Team Leader SOC Analyst Based on site in Birmingham Monday - Friday (9-5)Outside IR35The ideal candidate must hold an active security clearance (SC) due to the time scale of the project The candidate will need to have worked in a SOC, perform Tier 3 functions and be an overall Manager for all the shifts.What's in Store for You:Cutting-Edge Technological Playground: Delve into LogRhythm, Splunk, Darktrace (Threat Visualizer), and FireEye (EX, NX, HX, CMS) - platforms where your expertise shines brightest.Mastering Networks: Navigate the OSI Reference Model and engage with various network communication protocols with finesse.Unleash Action: Dive deep into incident response, log analysis, and PCAP analysis - your canvas for showcasing cybersecurity excellence.Digital Sleuth: Investigate Windows/Linux systems, uncovering signs of compromise with your digital magnifying glass.Communication Virtuoso: Translate cybersecurity risks into language that resonates with business objectives.Incident Commander: Lead security incidents with strategic finesse, providing user-centric updates along the way.Guardian of Cyber Realms: Implement Defensive Cyber-attack methodologies and frameworks, safeguarding digital territories with your toolkit.Scripting Expertise: Elevate your game with foundational scripting knowledge, adding an extra layer of brilliance to your arsenal.SOC Mastery: Your journey through Security Operations Centers or as a security analyst equips you to handle incidents across a spectrum of tools.Why Choose Us?Continuous Learning Environment: Elevate your skills in an ecosystem that thrives on constant growth and development.Talented Team Collaboration: Work alongside a diverse and highly skilled cohort, fostering innovation and creativity.Cutting-Edge Challenges: Tackle the latest security challenges head-on, equipped with the most advanced technology available.
May 01, 2024
Full time
Team Leader SOC Analyst Based on site in Birmingham Monday - Friday (9-5)Outside IR35The ideal candidate must hold an active security clearance (SC) due to the time scale of the project The candidate will need to have worked in a SOC, perform Tier 3 functions and be an overall Manager for all the shifts.What's in Store for You:Cutting-Edge Technological Playground: Delve into LogRhythm, Splunk, Darktrace (Threat Visualizer), and FireEye (EX, NX, HX, CMS) - platforms where your expertise shines brightest.Mastering Networks: Navigate the OSI Reference Model and engage with various network communication protocols with finesse.Unleash Action: Dive deep into incident response, log analysis, and PCAP analysis - your canvas for showcasing cybersecurity excellence.Digital Sleuth: Investigate Windows/Linux systems, uncovering signs of compromise with your digital magnifying glass.Communication Virtuoso: Translate cybersecurity risks into language that resonates with business objectives.Incident Commander: Lead security incidents with strategic finesse, providing user-centric updates along the way.Guardian of Cyber Realms: Implement Defensive Cyber-attack methodologies and frameworks, safeguarding digital territories with your toolkit.Scripting Expertise: Elevate your game with foundational scripting knowledge, adding an extra layer of brilliance to your arsenal.SOC Mastery: Your journey through Security Operations Centers or as a security analyst equips you to handle incidents across a spectrum of tools.Why Choose Us?Continuous Learning Environment: Elevate your skills in an ecosystem that thrives on constant growth and development.Talented Team Collaboration: Work alongside a diverse and highly skilled cohort, fostering innovation and creativity.Cutting-Edge Challenges: Tackle the latest security challenges head-on, equipped with the most advanced technology available.
