L3 SOC Analyst
West SussexLondon£75,000 + 7.5% bonus
We are exclusively partnering with a company that is integral to the UK CNI. Our client has received significant funding from the government and are looking to grow their existing team by 200% by the end of 2026. Your role will report directly in to the SOC Manager, and you will have a significant influence on how the SOC is built and run. The vision for this position is to be the lead escalation point for all incidents and that you lead the IR team too.
Location: West Sussex
On Site Requirement: 5 days during probation, 2-3 days there after
Salary: £75,000 + 7.5% bonus + 10% pension contribution
Responsibilities
You will lead on all high-severity cyber incident. This will be from initial triage, expediate a containment, eradication and recovery strategy to minimise business impact
Contribute to the continuous improvement or IR playbooks
Produce new workflows for automation using SOAR tools
Advanced Threat Hunting: Hypothesis and IoC based hunting.
Aid the SOC Manager in developing and creating SOC policies
Guide L1 and L2, providing guidance and training
Engage with c-suite level stakeholders across a number of different sections of the business and be able to articulate security lingo to non-technical folks.
Be comfortable delivering presentations to articulate technical cyber concepts
Collaborate with internal and 3rd party providers, suppliers and partners
Skills and Experiences
The most important thing is that you have evidence of advanced threat hunting and IR. This will include leading on P1 IR engagements either as a L2 or L3.
SOC related certifications are a bonus: SANS GIAC/GCIH/GCIA etc.
Knowledge of adversarial TTPs and frameworks
Experience with: Darktrace, Microsoft Defender and Microsoft Sentinel experience an advantage.
Advantageous: Ran tabletop exercises & have experience with security architecture
If you're excited about the opportunity to contribute towards the safety of UK CNI, please reach out to Gareth Davies @ Trident Search
L3 SOC Analyst
BerkshireLondon£67,000-£75,000 + bonuses
Trident Search have exclusively partnered with one of the strongest security teams in the UK to bring in a L3 analyst to their team. They are integral to the UK CNI and are a household name. You will investigate and validate threats through data analysis, using a wide range of security tolls and defense products. A stand out candidate might come from a malware/threat hunting strong environment, or might have a keen interest in the field.
Job Title: L3 SOC Analyst
Location: 4 days on site per MONTH in Berkshire / Central London
Hours: 09:00-17:30
Key Responsibilities:
Lead the resolution of escalated security incidents such as sophisticated malware, APTs, and complex intrusions. Use expert-level forensic analysis and threat hunting techniques to contain and recover from incidents.
Drive security event analysis to address emerging cyber threats and ensure comprehensive post-incident analysis..
Fine-tune SIEM configurations to filter false positives, detect advanced threats, and optimize alerting.
Refine SOAR playbooks to automate response actions and improve incident response efficiency.
Act as an escalation point for junior analysts, offering guidance and promoting knowledge sharing within the team.
Contribute to threat response activities and collaborate with blue team efforts to identify threat group activities.
Skills and Experience
Proven SOC analyst experience (Level 2 or above) with extensive hands-on experience in security event analysis and incident response.
If you have a passion for malware or come from a DFIR background, that would be advantageous.
Strong understanding of networking protocols
Expertise in Windows/Linux o/s and a variety of security technologies
Familiarity with SOAR technologies
Experience with security frameworks such as MITRE, Cyber Kill Chain, and APT strategies.
Knowledge of cloud platforms (Azure, AWS, Google Cloud) and cloud security best practices.
If you're seeking a opportunity where you'll be working with one of the strongest security teams in the UK, please reach out to Gareth Davies @ Trident Search.
Senior Security Analyst
RemoteRemote£75,000 - £85,000 inc. on call allowance
Trident Search are working with an incredibly niche MSSP who specialise in threat detection. They leverage some of the best technologies on the market and are looking for someone who is incredibly analytical.
Working for this client, you will gain valuable experience detecting threats and aiding clients in mitigation and remediation processes. This is a technical position, and it will require you to get involved across all areas of blue teaming. From initial triaging through to remediation, threat hunting and incident response (on call rota, 1 in 5 weeks).
Location: Remote / London
Hours: 09:00-17:30 (on call responsibilities, 1 week in 5)
Responsibilities:
Monitor, investigate and report potential cyber threats.
Communicate and escalate threats to clients, providing support and guidance where needed.
Maintain and support deployed advanced threat protection solutions.
Interpret and collate threat analysis into analytically concise incident and threat reports.
Maintain and improve the Advanced Threat Management Service offering to ensure a continued high level of service is delivered.
Aid pre-sales teams in selling threat detection solutions
Requirements:
This position requires a detail oriented, critical thinker who can anticipate issues and solve problems. You should be able to analyse large datasets to detect underlying patterns and identify cyber-attacks, malware, and threat actors, determining potential impact and develop remediation guidance.
Knowledge of current and emerging advanced cyber threats, attack and evasion techniques, command and control infrastructures and insider threat behaviour.
Understanding of typical malware functionality and capabilities.
