160 Soc Analyst jobs in the United Kingdom

SOC Analyst

Wiltshire, South West £46000 - £50000 Annually Deerfoot Recruitment Solutions Limited

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

permanent

SOC Analyst - Corsham - Circa 46,000 per annum - On-site (5 days per week)
Permanent | SC Clearance Required.
Deerfoot Recruitment is working on behalf of a leading organisation seeking to hire an experienced SOC Analyst to join their Security Operations Centre based in Corsham . This is a full-time, on-site role requiring 5 days per week presence.
The successful candidate will play a vital role in monitoring, analysing, and responding to security threats using tools such as Splunk, Flexera, and other industry-standard SIEM platforms. You'll investigate security incidents, coordinate with other IT and security teams, and support continuous improvement of threat detection and response processes.
Key Requirements:

  • Previous experience in a SOC Analyst or similar cybersecurity role
  • Strong expertise in Splunk or similar SIEM tools
  • Familiarity with Flexera for vulnerability management
  • Understanding of firewalls, network protocols, intrusion detection/prevention systems
  • Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous
  • Must be eligible for Developed Vetting (DV) clearance , requiring 10 years continuous UK residency

Please Note: All offers will be subject to standard pre-employment checks including ID, employment history (last 3 years), immigration status, and an unspent criminal record check.
This is an excellent opportunity to join a forward-thinking, inclusive environment with strong investment in training, development, and employee wellbeing.
To apply or learn more, please contact us today at Deerfoot Recruitment .

Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate 1 to The Born Free Foundation. We are a Climate Action Workforce in partnership with Ecologi. If this role isn't right for you, explore our referral reward program with payouts at interview and placement milestones. Visit our website for details. Deerfoot Recruitment Solutions Ltd is acting as an Employment Agency in relation to this vacancy.

This advertiser has chosen not to accept applicants from your region.

SOC Analyst

SN13 Corsham, South West Deerfoot Recruitment Solutions Limited

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

full time

SOC Analyst - Corsham - Circa 46,000 per annum - On-site (5 days per week)
Permanent | SC Clearance Required.
Deerfoot Recruitment is working on behalf of a leading organisation seeking to hire an experienced SOC Analyst to join their Security Operations Centre based in Corsham . This is a full-time, on-site role requiring 5 days per week presence.
The successful candidate will play a vital role in monitoring, analysing, and responding to security threats using tools such as Splunk, Flexera, and other industry-standard SIEM platforms. You'll investigate security incidents, coordinate with other IT and security teams, and support continuous improvement of threat detection and response processes.
Key Requirements:

  • Previous experience in a SOC Analyst or similar cybersecurity role
  • Strong expertise in Splunk or similar SIEM tools
  • Familiarity with Flexera for vulnerability management
  • Understanding of firewalls, network protocols, intrusion detection/prevention systems
  • Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous
  • Must be eligible for Developed Vetting (DV) clearance , requiring 10 years continuous UK residency

Please Note: All offers will be subject to standard pre-employment checks including ID, employment history (last 3 years), immigration status, and an unspent criminal record check.
This is an excellent opportunity to join a forward-thinking, inclusive environment with strong investment in training, development, and employee wellbeing.
To apply or learn more, please contact us today at Deerfoot Recruitment .

Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate 1 to The Born Free Foundation. We are a Climate Action Workforce in partnership with Ecologi. If this role isn't right for you, explore our referral reward program with payouts at interview and placement milestones. Visit our website for details. Deerfoot Recruitment Solutions Ltd is acting as an Employment Agency in relation to this vacancy.

This advertiser has chosen not to accept applicants from your region.

SOC Analyst

Scotland, Scotland Anson Mccade

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

permanent
SOC Analyst
£57000 GBP
Hybrid WORKING
Location: Glasgow, Scotland - United Kingdom Type: Permanent

Senior SOC Analyst

Location: Glasgow (hybrid)

Salary: Up to £57,000 + package

NOTE: Candidates for this role must be eligible for UK Security Clearance (SC).

