Oxford Ionics Logo

Oxford Ionics

SOC Analyst

Posted 4 Days Ago
Be an Early Applicant
In-Office
Oxford, Oxfordshire, England
Mid level
In-Office
Oxford, Oxfordshire, England
Mid level
The SOC Analyst will enhance detection and response capabilities, investigate security alerts, and collaborate with stakeholders to improve security processes.
The summary above was generated by AI

Quantum is now, and it's built here.

Using our world-leading trapped-ion technology, we’re building the most powerful, accurate and reliable quantum systems to tackle problems that today’s supercomputers cannot solve. Joining means becoming part of a global IonQ team that is transforming the future of quantum technology - faster, at scale, and with real world impact.

IonQ, Inc. [NYSE: IONQ] is the world’s leading quantum company delivering solutions to solve the world’s most complex problems. IonQ’s newest generation quantum computers, IonQ Tempo and IonQ Forte Enterprise, are the latest in cutting-edge systems that have been helping customers and partners such as Amazon Web Services, AstraZeneca, and NVIDIA achieve 20x performance results. The company achieved 99.99% two-qubit gate fidelity, setting a world record in quantum computing performance in 2025.

The company is accelerating its technology roadmap and intends to deliver the world’s most powerful quantum computers with 2 million qubits by 2030 to accelerate innovation in drug discovery, materials science, financial modeling, logistics, cybersecurity, and defense. IonQ’s advancements in quantum networking position the company as a leader in building the quantum internet.
What to Expect:

We are looking for a Security Operations Center (SOC) Analyst to join our Security team at Oxford Ionics, part of IonQ. In this role, you will be responsible for strengthening the end to end detection and response capability across the business, with a particular focus on Oxford Ionics data, systems and regional security operations needs. You will contribute to the team’s mission of building a more mature, responsive and effective security function that can protect a fast moving deep-tech environment.

You will play an important part in shaping the monitoring, investigation and response capabilities that support our work in building the world’s most advanced quantum systems. This is a hands-on role for someone who can quickly embed into the environment, work confidently across incidents and tooling, and proactively make the security operation stronger over time.

What You'll be Doing:

In this position, you will work across the full lifecycle of security operations, from alert triage and investigation through to incident response, containment and continuous improvement. You will partner closely with the wider US SOC function, while acting as a key point of ownership for Oxford Ionics systems and data, ensuring that incidents are understood, handled effectively and followed through properly.

You will also help improve how the environment is monitored and defended by contributing to Splunk content, detection logic, playbooks and workflows. This role suits someone who is equally comfortable investigating live security issues and making practical improvements to the systems, tooling and processes behind them.

Key responsibilities include:

  • Investigate, triage and respond to security alerts and incidents across endpoint, network, cloud and identity environments
  • Act as a regional security operations partner for Oxford Ionics, working closely with the US SOC and local stakeholders on escalations and follow-through
  • Use Splunk and other security tooling to analyse logs, correlate events, identify root cause and assess scope and impact
  • Execute or coordinate containment, remediation and recovery actions with sound judgement and clear documentation
  • Improve detections, playbooks, workflows and security processes to strengthen the overall effectiveness of the SOC function

Requirements

To be successful, you will need strong hands-on experience in SOC operations, incident response and security investigations within a commercial technology or complex technical environment. We are looking for someone who can operate with a high degree of independence, bring sound judgement to live incidents, and understand that effective security decisions need to account for architectural and operational context, not just technical theory.

You should be comfortable working across multiple systems and data sources, and able to move between analyst and engineering style work where needed. The right person will be motivated, practical and proactive, with the confidence to take ownership quickly and contribute from day one in a growing and evolving security environment.

You’d be a great fit with:

  • 3 to 6 years of experience in SOC, incident response or security operations, with proven hands-on responsibility rather than monitoring only
  • Strong working knowledge of Splunk, incident investigation, log analysis and detection or alert tuning
  • Good technical grounding across Linux, enterprise systems, identity, endpoints, networks and security tooling
  • Scripting or automation capability in Python and ideally PowerShell, with the ability to improve efficiency and operational response
  • Experience in a commercial technology, manufacturing or similarly complex environment where changes require good judgement and system awareness

Benefits

Be part of a team that’s shaping the future of quantum. We offer more than just a role, you’ll join a world class community of scientists, engineers and innovators working to unlock the full potential of quantum computing.

We offer a range of benefits, including opportunities to further your career alongside industry leaders, a competitive salary with IonQ stock options, an annual performance bonus, generous annual leave, flexible hybrid working, private medical and dental insurance for you and your family, and much more.

Join us and be part of the future of quantum computing.

We’re proud to be an equal opportunity employer and welcome applicants from all backgrounds.

Top Skills

Linux
Powershell
Python
Splunk

Similar Jobs

22 Days Ago
Hybrid
Junior
Junior
Information Technology • Business Intelligence
The SOC Analyst monitors and responds to security incidents and alerts, improves automation processes, and collaborates with customers and partners to enhance security solutions.
Top Skills: KqlMicrosoft Security ProductsPower BIPowershell
12 Days Ago
Hybrid
London, Greater London, England, GBR
Senior level
Senior level
eCommerce
The role involves developing SOC processes, managing security incidents, collaborating with teams, handling vulnerabilities, and reporting metrics.
Top Skills: AWSEndpoint ProtectionGCPIds/IpsIso27001Mitre Att@CkNist CsfPci DssProxiesScannersSIEMWaf
9 Hours Ago
In-Office or Remote
London, Greater London, England, GBR
Mid level
Mid level
Fintech • Software • Financial Services • Cryptocurrency
As a SOC Analyst (Level 2), you'll manage high-severity alerts, lead investigations, coordinate with teams, and mentor Level 1 analysts while enhancing SOC operations.
Top Skills: BashCrowdstrikeDefenderElasticJIRAPythonSentinelServicenowSIEMSplunk

What you need to know about the London Tech Scene

London isn't just a hub for established businesses; it's also a nursery for innovation. Boasting one of the most recognized fintech ecosystems in Europe, attracting billions in investments each year, London's success has made it a go-to destination for startups looking to make their mark. Top U.K. companies like Hoptin, Moneybox and Marshmallow have already made the city their base — yet fintech is just the beginning. From healthtech to renewable energy to cybersecurity and beyond, the city's startups are breaking new ground across a range of industries.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account