11 of 11 CrowdStrike Jobs in the North of England

Cyber Security Engineer (Projects)

Hiring Organisation
Hays
Location
Manchester, North West, United Kingdom
Employment Type
Permanent
Salary
£55,000
DevSecOps processes Exposure to Tanium would be useful Skilled in using tools such as EDR, XDR, firewalls, WAF, and email security; experience with CrowdStrike, Palo Alto, and Microsoft Defender is advantageous. Hands-on experience with SIEM platforms, including configuration and data integration. Familiarity with cloud security, network security, and endpoint ...

Cyber Security Engineer Projects

Hiring Organisation
Hays Specialist Recruitment Limited
Location
Manchester, Lancashire, England, United Kingdom
Employment Type
Full-Time
Salary
£55,000 - £58,000 per annum
DevSecOps processes Exposure to Tanium would be useful Skilled in using tools such as EDR, XDR, firewalls, WAF, and email security; experience with CrowdStrike, Palo Alto, and Microsoft Defender is advantageous. Hands-on experience with SIEM platforms, including configuration and data integration. Familiarity with cloud security, network security, and endpoint ...

SOC Analyst - Level 3

Hiring Organisation
Hyperloop Recruitment
Location
Wirral, Merseyside, United Kingdom
Employment Type
Permanent
Salary
GBP Annual
Level 3 Analyst North West/Hybrid CrowdStrike LogScale SIEM Incident Response Threat Hunting The Company A rapidly growing UK-based cyber security provider is expanding its Security Operations Centre following continued demand for advanced MDR, SOC, and Incident Response services click apply for full job details ...

SOC Analyst - Level 3

Hiring Organisation
Hyperloop Recruitment
Location
Wirral, Merseyside, North West, United Kingdom
Employment Type
Permanent
Level 3 Analyst North West/Hybrid CrowdStrike | LogScale SIEM | Incident Response | Threat Hunting The Company A rapidly growing UK-based cyber security provider is expanding its Security Operations Centre following continued demand for advanced MDR, SOC, and Incident Response services. The organisation operates a modern 24×7 SOC delivering … stack includes cutting-edge EDR, identity protection, SIEM and automation tooling, with a strong focus on engineering a highly effective, cloud-native SOC environment. CrowdStrike | LogScale SIEM | Incident Response | Threat Hunting The Role This permanent position is ideal for an experienced SOC Level 3 Analyst looking to lead advanced detection ...

24/7 SOC Analyst

Hiring Organisation
Areti Group | B CorpTM
Location
Sheffield, UK
Employment Type
Full-time
hands-on experience investigating real-world incidents and understanding attacker behaviour. You'll use industry-leading platforms including Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike Falcon, SentinelOne, and Cortex XSOAR/XSIAM to determine what has happened, how activity progressed, and what actions are required. You'll be supported through … ability to distinguish legitimate vs suspicious activity. Desirable experience: Exposure to Microsoft Sentinel, Google SecOps, or other SIEM platforms. Experience with Defender, CrowdStrike, SentinelOne, or similar XDR tools. Ability to query using KQL, XQL, S1QL, CQL, or similar languages. Awareness of threat intelligence concepts. Basic scripting or coding knowledge. Working ...

24/7 SOC Analyst

Hiring Organisation
Areti Group | B CorpTM
Location
Manchester, UK
Employment Type
Full-time
hands-on experience investigating real-world incidents and understanding attacker behaviour. You'll use industry-leading platforms including Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike Falcon, SentinelOne, and Cortex XSOAR/XSIAM to determine what has happened, how activity progressed, and what actions are required. You'll be supported through … ability to distinguish legitimate vs suspicious activity. Desirable experience: Exposure to Microsoft Sentinel, Google SecOps, or other SIEM platforms. Experience with Defender, CrowdStrike, SentinelOne, or similar XDR tools. Ability to query using KQL, XQL, S1QL, CQL, or similar languages. Awareness of threat intelligence concepts. Basic scripting or coding knowledge. Working ...

