CrowdStrike Jobs in the Thames Valley

8 of 8 CrowdStrike Jobs in the Thames Valley

Cyber Incident Analyst

Maidenhead, Berkshire, United Kingdom
Hybrid / WFH Options
APM Terminals
collaborate with other teams, and build streamlined cross-departmental processes. Automation Development Identify repetitive tasks and develop automation ideas. Collaborate with automation teams to build capabilities using platforms like CrowdStrike Fusion, AWS Lambda, Azure Logic Apps, XSOAR, and Python scripts. Languages Good experience in query languages like KQL and Logscale for investigations and log analysis is highly desirable Managing More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Sales Specialist

Reading, England, United Kingdom
Hybrid / WFH Options
Ultima
and engagement. DESIRED KNOWLEDGE, SKILLS & EXPERIENCE Existing knowledge of the Cyber Security market including areas such as: Endpoint, Email, Identity, Cloud, Networking & Network Security. Vendors to include: Cisco, Mimecast, Crowdstrike, Delinea, Netskope, Palo Alto Networks, Proofpoint, Microsoft, Checkpoint, Tenable, Sophos, Trend Micro. Experience of solution selling including Professional Services & Managed Services. “Don’t meet every single requirement? Studies have More ❯
Posted:

L3 SOC Analyst

Reading, England, United Kingdom
La Fosse
and SOC workflows. Mentor and guide L1/L2 analysts, providing training, quality reviews, and escalation support. Design and execute proactive threat hunting campaigns using tools such as Defender, CrowdStrike, and custom scripts. Contribute to playbook development, automation improvements (including Microsoft Co-pilot integration), and process optimization. Produce executive-level incident reports, root cause analyses, and recommendations for remediation More ❯
Posted:

Principle SOC Analyst (Remote)

Slough, Berkshire, UK
Hybrid / WFH Options
Sanderson Government & Defence
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
Employment Type: Full-time
Posted:

Principle SOC Analyst (Remote)

Newbury, Berkshire, UK
Hybrid / WFH Options
Sanderson Government & Defence
flow, analysing threat data, and playing a key role in improving detection and response processes. You’ll be working across platforms like: Elastic SIEM Microsoft Sentinel Defender for Endpoint CrowdStrike Falcon MISP (Malware Information Sharing Platform) As the team scales, this role offers both strategic involvement and technical depth. There’s also the option to step into a management … happened, but why, how, and how to prevent it Comfortable being an escalation point for technical and analytical issues Working knowledge of key SIEM and EDR platforms (Elastic, Sentinel, CrowdStrike, etc.) Natural curiosity and willingness to get hands-on with data and investigations Broad exposure across cyber domains beyond pure SOC is highly valued Why This Role? Be a More ❯
Posted:

SOC Analyst

Reading, England, United Kingdom
La Fosse
days a week in Berkshire This L2 SOC Analyst will have the previous following experience: Monitor and investigate security alerts using tools such as Splunk, Microsoft Defender, and CrowdStrike, escalating incidents as needed and ensuring timely resolution. Leverage Microsoft Co-pilot and automation workflows to streamline threat detection, incident triage, and response processes. Conduct in-depth log analysis and More ❯
Posted:

Director of SOC

Reading, Berkshire, South East, United Kingdom
La Fosse
Oversee day-to-day operations of Cyber Defence teams (CERT, Security Tooling, Proactive Monitoring), managing advanced incident detection, threat hunting, and forensic investigations using platforms like Splunk, Defender, and CrowdStrike Collaborate with Security Engineering and Architecture to integrate AI/ML (e.g., Microsoft Copilot) and emerging security tech for real-time response, smarter automation, and enhanced endpoint/cloud More ❯
Employment Type: Contract
Rate: £675 - 720 per day
Posted:

Cyber Incident Response Manager

Reading, Berkshire, South East, United Kingdom
La Fosse
leveraging tools like Splunk and Defender to contain and mitigate threats Design, maintain, and continuously enhance playbooks, response frameworks, and tabletop exercises, incorporating threat intelligence and detection insights from CrowdStrike and Splunk to mature IR readiness. Lead root cause analysis and develop actionable remediation plans; deliver executive-level reporting and trend analysis using integrated dashboards, combining insights from Splunk More ❯
Employment Type: Contract
Rate: £635 - 675 per day
Posted:
CrowdStrike
the Thames Valley
25th Percentile
£41,250
Median
£42,500
75th Percentile
£43,750