Understanding of the tools and techniques used by SOC and Incident Response teams.
Forensic experience with full network packet capture tools and understanding of common network protocols.
Experience with typical security technologies i.e., SIEM, NDR, EDR, Firewalls, proxies, IDS/IPS (snort, bro), DLP, endpoint solutions, access control.
Solid understanding of large-scale networking technologies.
Solid troubleshooting skills — Windows, Linux, and network environments.
Knowledge of scripting languages (e.g., Python, BASH).
SANS GIAC or similar certification would be beneficial but not required.
If you're passionate about hunting and have a strong technical knowledge, then please send Gareth Davies @ Trident Search a message and apply now
SOC Team Lead
RemoteRemote£60,000-£70,000
Trident Search have exclusively partnered with a MS MSSP who are looking to hire their next L3 Team Lead. We have made 20+ placements with this client and have plenty of candidates who will attest to the technical standard of this client. You will be joining a high-performing team in a cutting-edge SOC where you'll oversee investigations, respond to incidents, provide customer-facing communication, and ensure operational excellence within the SOC.
Location: Remote
Hours: 09:00-17:30 (no on-call)
Reports To: SOC Manager
Key Responsibilities:
Lead investigations into security incidents, breaches, and anomalies escalated to the SOC through the ITSM platform. Work closely with SOC analysts to conduct thorough and prompt analysis.
Ensure all investigations are conducted according to established security protocols and procedures.
Utilize and fine-tune advanced security tools such as SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention Systems), and EDR (Endpoint Detection and Response) to detect and mitigate potential threats.
Serve as a point of contact for customers during security incidents, providing clear, concise, and reassuring communication.
Address customer inquiries regarding ongoing incidents and security threats, offering knowledgeable responses and technical clarity.
Conduct regular service delivery meetings with clients to enhance satisfaction and ensure their needs are being met during and after incidents.
Ensure that security incidents are reported in a timely and accurate manner to senior management and relevant stakeholders.
Provide guidance and mentorship to SOC analysts through regular one-on-one sessions. Set high standards for behavior and performance and support the professional growth of the team.
Identify training gaps and arrange development opportunities to ensure the SOC team maintains up-to-date knowledge of the latest security trends and tools.
Foster a high-performance team culture, recognizing achievements and addressing any challenges that may arise within the team
Experience:
3-5 years of experience in a SOC where you've had some leadership responsibilities.
Able to discuss IR engagements you've had experience with: Ransomware Attacks, Malicious Insider, Malware Investigation
Proficient in using and managing SIEM systems, IDS/IPS, EDR, and other security technologies. Familiarity with Microsoft environments and associated security tools is highly desirable.
Experience with SOAR capabilities, including security orchestration, automation of workflows, and incident response playbook development, to streamline and enhance operational efficiency in security processes.
Proven ability to lead investigations and manage escalated security incidents, ensuring prompt resolution and minimal impact.
Ability to remain composed under pressure and effectively lead teams during high-stress incidents.
Desirable Skills:
Experience with Microsoft-based security solutions and technologies. You may also use Crowdstrike, Darktrace, Elastic etc.
Certifications: GCIH, GCFA, MS certs etc.
CTM / CTL
RemoteRemote£50,000-£85,000
Trident Search have exclusively partnered with a growing Offensive Security consultancy. They are now one of the largest hirers of Pentesters in the UK with roughly 50+ consultants across all teams. We are looking to make 4 hires in Q1 2025 and are only accepting applicants from candidates that have active CSTM/CRT or CSTL/CCT - it'd be advantageous if you already hold SC clearance, but we're able to put you through vetting if you don't.
You will be based from your home with no office requirement. There will be a mix of on site and remote work available, aiming towards 70-75% utilisation and we're open to both CTL Web app and CTL Inf testers
Responsibilities:
Conduct a mixture of public sector engagements under the guidance of CHECK scheme, private and commercial clients too
Produce professional reports that compliment your ability as a consultant
Support the Account Management through scoping and client calls
Complete QA activities as and when required
Experience:
At minimum 2 years experience for all CTM's, CTL's would naturally exceed this
Range of testing experience from: Web App, Inf Internal/External, Cloud Config reviews, mobile, wireless etc.
Relative Certifications: CSTM, CSTL - CRT, CCT.
Bonus: Offensive Security Certs and coding experience
Please reach out to Gareth Davies @ Trident Search if you're interested in the role.
Partner
RemoteRemoteUp to $300k base plus bonuses and benefits
Trident Search has been retained by a boutique cybersecurity services firm to find a RevGen-focused Partner ready to take the lead in driving growth and leadership.
Ideal Candidate:
- Big 4/Top 10 CPA or consulting professionals with a cybersecurity background.
- Ready to step out from "second fiddle" roles to CPA partners and lead from the front.
- Can generate $5M revenue per year
What We’re Looking For:
- A proven leader with a technical cyber background.
- Someone who understands the full suite of cybersecurity services and can sell, deliver, lead, and manage.
