Leeds, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
most demanding environments. Role description BAE Systems have been contracted to undertake the day to day operation of (and incremental improvement of) a dedicated SecurityOperationsCentre (SOC) to support the defence of a major UK CNI organisation. The networks protected are predominantly hosted in Azure and … The SOC will be staffed by a blend of customer and BAE Systems staff, based in multiple locations, but with the day to day operations based from our Leeds office (due to the need for customer network access available at this location). The SOC Analyst roles are 'hands … part of a 24/7 operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC's Security Incident and Event Management (SIEM) toolsets to detect and investigate potential Security and Service Incidents occurring within the monitored networks. These roles require more »
I am seeking a SOC Shift Lead to join a leading defence organisation in Leeds. The purpose of this role is to ensure the security of the UK infrastructure & defend against cybercrimes. We have a day shift and a night shift available, working 4 days on 4 days off. … What you need: At least 4 years’ experience working in a Securityoperationscentre Experience working with: Splunk, sentinel or defender What’s on offer: A base salary up to £65,000 + 10% Bonus Opportunity to progress and lead a large-scale team Private: Medical, Dental more »
leading cybersecurity firm dedicated to protecting their clients from the latest threats and vulnerabilities. Their team of experts work tirelessly to provide top-notch security services, ensuring clients' data and systems are secure and resilient. Position Summary: As a SOC Analyst, you will be responsible for monitoring security events, conducting incident response, and providing threat intelligence. You will work closely with other SOC analysts to enhance securityoperations and protect clients from cyber threats. Key Responsibilities: Monitor security events and logs to identify potential security incidents. Perform incident analysis, classification, and response actions. … and recommend mitigation strategies. Collaborate with other SOC Analysts and Shift Leads on incident handling and investigations. Conduct threat hunting activities to identify potential security breaches. Assist in the tuning of security monitoring tools and systems. Prepare comprehensive incident reports and participate in service review preparations. Maintain excellent more »
Who we are A Managed Security Service Provider (MSSP) with a wealth of experience gained in the Defence and Commercial sectors. We help organisations of all sizes build cyber-security capabilities and maintain compliance through practical Consulting and Managed Services. Our suite of services blends together best-in … triage, remediation, threat assessment, vulnerability management, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our SecurityOperationsCentre (SOC) delivers an array of services that provide our Customers with robust end-to-end cyber security protection, from … become our Customers’ trusted partner. Role Description Talion is looking for an individual to take responsibility for the delivery of several of our Managed Security Service contracts to ensure that we meet Client expectations whilst delivering in line with budget and quality standards. They will act as the Client more »
IT Security Analyst Bromborough, Leeds or Caythorpe (Hybrid) £40,000 Gleeson Recruitment are working on a great opportunity alongside an incredible, longstanding organisation who are seeking a highly motivated and skilled SecurityOperationsCentre (SOC) Engineer. You will play a critical role in managing security … with NIST guidelines and governance requirements. Essential Requirements: * 5 years of experience in a technical SOC or cybersecurity role, * 5 years experience of Cyber Security investigations and incident response environments * Good knowledge of Anti Malware, Anti Phishing, EndPoint Detection and Response systems. * Good all round knowledge of different threat … scenarios, investigations, incident response processes and remdiation techniques. * Good knowledge of cyber security systems and tooling * Reasonable knowledge of Security Information and Event Management systems * Reasonable knowledge of Firewall systems (Fortigate essential) * Foundational knowledge of Security Orchestration, Automation and Response (SOAR) systems * Good knowledge of common operating more »