it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

11 jobs found

Email me jobs like this
Refine Search
Current Search
it cyber security analyst tier 2
MBDA UK
Network Security Engineer (SOC)
MBDA UK Stevenage, Hertfordshire
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
05/03/2026
Full time
An exciting opportunity for a passionate Network Security Engineer to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary: Circa £50,000depending on experience+ shift allowance Dynamic (hybrid) working: 5 days per week on-site due to workload classification, working a 24/7 Shift Pattern Security Clearance: British Citizen This role will require DV Clearance. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS) and a Security Check (SC) clearance, which are managed by the MBDA Personnel Security Team. What we can offer you: Company bonus: Up to £2,500 (based on company performance and will vary year to year) Pension: maximum total (employer and employee) contribution of up to 14% Overtime: opportunity for paid overtime Flexi Leave: Up to 15 additional days Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments Facilities: Fantastic site facilities including subsidised meals, free car parking and much more The opportunity: Join our forward thinking team as a Network Security Engineer, where you will play a key role in safeguarding our organisations' network infrastructure as part of the 24x7 Internal Security Response (ISR) team. When not involved in incident response and triage activity with the SOC team, you will be responsible for designing, implementing and maintaining robust security solutions to protect against evolving threats. Collaborating with cross-functional teams, you will work on implementing changes securely, identifying vulnerabilities, managing security incidents and ensuring compliance with industry best practices. The role will be involved in the optimisation of network security tools to remediate "purple team" highlighted areas identified for improvement. You will also have the opportunity to immerse your time into the standardisation of network tools. This is a dynamic opportunity to contribute to security initiatives, solve complex challenges, and have a direct impact on the overall resilience of our IT environment. If you are passionate about security and proactive defence, this role is the perfect fit. If you are looking to leverage your technical skills in a values-led company that values innovation and diversity, this is the place to make an impact. What we're looking for from you: ESSENTIALS Solid understanding of networking principles (TCP/IP, DNS, routing, switching, VLANS and load balancing) Strong expertise in configuring, maintaining and troubleshooting firewalls e.g. Cisco, Checkpoint, Palo Alto Demonstrable hands-on experience in next-gen firewalls and advancing security features like IPS/IDS, SSL decryption and deep packet inspection. Proven experience in managing secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL / TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber security capabilities and their integrations to networks infrastructure. Existing knowledge of / aptitude to learn Darktrace Antigena and Respond, Splunk ES or Log Rhythm tools. Strong ability to interpret complex information via use of packet capture in order to identify malicious traffic in detail, revealing attacker behaviours like C2, exploitation, lateral movement, or data exfiltration. Proven ability to review SOC alerting in collaboration with SOC analysts to effectively triage and manage Tier 1 SOC alerts to the appropriate outcome. Experience with LDAP, and application traffic flow root cause analysis. Previous experience to identify root cause from (TBC for review - Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools). Our company: Peace is not a given, Freedom is not a given, Sovereignty is not a given MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom. We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process. Follow us on LinkedIn (MBDA), X Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.
Certain Advantage
SOC Threat Detection Analyst
Certain Advantage Stevenage, Hertfordshire
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: 45ph - 85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online only) Sat to Tue Off Wed to Sun - Nights (Apply online only) (The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates) 28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
24/02/2026
Contractor
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: 45ph - 85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern: 28 day Cycle Sat to Tue - Earlies (Apply online only) Wed to Sun - Off Mon to Fri - Lates (Apply online only) Sat to Tue Off Wed to Sun - Nights (Apply online only) (The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates) 28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per week Initially may not be expected to do nights until team grows. SOC Threat Detection Analyst Job Description: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList and BlockList Attend routine security meetings Conduct activities in line with SOC Maturity and continuous improvement Skillset/experience required (Baseline): A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications. Knowledge of IT Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong analytical experience and mind-set. Experience within Defensive Cyber-attack methodologies and frameworks. Understanding of Malware capabilities, attack vectors, propagation and impact. Good communication skills liaising with the business and suppliers. Desirable Skillset/experience (Senior grade): Root cause analysis and leading T2 incident investigations Process / Playbook / Runbook development Working knowledge of detection engineering, false positive improvements Capability to tune SIEM rules or create custom detections Scripted automation experience e.g. Python, SOAR, PowerShell Threat modelling and Hunting methodologies
Security Analyst/Detection Engineer
Eteam Workforce Limited Corsham, Wiltshire
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Security Analyst/Detection Engineer Location: Corsham (Hybrid 2/3 days onsite)( 60% attendance in the office is required) Duration: 20/02/2026 Pay rate £537 GBP/day inside IR35 Candidate must hold an Active SC OR DV Clerance Role description: Good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge oenvironment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' Your role Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK If you are interested in this position and would like to learn more, please send through your CV and we will get in touch with you as soon as possible. Please note, candidates are often Shortlisted within 48 hours.
