2,356 Security Operations jobs in the United Kingdom
Senior Security Operations Analyst - Threat Intelligence
Posted 17 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events using SIEM, IDS/IPS, and other security tools.
- Investigate and respond to security incidents in a timely and effective manner.
- Conduct threat hunting activities to proactively identify and mitigate risks.
- Analyze threat intelligence feeds and assess their relevance to the organization.
- Develop and refine incident response playbooks and procedures.
- Perform vulnerability assessments and assist in remediation efforts.
- Stay current with the latest cybersecurity threats, trends, and technologies.
- Collaborate with IT and development teams to implement security controls.
- Provide reporting on security posture and incident trends to management.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent work experience.
- 5+ years of experience in a Security Operations Center (SOC) or similar cybersecurity role.
- Strong understanding of networking protocols, TCP/IP, and common attack vectors.
- Experience with SIEM tools (e.g., Splunk, QRadar, ELK Stack).
- Familiarity with EDR, antivirus, and other endpoint security solutions.
- Knowledge of threat intelligence platforms and methodologies.
- Relevant certifications such as CompTIA Security+, CEH, GIAC, or CISSP are highly desirable.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work under pressure in a fast-paced environment.
Security Operations Center (SOC) Analyst
Posted 22 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, firewalls, and endpoints.
- Analyze security incidents to determine their nature, scope, and severity.
- Investigate suspicious activities and potential security breaches in a timely manner.
- Perform initial triage and response actions according to established SOC procedures.
- Escalate critical incidents to senior analysts or incident response teams.
- Document all security events, investigations, and resolutions accurately.
- Contribute to the development and refinement of SOC playbooks and procedures.
- Stay informed about the latest cybersecurity threats, vulnerabilities, and attack techniques.
- Participate in threat hunting exercises to proactively identify potential security risks.
- Collaborate with other security team members to enhance overall security posture.
- Assist in the tuning and optimization of security monitoring tools.
Qualifications:
- Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field, or equivalent practical experience.
- Minimum of 2 years of experience working in a Security Operations Center (SOC) or a similar cybersecurity role.
- Familiarity with SIEM tools (e.g., Splunk, QRadar, ELK Stack) and security event analysis.
- Understanding of networking concepts, TCP/IP, common protocols, and network security.
- Knowledge of common cyber threats, attack vectors, and incident response methodologies.
- Experience with endpoint detection and response (EDR) tools is a plus.
- Strong analytical, problem-solving, and critical thinking skills.
- Excellent communication skills, both written and verbal.
- Ability to work independently, manage time effectively, and maintain focus in a remote setting.
- Relevant certifications such as CompTIA Security+, CySA+, CEH, or GIAC certifications are advantageous.
- This is a fully remote position, allowing you to work from home while contributing to critical security operations.
Senior Security Operations Center (SOC) Analyst
Posted today
Job Viewed
Job Description
Senior Security Operations Center (SOC) Analyst
Posted 1 day ago
Job Viewed
Job Description
Primary responsibilities include:
- Monitoring security alerts and events from various sources, including SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR) tools.
- Investigating security incidents, performing root cause analysis, and developing effective remediation plans.
- Developing and refining SOC playbooks and standard operating procedures (SOPs) for incident handling.
- Mentoring and guiding junior SOC analysts, providing technical expertise and support.
- Conducting threat hunting activities to proactively identify potential security breaches and vulnerabilities.
- Staying current with the latest threat intelligence, attack vectors, and cybersecurity trends.
- Contributing to the continuous improvement of SOC tools and technologies.
- Collaborating with IT and other departments to implement security best practices and enhance overall security posture.
- Participating in incident response drills and tabletop exercises to test and improve response capabilities.
- Documenting incident findings, actions taken, and recommendations for future prevention.
Senior Security Operations Center (SOC) Analyst
Posted 2 days ago
Job Viewed
Job Description
As a Senior SOC Analyst, you will be at the forefront of defending our clients' digital assets against evolving cyber threats. You will be responsible for monitoring security alerts, analyzing potential threats, conducting incident response, and contributing to the continuous improvement of our SOC operations. Your expertise in threat detection, analysis, and incident management will be critical in safeguarding our clients' sensitive information.