Tier 3 Cyber SOC Analyst - Full time Contract - 9 months I am working with an award-winning insurance company who have are offering a 9 month, full-time contract starting ASAP with extension potential. You will be working hybrid 1/2 a week in London and work 9-5pm shifts, so this role is great for someone who wants a stable work-life balance. My client are looking for someone with: British Nationality Experience as a Tier 3 SOC analyst/Incident Responder OR experience as a Tier 3 SOC Engineer undertaking the activities of Threat Hunting and Detections Engineering Splunk experience Mentored Tier 1/2 SOC analysts Strong problem solving ability, with flexibility to think creatively and adapt to and implement rapidly changing systems and services If you are looking for a great opportunity to work with a diverse and dedicated team, to learn new skills, and work with cutting edge security technology, then this one is for you! My client are interviewing next week, so if you're interested please email me asap at or message me on LinkedIn so I can share further details on rate and company info. Lawrence Harvey is acting as an Employment Business in regards to this position. Visit our website and follow us on Twitter for all live vacancies (lawharveyjobs)
Apr 25, 2024
Full time
Tier 3 Cyber SOC Analyst - Full time Contract - 9 months I am working with an award-winning insurance company who have are offering a 9 month, full-time contract starting ASAP with extension potential. You will be working hybrid 1/2 a week in London and work 9-5pm shifts, so this role is great for someone who wants a stable work-life balance. My client are looking for someone with: British Nationality Experience as a Tier 3 SOC analyst/Incident Responder OR experience as a Tier 3 SOC Engineer undertaking the activities of Threat Hunting and Detections Engineering Splunk experience Mentored Tier 1/2 SOC analysts Strong problem solving ability, with flexibility to think creatively and adapt to and implement rapidly changing systems and services If you are looking for a great opportunity to work with a diverse and dedicated team, to learn new skills, and work with cutting edge security technology, then this one is for you! My client are interviewing next week, so if you're interested please email me asap at or message me on LinkedIn so I can share further details on rate and company info. Lawrence Harvey is acting as an Employment Business in regards to this position. Visit our website and follow us on Twitter for all live vacancies (lawharveyjobs)
City, London
Blackthorn Trace
Blackthorn Trace have partnered with a global leading financial services industry who are building a Cyber Threat team across the UK, US and Canada. With the financial services industry constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, my client are creating a Cyber Threat Center charged with ensuring all equities are secure against all tiers of adversaries. You will work within the central hub for Computer Operations and be on the front lines of security incident response, threat hunting, and intelligence. Hours - 6am - 2.30pm, 2 days per week from home. Responsibilities Act a senior member of the Cyber Threat Center who handles security events and incidents on a daily basis in a fast-paced environment. Acts as an Incident Handler who can handle minor and major security incidents within the defined Computer Security Incident Response process. Role embodies Cyber Network Defense and a successful Cyber Threat Analyst will be able to quickly analyze threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm. Maintains situational awareness for cyber threats across the global firm and take action where necessary. Daily responsibilities include, but are not limited to: Countermeasure deployment across various technologies. Malware and exploit analysis. Intrusion monitoring and response. Assessing alerts and notifications of event activity from intrusion detection systems and responding accordingly to the threat. Continuing content development of threat detection and prevention systems. Data analysis and threat research. Experience and Skills Systems administrator experience in Linux, Unix, Windows or OSX operating systems. Knowledge of networking and the common network protocols. Demonstrated ability to create complex scripts, develop tools, or automate processes Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis. Demonstrated ability to perform static and dynamic malware analysis. Demonstrated ability to analyze large data sets and identify anomalies. Demonstrated ability to quickly create and deploy countermeasures under pressure. Familiarity with common infrastructure systems that can be used as enforcement points. One or more of the following certifications or the ability to obtain within 1 year: CISSP: Certified Information Systems Security Professional CCNA: Cisco Certified Network Associate SANS: GCIH - Incident Handler SANS: GCIA - Intrusion Analyst Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation. Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles. PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.