06/10/2025
Contractor
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Security Analyst/Detection Engineer Location: Corsham (Hybrid 2/3 days onsite)( 60% attendance in the office is required) Duration: 20/02/2026 Pay rate £537 GBP/day inside IR35 Candidate must hold an Active SC OR DV Clerance Role description: Good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge oenvironment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' Your role Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK If you are interested in this position and would like to learn more, please send through your CV and we will get in touch with you as soon as possible. Please note, candidates are often Shortlisted within 48 hours.
Whitehall Resources Ltd
Security Analyst/Detection Engineer
Whitehall Resources Ltd
Security Analyst/Detection Engineer Whitehall Resources are looking for a Security Analyst/Detection Engineer. This role is hybrid working with 3 days per week onsite in Wiltshire and the remainder remote working, for an initial 3 month contract. *Must hold active SC clearance or DV clearance* *Inside IR35* Job Description: . Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. . Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. . Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. . Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Your skills and experience: . Experienced Tier 2 SOC analyst . Knowledge of Data networks . Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) All of our opportunities require that applicants are eligible to work in the specified country/location, unless otherwise stated in the job description. Whitehall Resources are an equal opportunities employer who value a diverse and inclusive working environment. All qualified applicants will receive consideration for employment without regard to race, religion, gender identity or expression, sexual orientation, national origin, pregnancy, disability, age, veteran status, or other characteristics.
06/10/2025
Contractor
Security Analyst/Detection Engineer Whitehall Resources are looking for a Security Analyst/Detection Engineer. This role is hybrid working with 3 days per week onsite in Wiltshire and the remainder remote working, for an initial 3 month contract. *Must hold active SC clearance or DV clearance* *Inside IR35* Job Description: . Conduct reactive monitoring of networks to deliver a layered, agile cyber defence capability across all security domains. . Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. . Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. . Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Your skills and experience: . Experienced Tier 2 SOC analyst . Knowledge of Data networks . Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) All of our opportunities require that applicants are eligible to work in the specified country/location, unless otherwise stated in the job description. Whitehall Resources are an equal opportunities employer who value a diverse and inclusive working environment. All qualified applicants will receive consideration for employment without regard to race, religion, gender identity or expression, sexual orientation, national origin, pregnancy, disability, age, veteran status, or other characteristics.
