team. Key Responsibilities: Monitor, detect, and respond to cyber security incidents in real-time and from various sources, such as network, endpoint, cloud, and threat intelligence. Conduct in-depth analysis of security events and alerts to identify potential threats. Identify and prioritize the cyber security incidents and escalate them … CSOC processes, technologies, and capabilities. Report and communicate the cyber security status, trends, and issues to the CSOC team leader. Enrich log data with ThreatIntelligence to provide context for observed suspicious events. Requirements: Bachelor's degree in Cybersecurity, Information Technology, or related field. Minimum of 3 years … officials and non-technical individuals. Strong understanding of network and system security principles. Relevant certifications (e.g., CISSP, CEH, GCIH) are a plus. Experience in threatintelligence and information sharing. Ability to work in a fast-paced, high-stakes environment. If you have the relevant experience and interested in more »
Analyst. You will be responsible for maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threatintelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling more »
West Midlands, England, United Kingdom Hybrid / WFH Options
Strativ Group
to innovation, sustainability, and safety. Day to Day Responsibilities: Investigate cyber security events and alerts from various sources, such as network, endpoint, cloud, and threat intelligence. Identify and prioritize the cyber security incidents and escalate them appropriately. Contribute to the development and improvement of the SOPs and Playbooks for … CSOC processes, technologies, and capabilities. Report and communicate the cyber security status, trends, and issues to the CSOC team leader. Enrich log data with ThreatIntelligence to provide context for observed suspicious events. What are we looking for: Proven experience in a Cyber Security Operations Centre. Strong team … player. Good knowledge of cyber threat landscape and attack vectors. Experience in incident detection, analysis, and resolution. Understanding of CNI and OT technology, including SCADA, ICS, and PLC systems. Proficiency in relevant cybersecurity tools and technologies. Excellent communication and stakeholder engagement skills. Knowledge of relevant regulations and compliance standards. more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
designing, developing, and maintaining our security information and event management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. What you’ll be doing • Data Ingestion and Enrichment: o Configure data pipelines for data ingestion from … various sources, primarily from Kafka o Enhance data enrichment by integrating threatintelligence feeds and contextual information. • SIEM Solution Development: o Collaborate with security analysts and architects to design and implement SIEM solutions o Optimize SIEM rules, alerts, and dashboards for efficient threat detection. • Security Engineering: o more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
West Midlands, England, United Kingdom Hybrid / WFH Options
Strativ Group
and key performance indicators. Investigate and resolve P4 and P3 cyber security events and alerts from various sources, such as network, endpoint, cloud, and threat intelligence. Identify and prioritize the cyber security incidents, escalate P1 and P2 incident to the Cyber Incident Response team. Review and validate the incident … What are we looking for: Proven experience in a Cyber Security Operations Centre. Proven experience in Cyber Incident Response. In-depth knowledge of cyber threat landscape and attack vectors. Expertise in incident detection, analysis, and resolution. Understanding of CNI and OT technology, including SCADA, ICS, and PLC systems. Proficiency more »