24/7 SOC Analyst

Hiring Organisation
Areti Group | B CorpTM
Location
Preston, Lancashire, UK
Employment Type
Full-time
hands-on experience investigating real-world incidents and understanding attacker behaviour. You'll use industry-leading platforms including Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike Falcon, SentinelOne, and Cortex XSOAR/XSIAM to determine what has happened, how activity progressed, and what actions are required. You'll be supported through … ability to distinguish legitimate vs suspicious activity. Desirable experience: Exposure to Microsoft Sentinel, Google SecOps, or other SIEM platforms. Experience with Defender, CrowdStrike, SentinelOne, or similar XDR tools. Ability to query using KQL, XQL, S1QL, CQL, or similar languages. Awareness of threat intelligence concepts. Basic scripting or coding knowledge. Working ...

24/7 SOC Analyst

Hiring Organisation
Areti Group | B CorpTM
Location
Doncaster, South Yorkshire, UK
Employment Type
Full-time
hands-on experience investigating real-world incidents and understanding attacker behaviour. You'll use industry-leading platforms including Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike Falcon, SentinelOne, and Cortex XSOAR/XSIAM to determine what has happened, how activity progressed, and what actions are required. You'll be supported through … ability to distinguish legitimate vs suspicious activity. Desirable experience: Exposure to Microsoft Sentinel, Google SecOps, or other SIEM platforms. Experience with Defender, CrowdStrike, SentinelOne, or similar XDR tools. Ability to query using KQL, XQL, S1QL, CQL, or similar languages. Awareness of threat intelligence concepts. Basic scripting or coding knowledge. Working ...

24/7 SOC Analyst

Hiring Organisation
Areti Group | B CorpTM
Location
York, North Yorkshire, UK
Employment Type
Full-time
hands-on experience investigating real-world incidents and understanding attacker behaviour. You'll use industry-leading platforms including Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike Falcon, SentinelOne, and Cortex XSOAR/XSIAM to determine what has happened, how activity progressed, and what actions are required. You'll be supported through … ability to distinguish legitimate vs suspicious activity. Desirable experience: Exposure to Microsoft Sentinel, Google SecOps, or other SIEM platforms. Experience with Defender, CrowdStrike, SentinelOne, or similar XDR tools. Ability to query using KQL, XQL, S1QL, CQL, or similar languages. Awareness of threat intelligence concepts. Basic scripting or coding knowledge. Working ...

24/7 SOC Analyst

Hiring Organisation
Areti Group | B CorpTM
Location
Hull, East Yorkshire, UK
Employment Type
Full-time
hands-on experience investigating real-world incidents and understanding attacker behaviour. You'll use industry-leading platforms including Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike Falcon, SentinelOne, and Cortex XSOAR/XSIAM to determine what has happened, how activity progressed, and what actions are required. You'll be supported through … ability to distinguish legitimate vs suspicious activity. Desirable experience: Exposure to Microsoft Sentinel, Google SecOps, or other SIEM platforms. Experience with Defender, CrowdStrike, SentinelOne, or similar XDR tools. Ability to query using KQL, XQL, S1QL, CQL, or similar languages. Awareness of threat intelligence concepts. Basic scripting or coding knowledge. Working ...

24/7 SOC Analyst

Hiring Organisation
Areti Group | B CorpTM
Location
Newcastle upon Tyne, UK
Employment Type
Full-time
hands-on experience investigating real-world incidents and understanding attacker behaviour. You'll use industry-leading platforms including Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike Falcon, SentinelOne, and Cortex XSOAR/XSIAM to determine what has happened, how activity progressed, and what actions are required. You'll be supported through … ability to distinguish legitimate vs suspicious activity. Desirable experience: Exposure to Microsoft Sentinel, Google SecOps, or other SIEM platforms. Experience with Defender, CrowdStrike, SentinelOne, or similar XDR tools. Ability to query using KQL, XQL, S1QL, CQL, or similar languages. Awareness of threat intelligence concepts. Basic scripting or coding knowledge. Working ...