LA International Computer Consultants Ltd
Security Analyst/Detection Engineer
LA International Computer Consultants Ltd Corsham, Wiltshire
*SC CLEARED* Security Analyst/Detection Engineer 4 Month contract initially Based: Remote/Corsham - Max 3 days p/w onsite Rate: £500 - £537 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We have a great opportunity for a Security Analyst/Detection Engineer to join the team for an initial 4 month contract. The ideal candidate will have good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge of defence environment and culture. You will have the ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC. Key Responsibilities: * Conduct reactive monitoring of the networks to deliver a layered, agile cyber defence capability across all security domains. * Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. * Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. * Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Key Skills & Experience: * Experienced Tier 2 SOC analyst * Knowledge of Data networks * Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications: * CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc. * Ideally have some experience with UK defence or military space. This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 10 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
06/10/2025
Contractor
*SC CLEARED* Security Analyst/Detection Engineer 4 Month contract initially Based: Remote/Corsham - Max 3 days p/w onsite Rate: £500 - £537 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. We have a great opportunity for a Security Analyst/Detection Engineer to join the team for an initial 4 month contract. The ideal candidate will have good Security analyst skills, knowledge of working in a SOC environment beneficial, knowledge of defence environment and culture. You will have the ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC. Key Responsibilities: * Conduct reactive monitoring of the networks to deliver a layered, agile cyber defence capability across all security domains. * Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. * Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. * Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs Key Skills & Experience: * Experienced Tier 2 SOC analyst * Knowledge of Data networks * Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications: * CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc. * Ideally have some experience with UK defence or military space. This is an excellent opportunity on a great project of work, If you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 10 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
fortice
SC or DV cleared Security Analyst/Detection Engineer
fortice Corsham, Wiltshire
Security Analyst/Detection Engineer Location: Corsham, 60% on site Duration: 20/02/2026 MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive for a global consultancy that require an SC or DV cleared Security Analyst/Detection Engineer to join them on a major defence project that's based in Corsham. Role description: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. Must be a sole British National. Hybrid working: The position is office based, with a local agreement with the customer that allows for a limited amount of Working from Home, based around your role, your needs, and those of the business. The current agreement requires 60% attendance in the office. If you are successfully offered this position, you will go through a series of pre-employment checks, including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At Capgemini, striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK MOD Your security clearance
06/10/2025
Contractor
Security Analyst/Detection Engineer Location: Corsham, 60% on site Duration: 20/02/2026 MUST BE PAYE THROUGH UMBRELLA We are heading up a recruitment drive for a global consultancy that require an SC or DV cleared Security Analyst/Detection Engineer to join them on a major defence project that's based in Corsham. Role description: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. Must be a sole British National. Hybrid working: The position is office based, with a local agreement with the customer that allows for a limited amount of Working from Home, based around your role, your needs, and those of the business. The current agreement requires 60% attendance in the office. If you are successfully offered this position, you will go through a series of pre-employment checks, including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs You can bring your whole self to work. At Capgemini, striving for equity, diversity and inclusion is part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Experienced Tier 2 SOC analyst Knowledge of Data networks Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.) Ideally have some experience with UK MOD Your security clearance
Experis IT
Security Analyst/Detection Engineer - Active SC Clearance
Experis IT Corsham, Wiltshire
Job Title: Security Analyst/Detection Engineer Location: Corsham, Wiltshire - 60% Onsite/40% remote Duration: 3 months Rate: £550 per day Clearance Required: Active SC and ideally Active DV clearance. Nationality: Sole UK Nationality is a requirement for this role Role overview: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. About the role: Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs. Your skills and experience: Experienced Tier 2 SOC analyst. Knowledge of Data networks. Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.). Ideally have some experience with UK MOD Your security clearance To be successfully appointed to this role, it is a requirement to obtain a minimum of Security Check (SC) clearance, with Developed vetting required for full time employment. To obtain SC clearance, the successful applicant must have resided continuously within the United Kingdom for the last 5 years, along with other criteria and requirements. If you are successfully offered this position, you will go through a series of pre-employment checks, including identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service)
