triage security alerts escalated from Tier 1 SOC analysts, determine severity and potential impact of the incident, and follow the triage process until closure. *ThreatAnalysis: Conduct in-depth analysis of security events to identify malicious activities, tactics, techniques, and procedures used by threat actors. *Security … Security Tool Management: Managing and configuring security tools, specifically Microsoft Sentinel and the Microsoft Defender suite including Defender for Cloud and Microsoft 365 Defender. *Threat Intelligence: Utilizing threat intelligence feeds and sources to stay up-to-date with the latest threats and vulnerabilities. *Collaboration: Collaborating with other members … in Kusto Query Language (KQL). Experience with the creation, configuration and use of Playbooks, Notebooks and Workbooks. Strong understanding of advanced cybersecurity concepts, threat landscape, and attack methodologies. Demonstrated experience in conducting in-depth incident analysis, threat hunting, and forensic investigations. People Source Consulting Ltd is more »
triage security alerts escalated from Tier 1 SOC analysts, determine severity and potential impact of the incident, and follow the triage process until closure. •ThreatAnalysis: Conduct in-depth analysis of security events to identify malicious activities, tactics, techniques, and procedures used by threat actors. •Security … Security Tool Management: Managing and configuring security tools, specifically Microsoft Sentinel and the Microsoft Defender suite including Defender for Cloud and Microsoft 365 Defender. •Threat Intelligence: Utilizing threat intelligence feeds and sources to stay up-to-date with the latest threats and vulnerabilities. •Collaboration: Collaborating with other members … in Kusto Query Language (KQL). Experience with the creation, configuration and use of Playbooks, Notebooks and Workbooks. Strong understanding of advanced cybersecurity concepts, threat landscape, and attack methodologies. Demonstrated experience in conducting in-depth incident analysis, threat hunting, and forensic investigations. more »
Liverpool, Merseyside, United Kingdom Hybrid / WFH Options
Sanderson Recruitment Plc
and develop new procedures as necessary. Security Platforms Management : Support, maintain, and govern all security platforms, including SIEM, NAC, Firewalls, endpoint security, and more. ThreatAnalysis and Response : Conduct advanced analysis of network, endpoint, and log data to determine root causes and impacts of security incidents. Vulnerability … an IT function. Strong expertise in using and supporting SIEM tools , Network Access Control , and Next-Gen Firewalls . Demonstrated ability to conduct thorough threatanalysis , forensic investigations , and manage cyber security incidents . Experience with vulnerability management tools and techniques. Solid understanding of enterprise IT technologies, including more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on … the organization's security systems to detect any suspicious activities early. ThreatAnalysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust security measures to protect the organization's information assets. Cross-Team Coordination … unified security strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyber threat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate more »
Lead Security Operations Analyst – Milton Keynes As a skilled SOC Analyst who is confident working on governance, incident management and threatanalysis, you will be working as part of a small but well-skilled team, reporting to the SOC Manager. This one could be for you! We have … and expansion of a very successful SOC Team. What you will ideally have experience of? Excellent communication skills (verbal & written) Governance Intrusion detection and analysis Cyber Security Incident management Threat Intelligence and understanding Cyber security qualifications are desirable *Must have Security Clearance or be eligible to obtain security more »
Ashby-De-La-Zouch, Leicestershire, East Midlands, United Kingdom
CMR & Life Sciences
Implementing secure network protocols such as SSL/TLS, HTTPS, SSH, SFTP, and secure industrial protocols for PRISMIC control systems. Conducting and maintaining ongoing threatanalysis and risk assessment processes to proactively identify and mitigate potential security risks for PRISMIC systems. Ensuring high standards of software quality control more »
Southampton, England, United Kingdom Hybrid / WFH Options
LexisNexis Risk Solutions
analyze security events for anomalous activity Be able to identify emerging security threats and develop/implement security programs Able to conduct vulnerability assessments, threatanalysis, and reporting. Experience/understanding of Cloud PlatformsAWS/GCP and Firewalls Possess a related credential for ethical hacking and security risk more »