We are seeking a Senior SOC Analyst to join a growing Security Operations Centre team. This is a hybrid role based in Glasgow, offering the opportuni.










WHJS1_UKTJ

This advertiser has chosen not to accept applicants from your region.

SOC Analyst

Reading, South East Axiom Software Solutions Limited

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Job Title: SOC Analyst

Location: Reading, United Kingdom (Hybrid- 1-2 days/week)

Job Type: Contract Inside IR35

Client: Wipro

Job Overview:

As an OT Senior Cyber Security Analyst, you will be responsible for maintaining SecOps (Security Operations) solutions, controls and processes across the organisation. You will be mentoring and assisting with leading the SOC team to ensure appropriate prioritisation and remediation of OT alerts and incidents.

This role requires a deep understanding of SecOps concepts, technologies and best practices across IT and OT environments, as well as the ability to collaborate effectively with cross-functional teams. The ideal candidate will possess strong communication and incident management skills and will be committed to ensuring the highest level of security, compliance, and user experience.

Responsibilities:

Investigate security alerts from our SIEM tool and 3rd party MSSPs, and to provide appropriate incident response actions.

Liaise with technology and business stakeholders in relation to cyber security issues/incidents providing clear descriptions and actions.

Support the Cyber Security Operations Lead for security and privacy incidents, triaging events and performing root cause analysis to understand how incidents arise.

Acting as the key contact and escalation point for the SOC and Thames Water Digital teams.

Supporting out-of-hours incident investigations via an On-Call rota, covering 24*7*365 alongside our 3rd party MSSP.

Monitor, analyse and optimise SecOps tool performance (e.g. SIEM, PAM), identify potential issues, and recommend and implement proactive solutions.

Develop and maintain SecOps documentation, policies, and procedures.

Collaborate with stakeholders to understand business requirements and implementing security controls that are proportionate to the risk.

Maintain cyber security solutions with existing systems, applications, and infrastructure.

Evaluate and recommend technologies, tools, and vendors to meet business needs.

Perform proactive threat hunting for new and emerging cyber threats.

Specialist in Operational Technology systems, defining monitoring alerts and ensuring the operation of effective security controls.

Collect data that drives cyber security compliance metric dashboards.

Support compliance with relevant industry standards, regulations, and best practices, such as GDPR, NIS and ISO 27001.

Stay current on industry trends, emerging technologies, and best practices to continuously improve security operations.

This job involves:

Key Responsibilities

Expectations

Contextualize OT specific threats

Responsible for understanding the Operational Technology estate, specific OT threats and controls and mitigations that are in place. To be able to use tools such as Claroty to understand network traffic and OT hardware limitations to avoid downtime due to active scans.

Understand OT specific architecture frameworks

Reduce risks with overlaying context

Build direct relationships with Operations of the essential service alongside the OT team to understand and articulate operational risk and cyber risk.

Maintain Security Operations

Responsible for maintaining our security operations processes, including supporting an effective continuous improvement process surrounding the services provided. Familiarity desired with Microsoft security operations tools (e.g. Sentinel), and extensive knowledge of other security tools such as SOAR, EDR / XDR and IDAM.

Reductions over time in repetitive tickets/alerts demonstrating successful tuning of security tooling and processes.

Reduction over time in average time it takes to investigate and resolve security incidents demonstrating an increasing efficiency in SecOps processes.

Operational metrics evidencing the effectiveness of security controls.

Proactive Risk Remediation

Follow a risk-based approach to continually identify, analyse and evaluate the effectiveness of security controls and relate them to appropriate (and proportionate) security controls. Responsible for helping the business to deliver new security controls and for performing proactive activities (e.g. threat hunting) to continuously evaluate and uncover vulnerabilities throughout the technology stack.

Act as an ambassador within the Cyber Security team for the application of a risk-based approach and continuous risk reduction.

Collate the data supporting dashboards with robust SecOps metrics that evidence the tangible reduction in risk and technical debt.