06/10/2025
Contractor
Job Title: Security Analyst/Detection Engineer Location: Corsham, Wiltshire - 60% Onsite/40% remote Duration: 3 months Rate: £550 per day Clearance Required: Active SC and ideally Active DV clearance. Nationality: Sole UK Nationality is a requirement for this role Role overview: Good Security analyst skills, knowledge of working in a MOD SOC environment beneficial, knowledge of MOD environment and culture. Ability to operate standard SOC tools (SIEM), incident investigation, detection engineering Embedded with an existing Customer SOC, Capgemini supply a level of cyber expertise and corporate experience, assisting the customer in regular SOC activities, as well as proposing new processes and bringing 'best practice' to the workplace. About the role: Conduct reactive monitoring of MOD networks to deliver a layered, agile cyber defence capability across all security domains. Manage and triage alerts; conduct impact assessments and develop mitigating strategies to be briefed up the chain of command. Improve and comply all extant cyber security policies, procedures and orders, review and amend when required. Maintain and share knowledge of current cyber issues, vulnerabilities and exploits through research, technical reports and briefs. Your skills and experience: Experienced Tier 2 SOC analyst. Knowledge of Data networks. Knowledge & experience with SIEM tool sets and security management tools. Desirable Security Qualifications (CompTIA S+/N+/CySA+, AWS, MS, SANS, CISSP etc.). Ideally have some experience with UK MOD Your security clearance To be successfully appointed to this role, it is a requirement to obtain a minimum of Security Check (SC) clearance, with Developed vetting required for full time employment. To obtain SC clearance, the successful applicant must have resided continuously within the United Kingdom for the last 5 years, along with other criteria and requirements. If you are successfully offered this position, you will go through a series of pre-employment checks, including identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service)
Digital Operations Manager, IT Manager, IT Support Manager
IT Jobs London
Job Title: Digital Operations Manager/ IT Manager/IT Operations Support Manager Location: London Department: Digital Operations Salary: £60-70k + Benefits Company Overview: We are dedicated to shaping the future of digital infrastructure and services. We are seeking a highly motivated and experienced Digital Operations Manager to oversee the daily operations of our digital ecosystem, ensuring top-tier performance, security, and compliance. This is an exciting opportunity to lead a dynamic team and drive the success of our digital projects. As the Digital Operations Manager, you will play a pivotal role in maintaining the integrity of our IT systems, collaborating closely with cross-functional teams, and ensuring our digital operations meet the highest standards. Key Responsibilities: Team Leadership and Management: Lead, mentor, and manage a diverse team of IT professionals including an Application Support Specialist, Technical Project Manager, Cyber Security and Compliance Analyst, and End-to-End QA Specialist. Allocate resources efficiently to ensure timely and successful project delivery. Conduct regular performance reviews and provide ongoing feedback to foster growth and development within the team.Operational Oversight: Oversee the daily operations of digital systems, applications, and infrastructure. Ensure high availability and performance of all IT services and applications. Implement and maintain monitoring systems to proactively identify and resolve issues.Application Support: Manage application support activities to ensure the prompt resolution of incidents and service requests. Collaborate with the Application Support Manager to develop and implement effective support processes and documentation. Ensure all applications are updated, patched, and maintained in line with best practices.Technical Project Management: Oversee the planning, execution, and delivery of technical projects. Work closely with the Technical Project Manager to ensure projects are completed on time, within scope, and budget. Facilitate communication and collaboration between project teams and stakeholders.Cyber Security and Compliance: Ensure the implementation and adherence to cyber security policies and procedures. Collaborate with the Cyber Security and Compliance resources to conduct regular security assessments and audits. Manage compliance with relevant regulations and standards, such as GDPR and Cyber Essentials Plus.Quality Assurance: Oversee the end-to-end quality assurance process for all digital products and services. Work with the End-to-End QA Specialist to develop comprehensive test plans and ensure thorough testing. Ensure quality assurance processes are followed to maintain high standards.Strategic Planning and Improvement: Develop and implement strategies to enhance digital operations and IT service delivery. Identify opportunities for process optimisation and efficiency gains.Stakeholder Communication: Act as the primary point of contact for all digital operations-related matters. Provide regular updates to senior management on the status of projects, operational performance, and security compliance. Facilitate effective communication between IT teams and business units.Problem Solving and Incident Management: Manage and resolve high-priority incidents and critical issues. Conduct root cause analysis and implement corrective actions to prevent recurrence. Develop and maintain incident response plans and procedures.Requirements: Proven experience as a Digital Operations Manager, IT Manager, Support Manager, or similar role. Strong leadership and team management skills with the ability to mentor and inspire a diverse team. Excellent understanding of IT infrastructure, application support, and digital operations. Demonstrated experience in managing technical projects and ensuring successful delivery. In-depth knowledge of cyber security principles and compliance requirements. Strong understanding of quality assurance processes and methodologies. Exceptional problem-solving and analytical abilities. Excellent communication and interpersonal skills, with the ability to engage effectively with stakeholders at all levels. Familiarity with IT service management (ITSM) frameworks such as ITIL. Relevant certifications (e.g., PMP, CISSP, ITIL) are advantageous.What We Offer: Competitive salary and benefits package. A dynamic, collaborative work environment with opportunities for professional development and growth. A chance to lead and shape the future of digital operations People Source Consulting Ltd is acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas
01/06/2025
Job Title: Digital Operations Manager/ IT Manager/IT Operations Support Manager Location: London Department: Digital Operations Salary: £60-70k + Benefits Company Overview: We are dedicated to shaping the future of digital infrastructure and services. We are seeking a highly motivated and experienced Digital Operations Manager to oversee the daily operations of our digital ecosystem, ensuring top-tier performance, security, and compliance. This is an exciting opportunity to lead a dynamic team and drive the success of our digital projects. As the Digital Operations Manager, you will play a pivotal role in maintaining the integrity of our IT systems, collaborating closely with cross-functional teams, and ensuring our digital operations meet the highest standards. Key Responsibilities: Team Leadership and Management: Lead, mentor, and manage a diverse team of IT professionals including an Application Support Specialist, Technical Project Manager, Cyber Security and Compliance Analyst, and End-to-End QA Specialist. Allocate resources efficiently to ensure timely and successful project delivery. Conduct regular performance reviews and provide ongoing feedback to foster growth and development within the team.Operational Oversight: Oversee the daily operations of digital systems, applications, and infrastructure. Ensure high availability and performance of all IT services and applications. Implement and maintain monitoring systems to proactively identify and resolve issues.Application Support: Manage application support activities to ensure the prompt resolution of incidents and service requests. Collaborate with the Application Support Manager to develop and implement effective support processes and documentation. Ensure all applications are updated, patched, and maintained in line with best practices.Technical Project Management: Oversee the planning, execution, and delivery of technical projects. Work closely with the Technical Project Manager to ensure projects are completed on time, within scope, and budget. Facilitate communication and collaboration between project teams and stakeholders.Cyber Security and Compliance: Ensure the implementation and adherence to cyber security policies and procedures. Collaborate with the Cyber Security and Compliance resources to conduct regular security assessments and audits. Manage compliance with relevant regulations and standards, such as GDPR and Cyber Essentials Plus.Quality Assurance: Oversee the end-to-end quality assurance process for all digital products and services. Work with the End-to-End QA Specialist to develop comprehensive test plans and ensure thorough testing. Ensure quality assurance processes are followed to maintain high standards.Strategic Planning and Improvement: Develop and implement strategies to enhance digital operations and IT service delivery. Identify opportunities for process optimisation and efficiency gains.Stakeholder Communication: Act as the primary point of contact for all digital operations-related matters. Provide regular updates to senior management on the status of projects, operational performance, and security compliance. Facilitate effective communication between IT teams and business units.Problem Solving and Incident Management: Manage and resolve high-priority incidents and critical issues. Conduct root cause analysis and implement corrective actions to prevent recurrence. Develop and maintain incident response plans and procedures.Requirements: Proven experience as a Digital Operations Manager, IT Manager, Support Manager, or similar role. Strong leadership and team management skills with the ability to mentor and inspire a diverse team. Excellent understanding of IT infrastructure, application support, and digital operations. Demonstrated experience in managing technical projects and ensuring successful delivery. In-depth knowledge of cyber security principles and compliance requirements. Strong understanding of quality assurance processes and methodologies. Exceptional problem-solving and analytical abilities. Excellent communication and interpersonal skills, with the ability to engage effectively with stakeholders at all levels. Familiarity with IT service management (ITSM) frameworks such as ITIL. Relevant certifications (e.g., PMP, CISSP, ITIL) are advantageous.What We Offer: Competitive salary and benefits package. A dynamic, collaborative work environment with opportunities for professional development and growth. A chance to lead and shape the future of digital operations People Source Consulting Ltd is acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas
Clear IT Recruitment Limited
Security Analyst - Law Firm
Clear IT Recruitment Limited