Feb 15, 2019
City, London
Blackthorn Trace
Blackthorn Trace have partnered with a global leading financial services industry who are building a Cyber Threat team across the UK, US and Canada. With the financial services industry constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, my client are creating a Cyber Threat Center charged with ensuring all equities are secure against all tiers of adversaries. You will work within the central hub for Computer Operations and be on the front lines of security incident response, threat hunting, and intelligence. Hours - 6am - 2.30pm, 2 days per week from home. Responsibilities Act a senior member of the Cyber Threat Center who handles security events and incidents on a daily basis in a fast-paced environment. Acts as an Incident Handler who can handle minor and major security incidents within the defined Computer Security Incident Response process. Role embodies Cyber Network Defense and a successful Cyber Threat Analyst will be able to quickly analyze threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm. Maintains situational awareness for cyber threats across the global firm and take action where necessary. Daily responsibilities include, but are not limited to: Countermeasure deployment across various technologies. Malware and exploit analysis. Intrusion monitoring and response. Assessing alerts and notifications of event activity from intrusion detection systems and responding accordingly to the threat. Continuing content development of threat detection and prevention systems. Data analysis and threat research. Experience and Skills Systems administrator experience in Linux, Unix, Windows or OSX operating systems. Knowledge of networking and the common network protocols. Demonstrated ability to create complex scripts, develop tools, or automate processes Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis. Demonstrated ability to perform static and dynamic malware analysis. Demonstrated ability to analyze large data sets and identify anomalies. Demonstrated ability to quickly create and deploy countermeasures under pressure. Familiarity with common infrastructure systems that can be used as enforcement points. One or more of the following certifications or the ability to obtain within 1 year: CISSP: Certified Information Systems Security Professional CCNA: Cisco Certified Network Associate SANS: GCIH - Incident Handler SANS: GCIA - Intrusion Analyst Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation. Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles. PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.
SOC Analyst
Birmingham
£35,000 - £45,000
Benefits: 25 days annual leave + bank holidays, private medical, 10% pension, Life Insurance + further benefits
Our client a large digital transformation consultancy are looking for a SOC Specialist to join their current team. You will work as a SOC Analyst within a 24x7 SOC operational support environments incorporating a tiered security model across a range of security support functions.
The Opportunity
* This is an opportunity to work for a global leader within digital transformation across multiple business sectors and ultimately help organisations to create their firm of the future.
* You will join a rapidly growing Cybersecurity team that is continually dealing with emerging threats and vulnerabilities.
* You will work with the Senior SOC Specialist in the undertaking of system and security monitoring of supported commercial and government customer security deployments.
* Security Information and Event Management (SIEM)
* Network IDS/IPS management and support
* Web Application Firewalls (WAF)
* Incident Management
* Work with vendor TAC in provision of relevant information/logs
* Review and update of SOC support documentation
* Planning (change control management/representation at CAB)
Required Experience
* You will have/the ability to gain SC clearance along with Office for Nuclear Regulation clearance
* Requirement for flexibility in working hours, mixing standard core office hours during Monday - Friday with occasional requirements for late night working, weekend work and adhoc shift coverage – adaptable approach to work requirements is fundamental for role.
* Experience in systems (Linux/Unix) and networking
* Experience of vulnerability and threat assessment
* Experience of Intrusion detection and prevention systems
* Experience of Web-based application security
* Ability to develop custom code (Perl / shell scripting etc.)
If you are interested in this great opportunity, please do send your most up to date CV
Oct 29, 2018
SOC Analyst
Birmingham
£35,000 - £45,000
Benefits: 25 days annual leave + bank holidays, private medical, 10% pension, Life Insurance + further benefits
Our client a large digital transformation consultancy are looking for a SOC Specialist to join their current team. You will work as a SOC Analyst within a 24x7 SOC operational support environments incorporating a tiered security model across a range of security support functions.
The Opportunity
* This is an opportunity to work for a global leader within digital transformation across multiple business sectors and ultimately help organisations to create their firm of the future.
* You will join a rapidly growing Cybersecurity team that is continually dealing with emerging threats and vulnerabilities.
* You will work with the Senior SOC Specialist in the undertaking of system and security monitoring of supported commercial and government customer security deployments.
* Security Information and Event Management (SIEM)
* Network IDS/IPS management and support
* Web Application Firewalls (WAF)
* Incident Management
* Work with vendor TAC in provision of relevant information/logs
* Review and update of SOC support documentation
* Planning (change control management/representation at CAB)
Required Experience
* You will have/the ability to gain SC clearance along with Office for Nuclear Regulation clearance
* Requirement for flexibility in working hours, mixing standard core office hours during Monday - Friday with occasional requirements for late night working, weekend work and adhoc shift coverage – adaptable approach to work requirements is fundamental for role.
* Experience in systems (Linux/Unix) and networking
* Experience of vulnerability and threat assessment
* Experience of Intrusion detection and prevention systems
* Experience of Web-based application security
* Ability to develop custom code (Perl / shell scripting etc.)
If you are interested in this great opportunity, please do send your most up to date CV