4

Incident Readiness & Response

The Security Operations team holds primary responsibility for cyber security incident triage, management, and response. A consistent and reliable level of service is provided around both preparing the business for a significant cyber security incident (e.g. ransomware attack) and actual responses to live incidents. Responses to incidents are run in a structured, measured and auditable manner with continuous improvement integrated into incident management processes to ensure processes are always adapting to the changing threat landscape.

Reduction over time in business impacts experienced as a result of cyber security incidents.

Time between incident identification and remediation/closure reduces over time.

The business is periodically educated on incident management procedures and readiness activities.

All staff are aware of what constitutes a cyber security incident and how it should be reported.

5Continuous Improvement

Demonstrate an ability to improve processes over time whether that be increases in efficiency or using automation. The more efficient SecOps processes are the shorter response time to incidents will be and the more time will be available to proactive security activities such as threat hunting.

Gradual improvement over time of operational efficiencies as reporting in metrics/KPIs/dashboards.

Demonstrable use of automation to eliminate manual processes.

The qualifications, experience, technical skills, competencies, and values required are:

Strong analytical and problem-solving abilities

Some hands-on exposure to cyber security concepts and principles

Experience in working with third party delivery partners and MSSPs

Decision making and judgement

Ability to innovate technical solutions

Excellent planning and organising capabilities

Essential Experience

Minimum of 3 years of experience working with technical Cyber Security controls, preferably in an enterprise environment

Minimum of 3 years of experience in control systems of essential service (ICS, SCADA, CNI)

Exposure to working in or with a security operations centre (SOC)

Triaging problems or issues in a structured and disciplined manner

Experience in remediating cyber risks in ever-changing digital environments

Essential Technical Skills & Qualifications

Ability to explain complex IT / Security problems in a simple manner to non-technical audiences

Strong understanding of OT infrastructure, networking, and end-user computing.

Experience writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts.

Proficient in configuration and troubleshooting of multi-factor authentication (MFA), Privileged Access Management (PAM) and Security Information & Event Management (SIEM) systems, in particular Microsoft Sentinel.

Desirable Experience

Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/IPS, etc.

Leading and mentoring a team to deliver operational excellence.

Desirable Technical Skills & Qualifications

Degree in Cyber Security, Computer Science, Information Technology, Engineering, or related field.

Microsoft SecOps specific certification(s) e.g. Microsoft Security Operations Analyst (SC-200, AZ-900)

Any generic cyber security industry certification(s) such as CCSP, OT-specific certification(s) e.g. Claroty Cybersecurity Analyst

This advertiser has chosen not to accept applicants from your region.

SOC Analyst L2

Birmingham, West Midlands NTT America, Inc.