My client, a Top Tier International firm, is recruiting for a Security Analyst to join their firm in Finsbury, London. This role will report to the IT Security Manager. This role will work with the business and the wider information security team to ensure the appropriate controls, policies and procedures are in place to protect the information of the firm in-line with internal information security principles (i.e. ISO27001 and CE+) as well as regulatory legislation. Duties • Deputise for the IT Security Manager as required; • In conjunction with the Information Security Manager, develop and implement information security policies, standards and documentation ensuring compliance with all applicable legal or regulatory legislation; • Work as an Information Security Auditor to define, maintain and implement an audit framework and schedule in compliance with Stephenson Harwood's security polices and standards; • Maintain certification to ISO27001 and Cyber Essentials Plus against a backdrop of a growing firm and evolving regulations, technology and processes; • Maintain the cyber incident management process and develop the appropriate document repositories, policy documents, operational schedules and processes; • Ensure published policies are regularly reviewed and amended appropriately; • Be actively involved in in firm-wide projects and liaison with third party suppliers to ensure that IT and information security principles are adhered to, from inception to retirement; • Complete client data requests and reporting relating to IT, information and cyber security; • Drive and support an exceptions and waivers process ensuring exceptions are appropriately reviewed and action taken where relevant; • Promote the firm's security policy, to ensure appropriate measures are taken to secure the firm's information and minimising security incidents; • Drive and manage processes for reporting KPI's and other metrics in relation to risk, threats, vulnerabilities, compliance and performance; • Conduct post-incident investigations and provide advice to address issues and/or amend procedures to enhance the Firm's information security protection; • Assist with all security certifications to ensure compliance to applicable standards and regulations; • Assist with the management and chairing of governance groups including the documentation and completion of actions; • Maintain and manage the information security risk register, in conjunction with Risk and Compliance. Attributes/Skills Required • Solid experience in a legal or other professional services firm is preferred - ideally a partnership structure; • Knowledge of Azure, encryption key management and cloud-based services such as M365 is essential; • Experience of operating in a similar role within the framework of and adhering to requirements of ISO27001 and Cyber Essentials Plus or similar standards; • Experience in preparing documentation and guidance for others is essential; • Experience in related supplier management, with vendors and resellers; • Experience of aligning technology solutions with best practice and IT security policies and guidelines Should you have any questions or wish to apply please do not hesitate to contact Clear Legal and Financial Recruitment. Please Note: Due to the number of applications we receive we may be unable to respond to every application directly. If you have not heard from us within 3 working days, please assume your application has been unsuccessful.
09/01/2022
Full time
My client, a Top Tier International firm, is recruiting for a Security Analyst to join their firm in Finsbury, London. This role will report to the IT Security Manager. This role will work with the business and the wider information security team to ensure the appropriate controls, policies and procedures are in place to protect the information of the firm in-line with internal information security principles (i.e. ISO27001 and CE+) as well as regulatory legislation. Duties • Deputise for the IT Security Manager as required; • In conjunction with the Information Security Manager, develop and implement information security policies, standards and documentation ensuring compliance with all applicable legal or regulatory legislation; • Work as an Information Security Auditor to define, maintain and implement an audit framework and schedule in compliance with Stephenson Harwood's security polices and standards; • Maintain certification to ISO27001 and Cyber Essentials Plus against a backdrop of a growing firm and evolving regulations, technology and processes; • Maintain the cyber incident management process and develop the appropriate document repositories, policy documents, operational schedules and processes; • Ensure published policies are regularly reviewed and amended appropriately; • Be actively involved in in firm-wide projects and liaison with third party suppliers to ensure that IT and information security principles are adhered to, from inception to retirement; • Complete client data requests and reporting relating to IT, information and cyber security; • Drive and support an exceptions and waivers process ensuring exceptions are appropriately reviewed and action taken where relevant; • Promote the firm's security policy, to ensure appropriate measures are taken to secure the firm's information and minimising security incidents; • Drive and manage processes for reporting KPI's and other metrics in relation to risk, threats, vulnerabilities, compliance and performance; • Conduct post-incident investigations and provide advice to address issues and/or amend procedures to enhance the Firm's information security protection; • Assist with all security certifications to ensure compliance to applicable standards and regulations; • Assist with the management and chairing of governance groups including the documentation and completion of actions; • Maintain and manage the information security risk register, in conjunction with Risk and Compliance. Attributes/Skills Required • Solid experience in a legal or other professional services firm is preferred - ideally a partnership structure; • Knowledge of Azure, encryption key management and cloud-based services such as M365 is essential; • Experience of operating in a similar role within the framework of and adhering to requirements of ISO27001 and Cyber Essentials Plus or similar standards; • Experience in preparing documentation and guidance for others is essential; • Experience in related supplier management, with vendors and resellers; • Experience of aligning technology solutions with best practice and IT security policies and guidelines Should you have any questions or wish to apply please do not hesitate to contact Clear Legal and Financial Recruitment. Please Note: Due to the number of applications we receive we may be unable to respond to every application directly. If you have not heard from us within 3 working days, please assume your application has been unsuccessful.
