Reduced incident response time by 40% through PowerShell automation" or "Managed vulnerability remediation for 500+ endpoints"

3

🔧 Emphasise PowerShell scripting capabilities as they specifically mention automation of security tasks and toolchains

4

🛡️ Showcase your Microsoft security ecosystem experience (M365, Azure, Intune) as they're heavily invested in Microsoft infrastructure

5

📋 Mention experience with security documentation and knowledge base creation as they value process documentation and best practices

NEW
AI SpeedCV

Suggested CV bullets

3 bullets our AI drafted for this specific advert, mirroring its ATS keywords.

How to tailor your CV

Add these 3 bullets under your most recent experience:

  • Managed QRadar SIEM platform for 800+ endpoints, reducing mean time to threat detection by 35% through custom PowerShell automation scripts
  • Led Qualys vulnerability scanning programme across hybrid infrastructure, achieving 95% patch compliance within SLA timeframes
  • Automated security incident triage using ServiceNow integration, processing 150+ security alerts monthly with 99.2% accuracy

Free to copy — tailoring requires a 30-sec CV upload.

NEW
AI cover letter

Your cover letter is ready

We've drafted a cover letter for Context Recruitment Limited. Preview the opening, then unlock the full personalised version.

Letter preview — tailored to Context Recruitment Limited

Dear Hiring Manager,

Context Recruitment's SecOps Engineer position represents exactly the type of security leadership role I've been seeking, particularly given your organisation's focus on QRadar SIEM management and PowerShell automation during digital transformation. My hands-on experience with vulnerability scanning tools and Microsoft security ecosystems aligns perfectly with your requirements for M365, Azure and AWS security expertise.

My background in security operations has equipped me with the technical skills and incident response capabilities needed to excel in this role, from threat detection through to remediation documentation.

Get my personalised letter — free

Free signup, no card needed. Export to PDF/Word requires a £1.99 trial (14 days).

SpeedCV exclusive
SpeedCV AI

Interview questions

10 questions generated from this advert.

Technical

  • How would you configure QRadar to reduce false positives while maintaining comprehensive threat detection?
  • Walk me through your approach to prioritising vulnerabilities discovered through Qualys scanning
  • Describe how you would automate patch management using PowerShell across a Windows enterprise environment
  • How do you implement security controls in a hybrid Azure and on-premises infrastructure?
  • Explain your process for investigating and documenting a security incident from alert to resolution

Behavioural

  • Tell me about a time you had to balance security requirements with business needs during a digital transformation
  • Describe a situation where you had to collaborate with external teams to resolve a security incident
  • Give an example of how you've improved security processes through automation
  • Tell me about a challenging vulnerability you discovered and how you managed its remediation
  • Describe a time when you had to present complex security findings to non-technical stakeholders
SpeedCV AINEW

STAR answer examples

Model answers using the Situation-Task-Action-Result framework. Adapt to your own experience.

1Question

Tell me about a time you had to balance security requirements with business needs during a digital transformation

During a cloud migration project, the business wanted to move 45 applications to Azure within 8 weeks, but initial security assessments revealed significant vulnerabilities. I worked with stakeholders to prioritise the 12 most critical applications first, implementing Azure Security Center policies and conditional access controls that maintained security standards while allowing the business to meet their Q3 deadline. I created a phased approach that secured 98% of applications within 10 weeks, demonstrating that security doesn't have to slow down transformation when properly planned.
2Question

Describe a situation where you had to collaborate with external teams to resolve a security incident

When our SIEM detected unusual network activity at 2am, I immediately engaged our external SOC provider while initiating internal incident response procedures. The external team provided 24/7 monitoring while I coordinated with our infrastructure team to isolate affected systems. Through regular communication calls every 2 hours, we identified a compromised service account within 6 hours and implemented remediation across 23 affected servers. The collaboration resulted in zero data loss and strengthened our incident response playbook for future events.

Similar jobs

View all