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

**The team you'll be working with:**
**SOC Analyst (L2)**
We are currently recruiting for a Senior Associate level Managed Detection and Response SOC Analyst Level 2 to join our growing Security Operations Centre business.
**This role will be based on-site in Birminham, we need canddiates that are able to work in a job that involves 24/7 operations, this will probably be inshift patterns of 4 days on, 4 days off** .
**About Us**
NTT DATA is one of the world's largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of the worlds most recognised Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. In a constantly changing world, we work together with our people, clients and communities to enable them to fulfil their potential to do great things. We believe that by bringing everyone together, we can solve problems using innovative technology that can create a world that is sustainable and secure.
This is a great opportunity for you to play a pivotal role in helping to shape our client's transformation journeys.
**What you'll be doing:**
**What you will be doing;**
+ The primary function of the SOC Analyst (L2) is to analyse any incidents escalated by the SOC Analyst (L1) and undertake the detailed investigation of the Security Event. The Security Analyst (L2) shall determine whether the security event will be classified as an incident. They will be coordinating with the customer IT and Security team for resolution of the Security Incident.
**MainDuties**
+ Security Monitoring: & Investigation:
+ Monitoring SIEM tools to assure high a level of security operations delivery function
+ Oversee and enhance security monitoring systems to detect and analyse potential security incidents.
+ Conduct real-time analysis of security events and incident and escalate as necessary
+ Support other teams on investigations into incidents, determining the root cause and impact.
+ Document findings and lessons learned to improve incident response procedures.
+ Ensure runbooks are followed and are fit for purpose
+ Incident Response:
+ Lead and coordinate incident response activities to effectively contain, eradicate, and recover from security incidents.
+ Develop and maintain incident response plans, ensuring they align with industry best practices.
+ Escalation management in the event of a security incident
+ Follow major incident process
+ Threat Intelligence:
+ Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes.
+ Contribute to the development of threat intelligence feeds to enhance proactive threat detection.
+ Security Tool Management:
+ Manage and optimise SIEM tools, ensuring they are properly configured and updated to maximize effectiveness.
+ Own the development and implementation of SOC Use Cases
+ Evaluate new security technologies and recommend enhancements to the security infrastructure.
+ Collaboration:
+ Collaborate with cross-functional teams, including IT, legal, and management, to address security incidents and implement preventive measures.
+ Provide expertise and guidance to other analysts.
+ Working with the Technical Teams to ensure all new and changed services are monitored accordingly
+ Documentation:
+ Maintain accurate and up-to-date documentation of security procedures, incident response plans, and analysis reports.
+ Create post-incident reports for management and stakeholders.
+ Support the creation of monthly reporting packs as per contractual requirements.
+ Create and document robust event and incident management processes, Runbooks & Playbooks
+ Other responsibilities:
+ Involvement in scoping and standing up new solutions for new opportunities
+ Assisting Pre-Sales team with requirements on new opportunities
+ Demonstrations of SOC tools to clients
+ Continual Service Improvement - Recommendations for change to address incidents or persistent events.
**What experience you'll bring:**
**What you will bring;**
+ **This role will be based on-site in Birminham, we need canddiates that are able to work in a job that involves 24/7 operations, this will probably be inshift patterns of 4 days on, 4 days off** .
+ Must be able to obtain SC Clearance or already hold SC clearance.
+ Must have a good understanding on Incident Response approaches
+ Must have knowledge and hands-on knowledge of Microsoft Sentinel (or any SIEM tool).
+ Strong verbal and written English communication.
+ Strong interpersonal and presentation skills.
+ Strong analytical skills
+ Must have good understanding on network traffic flows and able to understand normal and suspicious activities.
+ Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing)
+ Ability to learn forensic techniques
+ Ability to reverse engineer attacks to understand what actions took place.
+ Knowledge of ITIL disciplines such as Incident, Problem and Change Management.
+ Ability to work with minimal levels of supervision.
+ Willingness to work in a job that involves 24/7 operations or on-call.
**Education Requirements & Experience**
+ Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment.
+ Preferably holds Cyber Security Certification e.g. GIAC, ISC2, SC-200
+ Experience with Cloud platforms (AWS and/or Microsoft Azure)
+ Excellent knowledge of Microsoft Office products, especially Excel and Word
**Reports to**
+ Security Director - NTT DATA UK Security Practice
+ Client Delivery Director - NTT DATA UK Managed Services
**Who we are:**
We're a business with a global reach that empowers local teams, and we undertake hugely exciting work that is genuinely changing the world. Our advanced portfolio of consulting, applications, business process, cloud, and infrastructure services will allow you to achieve great things by working with brilliant colleagues, and clients, on exciting projects.
Our inclusive work environment prioritises mutual respect, accountability, and continuous learning for all our people. This approach fosters collaboration, well-being, growth, and agility, leading to a more diverse, innovative, and competitive organisation. We are also proud to share that we have a range of Inclusion Networks such as: the Women's Business Network, Cultural and Ethnicity Network, LGBTQ+ & Allies Network, Neurodiversity Network and the Parent Network.
For more information on Diversity, Equity and Inclusion please click here: Creating Inclusion Together at NTT DATA UK | NTT DATA ( we'll offer you:**
We offer a range of tailored benefits that support your physical, emotional, and financial wellbeing. Our Learning and Development team ensure that there are continuous growth and development opportunities for our people. We also offer the opportunity to have flexible work options.
You can find more information about NTT DATA UK & Ireland here: are an equal opportunities employer. We believe in the fair treatment of all our employees and commit to promoting equity and diversity in our employment practices. We are also a proud Disability Confident Committed Employer - we are committed to creating a diverse and inclusive workforce. We actively collaborate with individuals who have disabilities and long-term health conditions which have an effect on their ability to do normal daily activities, ensuring that barriers are eliminated when it comes to employment opportunities. In line with our commitment, we guarantee an interview to applicants who declare to us, during the application process, that they have a disability and meet the minimum requirements for the role. If you require any reasonable adjustments during the recruitment process, please let us know. Join us in building a truly diverse and empowered team.
Back to search Email to a friend Apply now
This advertiser has chosen not to accept applicants from your region.