Cyber Threat Analyst
Blackthorn Trace City, London
City, London Blackthorn Trace Blackthorn Trace have partnered with a global leading financial services industry who are building a Cyber Threat team across the UK, US and Canada. With the financial services industry constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, my client are creating a Cyber Threat Center charged with ensuring all equities are secure against all tiers of adversaries. You will work within the central hub for Computer Operations and be on the front lines of security incident response, threat hunting, and intelligence. Hours - 6am - 2.30pm, 2 days per week from home. Responsibilities Act a senior member of the Cyber Threat Center who handles security events and incidents on a daily basis in a fast-paced environment. Acts as an Incident Handler who can handle minor and major security incidents within the defined Computer Security Incident Response process. Role embodies Cyber Network Defense and a successful Cyber Threat Analyst will be able to quickly analyze threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm. Maintains situational awareness for cyber threats across the global firm and take action where necessary. Daily responsibilities include, but are not limited to: Countermeasure deployment across various technologies. Malware and exploit analysis. Intrusion monitoring and response. Assessing alerts and notifications of event activity from intrusion detection systems and responding accordingly to the threat. Continuing content development of threat detection and prevention systems. Data analysis and threat research. Experience and Skills Systems administrator experience in Linux, Unix, Windows or OSX operating systems. Knowledge of networking and the common network protocols. Demonstrated ability to create complex scripts, develop tools, or automate processes Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis. Demonstrated ability to perform static and dynamic malware analysis. Demonstrated ability to analyze large data sets and identify anomalies. Demonstrated ability to quickly create and deploy countermeasures under pressure. Familiarity with common infrastructure systems that can be used as enforcement points. One or more of the following certifications or the ability to obtain within 1 year: CISSP: Certified Information Systems Security Professional CCNA: Cisco Certified Network Associate SANS: GCIH - Incident Handler SANS: GCIA - Intrusion Analyst Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation. Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles. PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.
15/02/2019
City, London Blackthorn Trace Blackthorn Trace have partnered with a global leading financial services industry who are building a Cyber Threat team across the UK, US and Canada. With the financial services industry constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, my client are creating a Cyber Threat Center charged with ensuring all equities are secure against all tiers of adversaries. You will work within the central hub for Computer Operations and be on the front lines of security incident response, threat hunting, and intelligence. Hours - 6am - 2.30pm, 2 days per week from home. Responsibilities Act a senior member of the Cyber Threat Center who handles security events and incidents on a daily basis in a fast-paced environment. Acts as an Incident Handler who can handle minor and major security incidents within the defined Computer Security Incident Response process. Role embodies Cyber Network Defense and a successful Cyber Threat Analyst will be able to quickly analyze threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm. Maintains situational awareness for cyber threats across the global firm and take action where necessary. Daily responsibilities include, but are not limited to: Countermeasure deployment across various technologies. Malware and exploit analysis. Intrusion monitoring and response. Assessing alerts and notifications of event activity from intrusion detection systems and responding accordingly to the threat. Continuing content development of threat detection and prevention systems. Data analysis and threat research. Experience and Skills Systems administrator experience in Linux, Unix, Windows or OSX operating systems. Knowledge of networking and the common network protocols. Demonstrated ability to create complex scripts, develop tools, or automate processes Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis. Demonstrated ability to perform static and dynamic malware analysis. Demonstrated ability to analyze large data sets and identify anomalies. Demonstrated ability to quickly create and deploy countermeasures under pressure. Familiarity with common infrastructure systems that can be used as enforcement points. One or more of the following certifications or the ability to obtain within 1 year: CISSP: Certified Information Systems Security Professional CCNA: Cisco Certified Network Associate SANS: GCIH - Incident Handler SANS: GCIA - Intrusion Analyst Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation. Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles. PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.
