Job Description: Cyber Threat Analyst Roles and Responsibilities You must hold a UK passport only due to the security clearance; we can only accept single national status (2nd passport holders, OCI & ILR candidates can't be accepted) and you must have been in the UK for the last … The Tier 1 Cyber Security Analyst plays a critical role in the initial triage, monitoring, and reporting of potential cyber threats within the Cyber ThreatAnalysis Centre (CTAC). Working under the guidance of more senior analysts, the Tier 1 Analyst will use their foundational knowledge of security … and event management (SIEM) solutions to support the security operations team. They will also be proficient in utilizing Kusto Query Language (KQL) for log analysis and gain experience using multiple ticketing systems to manage incidents effectively, ensuring that we adhere to our service level objectives. Responsibilities: Monitor and review More ❯
Consultancy company, based in Glasgow, on multiple workstreams of a variety of complexity and scale. This is a mid-Tier position within the Cyber ThreatAnalysis Centre (CTAC), responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential … Analyst will work closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions. This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a shift allowance. … have active SC, moving to DV clearance and must have at least 6 months working experience in SIEM technologies. Responsibilities: Conduct escalated triage and analysis on security events identified by Tier 1 Analysts Apply expertise in SIEM solutions utilising Kusto Query Language (KQL) Identify and escalate critical threats to More ❯
Consultancy company, based in Glasgow, on multiple workstreams of a variety of complexity and scale. This is a mid-Tier position within the Cyber ThreatAnalysis Centre (CTAC), responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential … Analyst will work closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions. This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a shift allowance. … have active SC, moving to DV clearance and must have at least 6 months working experience in SIEM technologies. Responsibilities: Conduct escalated triage and analysis on security events identified by Tier 1 Analysts Apply expertise in SIEM solutions utilising Kusto Query Language (KQL) Identify and escalate critical threats to More ❯
of complexity and scale. The role plays a critical role in the initial triage, monitoring, and reporting of potential cyber threats within the Cyber ThreatAnalysis Centre (CTAC). Tier 1 Analysts will use their foundational knowledge of security information and event management (SIEM) solutions, to support the … in using multiple ticketing systems to manage incidents effectively, ensuring service level objectives are adhered to. Experience utilising Kusto Query Language (KQL) for log analysis will also be beneficial. This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a shift allowance. … Act as the first line of response for security incidents by identifying and classifying potential threats, escalating to higher tiers when necessary. Perform preliminary analysis on alerts. Create and manage incident tickets to track incident status Conduct and document formal handover/takeover procedures at the beginning and end More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
the forefront of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats. Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threatanalysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to … Skills & Experience: Strong understanding of OT/ICS cybersecurity or relevant control systems (SCADA/PLC) – training provided where required. Experience with network security, threat detection, and incident response. Knowledge of security frameworks and regulations including NIST, IEC, NIS Directive, and Cyber Kill Chain. Analytical mindset with the ability More ❯
operational dimension of the client’s Cybersecurity function. The role will collaborate with the Managed Cybersecurity Service Provider (MSSP) to protect the organisation. The threat landscape is increasing with the global geopolitical instability. The UK government is increasing the regulatory pressure on companies to ensure they are resilient against … and meet regulatory compliance requirements. You will: The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threatanalysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen … for? You should hold a degree in Computer Science, Cybersecurity, or a related field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. More ❯
operational dimension of the client’s Cybersecurity function. The role will collaborate with the Managed Cybersecurity Service Provider (MSSP) to protect the organisation. The threat landscape is increasing with the global geopolitical instability. The UK government is increasing the regulatory pressure on companies to ensure they are resilient against … and meet regulatory compliance requirements. You will: The role involves continuously monitoring the organisation's network and systems for potential security breaches while conducting threatanalysis, risk assessments, and vulnerability assessments. By identifying security risks, the position requires providing recommendations and implementing measures to remediate vulnerabilities and strengthen … for? You should hold a degree in Computer Science, Cybersecurity, or a related field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. More ❯