Security and Network Operations Centre Advisory and Design for Cloud Service

Our service focusses on the effective strategy, design, deployment, accreditation and operational running of a Security and Network Operations Centre (SOC / NOC). This service will enable you to pro-actively control activities and incidents taking place across your estate.


  • Aligning the strategy with your organisations overall risk posture
  • Capturing and validating the current security and network landscape
  • Reviewing supporting operational processes, procedures, and policies
  • Delivering operational transformation roadmaps and architecture designs
  • Providing informed threat analysis and current methods of cyber attack
  • Business led approach, responds quickly to change with minimal impact
  • Enable integrated event, fault and performance monitoring for incident resolution
  • Implementing configurations for event intake, correlation, aggregation, analysis and alerting
  • Create processes to support incident response management and rehersals
  • Defines the organisational structure for delivery of SOC and NOC


  • Ensures an impartial and completely independent advisory service
  • Supports business vision and promotes safe use of cloud technologies
  • Reduces risk exposure enabling maximum business use of cloud services
  • Ensures compliance with legal and regulatory obligations with clear auditability
  • Reduces CAPEX and OPEX spend through Business focused delivery
  • Delivers flexible solutions helping move your organisation forward at pace
  • Enhances delivery planning and cost management within SOC / NOC
  • Enables traceability between cost, risk and security controls
  • Ensures a consistent approach that is dependable, measurable and repeatable
  • Supports implementation, transition and accreditation of the SOC / NOC


£475 to £2800 per person per day

Service documents

G-Cloud 10



Sholto Vaughan

020 3102 4616



Planning service Yes
How the planning service works • Definition of the current state security operations model and the target architecture
• Definition of roadmap including transition states and migration planning to the target operating model
• Defining and prioritising work packages, articulating and managing dependencies, budgets, risks and benefits
• Buy in of key stakeholders and their management by describing the target and transition state architectures from stakeholder viewpoints
• Plan and approach for utilising commodity cloud services, open standards and open source security technologies
• Plan and approach for making best use of IaaS, PaaS and SaaS security capabilities in line with the architecture vision
• Coordinating the implementation and migration plan with the enterprise's approach to managing and implementing change
• Migration and succession planning from Managed Service Providers to in-house teams
Planning service works with specific services No


Training service provided No

Setup and migration

Setup and migration
Setup or migration service available Yes
How the setup or migration service works • Cloud migration strategy, including adoption of IaaS, PaaS and SaaS capabilities
• Definition of cloud-based security architecture, standards, patterns and best practices
• Security deployment design leveraging the cloud provider capabilities where appropriate and migration strategy of security components
• Data migration strategy, providing specialist guidance for secure transition of big data, relational data, documents and images
• Detailed work planning complete with migration steps and operational security readiness findings
• A migration security risk assessment and the projected resources needed to implement
• Ensuring that the target deployment topology conforms to the security non-functional requirements
Setup or migration service is for specific cloud services No

Quality assurance and performance testing

Quality assurance and performance testing
Quality assurance and performance testing service Yes
How the quality assurance and performance testing works We use in-house penetration testers to quality assure all our operational services prior to deployment. All strategy, architecture and design undergo internal quality assurance through peer review and governance boards.

Security testing

Security testing
Security services Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers Yes
Security testing certifications CREST

Ongoing support

Ongoing support
Ongoing support service No

Service scope

Service scope
Service constraints None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Dependent on severity - we have numerous service level agreements.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Support levels We offer multiple support levels dependent upon the type of support required. The cost for each service is based on specific Customer requirements. A Technical Account Manager is provided as standard for each client.


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)


Price £475 to £2800 per person per day
Discount for educational organisations No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