Key Responsibilities:
- Monitor security information and event management (SIEM) systems, intrusion detection/prevention systems (IDPS), and other security tools for suspicious activity.
- Analyze security alerts and logs to identify potential security incidents, prioritizing and escalating as needed.
- Conduct in-depth investigations into security breaches and potential threats, including malware analysis and forensic investigations.
- Develop and execute incident response plans to contain, eradicate, and recover from security incidents.
- Perform threat hunting activities to proactively identify and mitigate potential threats.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Contribute to the development and refinement of SOC procedures, playbooks, and detection rules.
- Mentor and guide junior SOC analysts, providing technical expertise and support.
- Collaborate with other security teams, IT departments, and external stakeholders during incident response efforts.
- Generate regular reports on security incidents, trends, and SOC performance metrics.
- Participate in on-call rotations and respond to critical security events as required.
- A Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- A minimum of 5 years of experience in a Security Operations Center (SOC) or similar cybersecurity role.
- Proven experience with SIEM platforms (e.g., Splunk, QRadar, LogRhythm) and other security tools (e.g., EDR, IDS/IPS, firewalls).
- Strong understanding of network protocols, operating systems, and common attack vectors.
- Demonstrated experience in incident response, threat analysis, and digital forensics.
- Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation is highly desirable.
- Relevant industry certifications such as CISSP, GCIA, GCIH, or OSCP are a strong advantage.
- Exceptional written and verbal communication skills, with the ability to clearly articulate technical information.
- Ability to work independently, manage time effectively, and collaborate within a remote team environment.
Senior Security Operations Center (SOC) Analyst
Posted 3 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, endpoint detection, and threat intelligence platforms.
- Analyze security incidents to determine scope, impact, and root cause, and initiate appropriate response actions.
- Develop and refine detection rules, playbooks, and Standard Operating Procedures (SOPs) for incident response.
- Conduct threat hunting activities to proactively identify and neutralize advanced persistent threats (APTs) and other sophisticated adversaries.
- Utilize forensic tools and techniques to investigate security breaches and collect evidence.
- Collaborate with incident response teams, IT operations, and external stakeholders during critical incidents.
- Stay current with the latest cybersecurity threats, vulnerabilities, attack vectors, and mitigation strategies.
- Provide mentorship and guidance to junior SOC analysts.
- Contribute to the continuous improvement of SOC tools, processes, and capabilities.
- Participate in on-call rotations as required, ensuring continuous security coverage.
- Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field, or equivalent practical experience.
- Minimum of 5 years of experience in a Security Operations Center (SOC) environment, with at least 2 years in a senior or lead analyst role.
- In-depth knowledge of security principles, common attack vectors, and threat landscapes.
- Proficiency with SIEM platforms (e.g., Splunk, QRadar, ArcSight), EDR solutions, and other security tools.
- Experience with network protocols, operating systems (Windows, Linux), and cloud security concepts (AWS, Azure, GCP).
- Strong analytical, problem-solving, and critical thinking skills.
- Excellent communication and documentation skills, with the ability to clearly articulate technical findings.
- Relevant certifications such as CISSP, GIAC (GCIA, GCIH, GCFE), or CEH are highly desirable.
- Ability to work autonomously and collaboratively within a fully remote, global team.
- Demonstrated ability to remain calm and effective under pressure.
Senior Security Operations Center (SOC) Analyst
Posted 4 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security systems (SIEM, IDS/IPS, EDR) for security threats and suspicious activities.
- Analyze security alerts and investigate potential security incidents, determining scope and impact.
- Perform in-depth forensic analysis and malware analysis to understand attack vectors.
- Conduct proactive threat hunting to identify advanced persistent threats (APTs) and zero-day vulnerabilities.
- Develop and refine incident response playbooks and procedures.
- Lead and coordinate incident response efforts, including containment, eradication, and recovery.
- Provide technical guidance and mentorship to junior SOC analysts.
