the support and development to succeed. A progressive organisation where you can really make a difference. We a great opportunity for a SOC Tier 3 Analyst to strengthen the SecurityOperations Center. As a Tier 3 CERT Analyst you will lead the investigation and remediation of advanced cyber threats, leveraging cutting-edge tools such as Splunk, Microsoft Sentinel … CrowdStrike, and Defender and other security stacks. You will handle complex incidents like APTs, malware, and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. Key Responsibilities: 1. Incident Detection and Response: o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze … and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioural analysis and threat intelligence data. o Analyse data from logs, network traffic, endpoint activities, and threat intelligence feeds to detect unusual or malicious activity. 3. Incident Forensics: o Perform in-depth forensic analysis to determine the scope, impact, and root cause More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
the support and development to succeed. A progressive organisation where you can really make a difference. We a great opportunity for a SOC Tier 3 Analyst to strengthen the SecurityOperations Center. As a Tier 3 CERT Analyst you will lead the investigation and remediation of advanced cyber threats, leveraging cutting-edge tools such as Splunk, Microsoft Sentinel … CrowdStrike, and Defender and other security stacks. You will handle complex incidents like APTs, malware, and data breaches, ensuring swift, effective responses to minimize risk to the organization and its clients. Key Responsibilities: 1. Incident Detection and Response: o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze … and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioural analysis and threat intelligence data. o Analyse data from logs, network traffic, endpoint activities, and threat intelligence feeds to detect unusual or malicious activity. 3. Incident Forensics: o Perform in-depth forensic analysis to determine the scope, impact, and root cause More ❯
Months Initial - Inside IR35 We are seeking a skilled SOAR Engineer/Analyst responsible for designing, developing, implementing, and maintaining automation playbooks to improve incident response efficiency within the SecurityOperationsCentre utilizing Google SecOps Role Overview: * Job Title: SOAR Engineer/Analyst (Google SecOps) * Location: Leeds/Remote * Contract Type: Contract * Duration: 12 months initially * Sector … Healthcare. Required Skills & Qualifications * Bachelor's degree in Computer Science, Cybersecurity, or related discipline, or equivalent hands-on experience. * 2-5 years of experience in securityoperations or security engineering. * Hands-on experience with SOAR platforms (eg, Cortex XSOAR, Splunk SOAR, IBM Resilient). * Strong familiarity with: o Google SecOps/Chronicle o Darktrace (AI-based threat … skills. Desirable Qualifications * Experience with CI/CD for playbook development and version control (eg, Git). * Familiarity with other SOC tools (eg, ServiceNow, Jira, Splunk, Elastic, SentinelOne). * Security certifications such as: SOAR-specific certifications (eg, Cortex XSOAR Certified Engineer) o CrowdStrike Certified Falcon Responder o Google Cybersecurity Certificate o General security certs (eg, CySA+, GCIH, CISSP More ❯
initial 6-month assignment with an option to extend. Location: Hybrid working - Bristol or Blackpool The Ideal candidate will hold active SC clearance and possess a strong background in SecurityOperationsCentre Architecture with the following skills and experience: - Experience designing a SecurityOperationsCentre (SOC) within a secure environment Experience implementing a target … operating model for a SecurityOperationsCentre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for Security Information and Event Management (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in risk and threat modelling within a high-threat government environment To apply More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
initial 6-month assignment with an option to extend. Location: Hybrid working - Bristol or Blackpool The Ideal candidate will hold active SC clearance and possess a strong background in SecurityOperationsCentre Architecture with the following skills and experience: - Experience designing a SecurityOperationsCentre (SOC) within a secure environment Experience implementing a target … operating model for a SecurityOperationsCentre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for Security Information and Event Management (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in risk and threat modelling within a high-threat government environment To apply More ❯
Job Title: DV Cleared SNOC Agent Location: London Duration: 6 months Rate: Up to 430 per day via an approved umbrella company The SecurityOperationsCentre (SOC) will run 24/7 to provide monitoring and alerting of Security Events. These Events will be triaged by the SOC and will, where appropriate, by dealt with as … an incident. The SOC is reinforced by the Network OperationsCentre, which similarly runs on a 24/7 basis and provides monitoring and resolution of network related faults. The SOC and NOC (together known as the SNOC) provide the primary route in to the Service for all Account-related incidents. The SNOC Agent will work on a … shift basis to provide continuous coverage of the SOC and to carry out the initial triage and resolution of Security-related events and incidents. This will be in line with agreed processes and procedures and will be supported by appropriate escalation paths. Required Skills: The role holder is self-sufficient and has recognized specialist skills supporting multiple products in More ❯
SNOC (Security & Network OperationsCentre) Agent Your role will involve: The SNOC Agent will work on a shift basis to provide continuous coverage of the SOC and to carry out the initial triage and resolution of Security-related events and incidents. This will be in line with agreed processes and procedures and will be supported by … appropriate escalation paths. Required Skills: The role holder is self-sufficient and has recognized specialist skills supporting multiple products in order to maintain the availability and security of the service. The role holder also delivers medium complexity work packages as part of customer implementation projects and has the ability to understand complex situations and activities, communicating basic technical information … to non-technical people. The role holder will be part of a shift rota that provides 24/7 cover for the SecurityOperations Centre. Target Start Date: ASAP Target End Date: 6 months from start date Recruitment Type: Contractor Rate: £430.00 per day Location of role (on site requirements): Full time onsite in London Clearance Required: DV More ❯