Charterhouse Group is a UK based, PE backed, value-added reseller providing a wide range of technology solutions across the Unified Communications, Cyber Security, LAN and Microsoft Teams spaces.
We are looking for talented and highly motivated people. We understand that the key to our success is our people. For this reason, we are committed to attracting and retaining the best possible candidates. Therefore, we offer a fun, innovative and a fast-paced environment where career development, reward and recognition are a priority.
If you want to join a multi award-winning business, passionate about technology and its customers, credible in the market with a stimulating working environment - then we want to speak to you.
As a member of the SOC team, you will provide security analysis of customer security events, monitor, manage, and support highly secure customer environments with a focus on security event management, endpoint security, and next-generation intrusion prevention/firewalling for a portfolio of small and medium businesses.
This role is ideal for someone early in their cybersecurity career, looking to gain hands-on experience with enterprise-grade security technologies in a fast-paced SOC environment.
Monitor SIEM, EDR, and SOAR platforms for security alerts, ensuring timely detection and escalation.
Conduct initial triage of security events and incidents, escalating to L2/L3 teams when required.
Assist with running vulnerability scans and interpreting results.
Support incident response activities and document investigation findings.
Perform packet-capture analysis and support network traffic investigations.
Use threat intelligence sources to aid in investigations.
Maintain accurate shift logs and participate in daily SOC briefings.
Be part of an on-call rotation for after-hours support, when required.
Contribute to SOC knowledge base and process improvements.
Requirements
Microsoft Security configuration knowledge – Defender for Endpoint/Email/Sentinel
SIEM tool operations – Detection and response to security events (Rapid7, QRadar, LogRhythm, or similar)
EDR operations – Detection and response using SentinelOne, Microsoft Defender for Endpoint, or similar
Knowledge of vulnerability scanning tools (Rapid7 iVM, Qualys, or similar)
Understanding of SOAR platforms
Experience with packet-capture tools and analysis of packet flows
Familiarity with Behaviour Analytics platforms
Exposure to using Threat Intelligence in investigations
Strong understanding of network technologies and how cybersecurity risks affect them
Relevant certifications such as CompTIA Security+, Network+, CySA+, or equivalent