IT Jobs
SOC Analyst
IT Jobs Birmingham, West Midlands (County)
SOC Analyst Birmingham £35,000 - £45,000 Benefits: 25 days annual leave + bank holidays, private medical, 10% pension, Life Insurance + further benefits Our client a large digital transformation consultancy are looking for a SOC Specialist to join their current team. You will work as a SOC Analyst within a 24x7 SOC operational support environments incorporating a tiered security model across a range of security support functions. The Opportunity * This is an opportunity to work for a global leader within digital transformation across multiple business sectors and ultimately help organisations to create their firm of the future. * You will join a rapidly growing Cybersecurity team that is continually dealing with emerging threats and vulnerabilities. * You will work with the Senior SOC Specialist in the undertaking of system and security monitoring of supported commercial and government customer security deployments. * Security Information and Event Management (SIEM) * Network IDS/IPS management and support * Web Application Firewalls (WAF) * Incident Management * Work with vendor TAC in provision of relevant information/logs * Review and update of SOC support documentation * Planning (change control management/representation at CAB) Required Experience * You will have/the ability to gain SC clearance along with Office for Nuclear Regulation clearance * Requirement for flexibility in working hours, mixing standard core office hours during Monday - Friday with occasional requirements for late night working, weekend work and adhoc shift coverage – adaptable approach to work requirements is fundamental for role. * Experience in systems (Linux/Unix) and networking * Experience of vulnerability and threat assessment * Experience of Intrusion detection and prevention systems * Experience of Web-based application security * Ability to develop custom code (Perl / shell scripting etc.) If you are interested in this great opportunity, please do send your most up to date CV
29/10/2018
SOC Analyst Birmingham £35,000 - £45,000 Benefits: 25 days annual leave + bank holidays, private medical, 10% pension, Life Insurance + further benefits Our client a large digital transformation consultancy are looking for a SOC Specialist to join their current team. You will work as a SOC Analyst within a 24x7 SOC operational support environments incorporating a tiered security model across a range of security support functions. The Opportunity * This is an opportunity to work for a global leader within digital transformation across multiple business sectors and ultimately help organisations to create their firm of the future. * You will join a rapidly growing Cybersecurity team that is continually dealing with emerging threats and vulnerabilities. * You will work with the Senior SOC Specialist in the undertaking of system and security monitoring of supported commercial and government customer security deployments. * Security Information and Event Management (SIEM) * Network IDS/IPS management and support * Web Application Firewalls (WAF) * Incident Management * Work with vendor TAC in provision of relevant information/logs * Review and update of SOC support documentation * Planning (change control management/representation at CAB) Required Experience * You will have/the ability to gain SC clearance along with Office for Nuclear Regulation clearance * Requirement for flexibility in working hours, mixing standard core office hours during Monday - Friday with occasional requirements for late night working, weekend work and adhoc shift coverage – adaptable approach to work requirements is fundamental for role. * Experience in systems (Linux/Unix) and networking * Experience of vulnerability and threat assessment * Experience of Intrusion detection and prevention systems * Experience of Web-based application security * Ability to develop custom code (Perl / shell scripting etc.) If you are interested in this great opportunity, please do send your most up to date CV

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board