NOC & SOC Technician
Role details
Job location
Tech stack
Job description
Are you at your best when solving complex technical issues others can't?
Do you enjoy digging into alerts, fixing root causes, and improving systems so problems don't come back?
If you thrive in fast moving MSP environments where automation, performance, and security matter…
If so, this could be the role for you.
The Opportunity
We're looking for a hands on NOC & SOC Technician to operate at the core of our monitoring, automation, and security function across multi-client environments.
This isn't a ticket processing role.
You'll work on complex alerts, resolve issues end-to-end, and contribute to building a modern, automation-first NOC/SOC that delivers real outcomes.
You'll be part of a team that's shifting from reactive support to proactive, engineered operations.
What You'll Own
Complex Incident Diagnosis & Resolution
You'll take ownership of alerts across infrastructure and security platforms, not just triaging, but resolving.
You'll handle:
- Server and VM performance issues
- Storage (NAS/SAN, RAID, IOPS) alerts
- Network issues (SD-WAN, VPN, VLANs, routing)
- Firewall, switching, and wireless alerts
- Microsoft 365 and Azure signals
- Backup failures and DR anomalies
You won't just fix symptoms, you'll identify root causes and prevent recurrence.
Automation Driven Operations
You'll play a key role in shifting automation into the NOC/SOC function.
You will:
- Identify repeat issues and convert them into automation opportunities
- Contribute to scripts and remediation workflows
- Support automation platforms (e.g. Rewst)
- Help reduce manual workload across the business
This team owns automation and you'll help build it.
Advanced Scripting & Engineering Contribution
This isn't basic scripting.
You'll be working in environments where automation runs across thousands of endpoints.
You will:
- Develop and refine PowerShell scripts
- Work with Bash, JSON, and templating logic
- Support automation workflows and integrations (APIs)
You don't need to know everything but you need to be serious about developing here.
Security Detection & Response
You'll actively investigate and respond to security events across modern tooling.
You'll work with:
- EDR/XDR detections
- Huntress alerts
- Microsoft Sentinel (KQL-based alerts)
- Identity risks (Entra ID / ITDR)
And perform:
- Device isolation
- Malware remediation
- Identity enforcement (MFA / Conditional Access)
- Root cause analysis
You'll help improve detection quality and reduce noise over time.
Proactive Monitoring & Signal Quality
You'll help ensure alerts are meaningful, not noise.
You will:
- Improve monitoring thresholds
- Reduce false positives
- Validate patching and system health Contribute to
- 95% patch compliance
Continuous Improvement & Root Cause Elimination
We don't believe in fixing the same problem twice.
You will:
- Analyse recurring issues and propose permanent fixes
- Contribute to automation-driven ticket reduction
- Feed improvements back into monitoring and tooling
- Take part in structured NOC/SOC improvement cycles
You're expected to think beyond the ticket and improve the system.
Customer Experience & Ownership
You'll own issues through to resolution.
You will:
- Communicate clearly and confidently during incidents
- Minimise handoffs and friction
- Deliver a low-effort, high-confidence customer experience
What Makes This Role Different
This role combines:
Operational Execution (Run)
Owning alerts, incidents, and service quality day-to-day
Engineering Contribution (Improve & Automate)
Helping build automation, eliminate root causes, and improve systems
You won't just respond to issues… You'll help engineer them out of existence., We value capability over certificates, but the following are advantageous:
- CompTIA Network+
- CompTIA Security+
- Microsoft MD-102 (Endpoint Management)
- SC-200 / SC-900 (Security Operations)
- Vendor firewall certifications (Fortinet, WatchGuard, etc.)
- Huntress platform exposure
Why Join Us?
Because you'll be part of a modern, automation first NOC & SOC function where:
- Your work improves real systems - not just tickets
- You'll work with modern tooling (RMM, EDR, SIEM, automation platforms)
- Automation and engineering are valued - not just support
- You'll grow your technical depth and capability
- Your impact is visible and meaningful
Requirements
Do you have experience in VPN?, * Enjoy solving complex technical problems
- Are proactive - you fix and prevent, not just respond
- Are curious and always improving your technical depth
- Care about quality, documentation, and doing things properly
- Stay calm and structured under pressure
Technical Background We're Looking For
You don't need to tick every box but you should be comfortable operating at this level:
- 2-4 years in an MSP, NOC, SOC, or infrastructure support role
- Strong troubleshooting across servers, networking, endpoints, and identity
- Experience with RMM platforms and monitoring tools
- Exposure to security tooling (EDR, SIEM, identity protection)
- Understanding of patching, system health, and infrastructure operations
Scripting & Automation (Important)
- PowerShell experience (developing toward advanced)
- Exposure to automation workflows or scripting logic
- Interest in APIs, automation platforms, or orchestration
Certifications (or Equivalent Experience)