- Stay current with the latest threat intelligence, vulnerabilities, and cybersecurity trends.
- Contribute to the continuous improvement of SOC tools, processes, and capabilities.
- Produce detailed reports on security incidents, findings, and recommendations.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience.
- Minimum of 5 years of experience in a Security Operations Center (SOC) environment.
- Strong understanding of network protocols, operating systems, and cybersecurity principles.
- Hands-on experience with SIEM tools (e.g., Splunk, QRadar), EDR solutions, and other security technologies.
- Proficiency in incident response, malware analysis, and digital forensics.
- Excellent analytical and problem-solving skills.
- Relevant certifications such as CISSP, GIAC, OSCP, or similar are highly desirable.
- Ability to work effectively in a hybrid work model, balancing remote and office-based duties.
- Strong communication skills, both written and verbal, with the ability to explain complex technical issues to various audiences.
Be The First To Know
About the latest Security operations Jobs in United Kingdom !
Lead Security Operations Center (SOC) Analyst
Posted 6 days ago
Job Viewed
Job Description
Key Responsibilities:
- Lead and manage the Security Operations Center (SOC) team and its daily operations.
- Oversee the monitoring of security alerts and events from various sources.
- Investigate and respond to security incidents, ensuring timely and effective resolution.
- Conduct threat hunting activities to proactively identify potential security breaches.
- Develop and maintain incident response plans, playbooks, and standard operating procedures (SOPs).
- Manage and configure SIEM, IDS/IPS, EDR, and other security monitoring tools.
- Analyze security logs and network traffic for suspicious activity.
- Perform forensic analysis of security incidents.
- Mentor and train junior SOC analysts.
- Collaborate with other IT and security teams to enhance overall security posture.
- Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Contribute to security awareness training for employees.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience.
- Minimum of 7 years of experience in cybersecurity, with at least 3 years in a SOC environment.
- Proven experience in leading a security operations team.
- Expertise in SIEM platforms (e.g., Splunk, QRadar), IDS/IPS, EDR, and firewall management.
- Strong understanding of network protocols, operating systems, and common attack vectors.
- Experience with threat intelligence analysis and incident response methodologies.
- Excellent analytical, problem-solving, and decision-making skills.
- Strong leadership and communication abilities.
- Relevant certifications such as CISSP, GIAC, or CEH are highly desirable.
Senior Security Operations Center (SOC) Analyst
Posted 10 days ago
Job Viewed
Job Description
Senior Security Operations Center (SOC) Analyst
Posted 12 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security systems, including SIEM, IDS/IPS, EDR, and firewalls, for malicious activity and security breaches.
- Investigate and analyze security alerts, determining the scope and impact of potential incidents.
- Perform in-depth forensic analysis of security events and develop incident response plans.
- Develop and refine detection rules, use cases, and correlation logic within the SIEM platform.
- Conduct threat hunting activities to proactively identify and mitigate emerging threats.
- Collaborate with incident response teams, IT, and other stakeholders to ensure timely and effective resolution of security incidents.
- Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Develop and maintain comprehensive documentation, including incident reports and SOPs.
- Mentor junior SOC analysts and contribute to the continuous improvement of SOC processes and tools.
- Participate in on-call rotations as required.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, or a related field, or equivalent practical experience.
- Minimum of 5 years of experience in a SOC Analyst role, with at least 2 years in a senior capacity.
- Deep understanding of security principles, common attack vectors, and threat intelligence.
- Proficiency in using SIEM tools (e.g., Splunk, QRadar, LogRhythm) and other security monitoring platforms.
- Experience with incident response, forensic analysis, and malware analysis.
- Strong understanding of networking protocols and operating system security.
- Relevant certifications such as CISSP, GCIH, GCFA, or CEH are highly desirable.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work independently and manage workload effectively in a remote environment.
- Experience with cloud security concepts (AWS, Azure, GCP) is a plus.
This is a premier opportunity to join a leading cybersecurity organization and contribute to a safer digital world. If you possess a passion for threat detection and incident response, we invite you to apply.