and network professionals; provide mentorship and development opportunities. Collaborate with the wider IT and business teams to align infrastructure with business goals. Ensure compliance with cybersecurity standards and manage threatdetection and response strategies. Maintain documentation of infrastructure topology, configurations, and procedures. Manage relationships with third-party vendors, service providers, and contractors. Monitor system performance, identify bottlenecks, and More ❯
Sheffield, South Yorkshire, England, United Kingdom
True North Group
and network professionals; provide mentorship and development opportunities. Collaborate with the wider IT and business teams to align infrastructure with business goals. Ensure compliance with cybersecurity standards and manage threatdetection and response strategies. Maintain documentation of infrastructure topology, configurations, and procedures. Manage relationships with third-party vendors, service providers, and contractors. Monitor system performance, identify bottlenecks, and More ❯
adoption. Serve as the voice of the customer within the business, ensuring their expectations are understood and consistently met. Contribute to comprehensive customer reporting, including analysis of service performance, threatdetection trends, investigation outcomes, and related metrics such as SLAs, ingestion data, and vulnerability findings. Collaborate with engineering to identify opportunities for service enhancement and implement technical upgrades. More ❯
Level 1 (BLT1) or SC-200. This could be the perfect opportunity to transition into security and gain hands-on experience with cutting-edge technology. Gain hands-on experience: ThreatDetection & Response: Monitor security alerts using SIEM platforms (Splunk, Sentinel, QRadar, etc.) and respond quickly to potential threats. Incident Investigation: Analyze security incidents, conduct forensic investigations, and support … remediation efforts. Vulnerability Management: Identify, assess, and report on security risks, ensuring proactive mitigation strategies. Security Automation & Intelligence: Leverage SOAR platforms and threat intelligence tools to enhance detection capabilities and streamline responses. Collaboration & Communication: Work closely with senior analysts and clients to maintain smooth security operations. The Ideal Profile: Experience in an IT-focused role with a keen … cybersecurity and SOC operations. Proactive and analytical thinker with a strong problem-solving mindset. Passionate about emerging security technologies and best practices. Knowledge of core security concepts such as threat intelligence, phishing analysis, malware detection, and attack mitigation strategies. Eager to learn and contribute to a dynamic SOC environment where innovation and collaboration drive success. Ready to elevate More ❯