- Deeply networked, with the ability to leverage connections to drive new revenue growth.
- Located in or near a major city, prepared to dominate locally while contributing nationally.
- Active and visible within the community.
The Opportunity:
- Remote role (anywhere in the U.S.).
- Buy-in to the Partnership.
- Significant wealth creation with a monetary event in 2–3 years.
- Flexibility to shape the role—open to creating new service lines to complement existing offerings.
Package:
- Up to $300,000 base
- Annual Bonus
- Utilization Bonus
- MBO
- Partner Distributions
- Benefits
If this sounds like you, I want to hear from you!
Account Executive
New YorkUnited States$150,000 basic, $300,000 OTE
Account Executive - Cyber Startup
OTE: $300,000 - $310,000 (50/50 split)
VC backed, fast growth Cyber startup
The Company:
This is an opportunity to join a cutting-edge cybersecurity company backed by leading venture capital firms.
Known for their exceptional breach and attack simulation tools and security posture management solutions, the company is entering an exciting, new growth phase.
These products deliver immediate and measurable results, helping organizations strengthen cybersecurity defenses.
With a proven track record of success across industries, including global financial services and multinational corporations, this company offers a collaborative and innovative environment where success is recognized and rewarded.
The Role:
As an Account Executive covering the NYC and Tri State area you will play a key role in driving sales growth, developing strategic plans, and building relationships with clients.
This position demands a hands-on approach, a strong understanding of the cybersecurity landscape, and the ability to thrive in a fast-paced, startup-like environment.
Key Responsibilities:
Develop and execute strategic sales plans to exceed revenue goals.
Work closely with internal teams—marketing, customer success, and product—to identify client needs and provide solutions.
Build and maintain strong relationships with key accounts, delivering exceptional results.
Contribute to a collaborative, success-driven team culture.
Experience Needed:
8-10 years of cybersecurity sales experience selling a platform / a cyber SAAS product. (This is essential for this hire.)
Proven track record of meeting or exceeding revenue targets.
You will be a high performer with a successful track record.
Experience working with breach and attack simulation (BAS) or cloud security posture management (CSPM) solutions is a strong plus, a similar platform sales background will also suit.
Ability to demonstrate consistent success in scaling sales efforts and increasing revenue.
East Coast-based, with the ability to travel as needed.
Why Join?
This is a very lucrative sales role, you will be the go to rep for this territory and have the chance to make it your own.
The senior leadership here are very supportive and will back you fully to succeed.
My client are VC backed and investing into Sales, Marketing and all aspects of GTM.
This brand is established and recognized there are a lot of great use cases to build on and success stories to share,
Connect with me today: Ed Carr - Associate Director at Trident Search.
I build GTM Teams across the US for VC and PE Backed Cyber Vendors.
Account Executive - Cyber Startup
OTE: $300,000 - $310,000 (50/50 split)
VC backed, fast growth Cyber Security startup.
Enterprise Account Executive - Tri State area.
Account Executive - Spain
RemoteRemote100000
About the job
The Client:
This company is a leading cybersecurity vendor with a strong global presence, providing innovative solutions to organisations across various industries. With a strong focus on offensive security, they empower businesses to proactively defend against cyber threats and build a resilient security posture.
The Role:
We are seeking a highly motivated and results-oriented Account Executive to join their expanding sales team. You will be responsible for developing and executing sales strategies within the Iberia region, focusing on identifying and closing new business opportunities with enterprise-level clients.
This role demands a dynamic individual with a proven track record of success in complex sales cycles and a deep understanding of the cybersecurity landscape.
Key Responsibilities:
Identify, qualify, and pursue new business opportunities within the Iberia regions.
Develop and execute strategic account plans to penetrate target accounts and build long-term relationships.
Conduct in-depth market research and competitive analysis to identify key industry trends and opportunities.
Deliver compelling product demonstrations and presentations to C-level executives and key decision-makers.
Negotiate contracts and close deals effectively, meeting and exceeding revenue targets.
Build and maintain strong relationships with key stakeholders, including channel partners and industry influencers.
Stay abreast of the latest cybersecurity trends, technologies, and competitive landscape.
Actively participate in industry events and conferences to generate leads and build brand awareness.
Provide valuable market feedback to product management and marketing teams.
Experience Needed:
5+ years of successful experience in enterprise cyber sales, with a proven track record of exceeding revenue targets.
Demonstrable experience selling cybersecurity solutions to enterprise clients within the Iberia region.
Strong understanding of the cybersecurity landscape, including key industry trends, challenges, and technologies.
Excellent communication, presentation, and interpersonal skills with the ability to build rapport and trust with clients.
Proven ability to navigate complex sales cycles and negotiate contracts effectively.
Strong business acumen and analytical skills with the ability to analyse market data and develop effective sales strategies.
Fluency in English and Spanish.
Bachelor's degree in Business, Marketing, or a related field preferred.
Apply ASAP
Connect with us at Trident Search. We are a specialist Search & Build business focused on connecting top talent with high-growth technology companies.