3 of 3 CrowdStrike Jobs in Merseyside

SOC Analyst - Level 3

Hiring Organisation
Hyperloop Recruitment
Location
Wirral, Merseyside, United Kingdom
Employment Type
Permanent
Salary
GBP Annual
Level 3 Analyst North West/Hybrid CrowdStrike LogScale SIEM Incident Response Threat Hunting The Company A rapidly growing UK-based cyber security provider is expanding its Security Operations Centre following continued demand for advanced MDR, SOC, and Incident Response services click apply for full job details ...

SOC Analyst - Level 3

Hiring Organisation
Hyperloop Recruitment
Location
Wirral, Merseyside, North West, United Kingdom
Employment Type
Permanent
Level 3 Analyst North West/Hybrid CrowdStrike | LogScale SIEM | Incident Response | Threat Hunting The Company A rapidly growing UK-based cyber security provider is expanding its Security Operations Centre following continued demand for advanced MDR, SOC, and Incident Response services. The organisation operates a modern 24×7 SOC delivering … stack includes cutting-edge EDR, identity protection, SIEM and automation tooling, with a strong focus on engineering a highly effective, cloud-native SOC environment. CrowdStrike | LogScale SIEM | Incident Response | Threat Hunting The Role This permanent position is ideal for an experienced SOC Level 3 Analyst looking to lead advanced detection ...

24/7 SOC Analyst

Hiring Organisation
Areti Group | B CorpTM
Location
Liverpool, UK
Employment Type
Full-time
hands-on experience investigating real-world incidents and understanding attacker behaviour. You'll use industry-leading platforms including Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike Falcon, SentinelOne, and Cortex XSOAR/XSIAM to determine what has happened, how activity progressed, and what actions are required. You'll be supported through … ability to distinguish legitimate vs suspicious activity. Desirable experience: Exposure to Microsoft Sentinel, Google SecOps, or other SIEM platforms. Experience with Defender, CrowdStrike, SentinelOne, or similar XDR tools. Ability to query using KQL, XQL, S1QL, CQL, or similar languages. Awareness of threat intelligence concepts. Basic scripting or coding knowledge. Working ...