Senior SOC Analyst

Hampshire, South East Sopra Steria

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

permanent

Are you in a Security Operations Centre and every day is the same? We can assure you that there is no boredom in our role.

We have a growing Cyber practice in our Defence sector and support enterprise scale clients. Now we have opportunities for L2 SOC Analysts to join in our success and work with multiple, high profile clients. You must have proven experience working in a busy SOC with a tech-firs.








WHJS1_UKTJ

This advertiser has chosen not to accept applicants from your region.

CERT/SOC ANALYST

28007 AMG Human

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

Permanent

Este es un puesto de trabajo remoto.

Responsibilities

Monitor, detect, and analyze cybersecurity incidents affecting insured clients or MDR service alerts.

Conduct incident response investigations, including malware analysis, phishing, ransomware, vulnerabilities, and intrusion attempts.

Manage crisis situations and support threat actor negotiations in ransomware incidents.

Triage and prioritize alerts, escalate critical threats, and provide actionable recommendations.

Develop and maintain detection use cases: rules, playbooks, and indicators of compromise (IOCs).

Contribute to threat intelligence collection and analysis (TTPs, IOCs, campaigns, CVEs).

Draft clear and structured incident reports, including executive summaries and technical deep-dives.

Collaborate with internal teams (broker managers, customer support, developers) and external stakeholders (brokers, partners, law enforcement).

Drive continuous improvement of CERT processes, automation, and tooling.

RequisitosRequirements

Bachelor’s degree in Cybersecurity, Computer Science, or equivalent experience.

Strong hands-on experience in SOC operations and SIEM/EPP tools (CrowdStrike, SentinelOne, or similar).

Proven expertise in incident response and digital forensics (log, disk, and memory analysis; tools such as Velociraptor or KAPE).

Knowledge of threat intelligence practices, ATT&CK mapping, and vulnerability management.

Proficiency in scripting and automation (Python, Bash, PowerShell).

Solid understanding of Windows/Linux systems and cloud environments.

Excellent analytical, communication, and reporting skills.

Languages: fluent Spanish and English; Portuguese is highly valued.

Previous experience working in fully remote environments is a strong plus.

VentajasBenefits

100% remote role with flexibility and autonomy.

Opportunity to join a CERT team with direct impact on protecting against critical cyber threats.

International environment, working closely with brokers, partners, and law enforcement.

Work with cutting-edge cybersecurity technologies and contribute to continuous process and tooling improvements.

Career development within a strategic sector where cybersecurity and insurance converge.

#LI-JM1 #Li-onsite
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Soc analyst Jobs in United Kingdom !

SOC Analyst - SC Cleared

Hampshire, South East £28000 - £41000 Annually Experis

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

permanent

ROLE TITLE: SOC Analyst - SC Cleared
LOCATION: Hursley

The ideal candidate will have active SC Clearance or be eligible to undergo SC Clearance.

We are actively looking to secure an SOC Analyst to join Experis.

Experis Consultancy is a Global entity with a well-established team with over 1000 consultants on assignment across 20 clients globally. Our UK operation is growing and has very aggressive plans for expansion over the coming years. We form part of the Manpower group of companies that turn over $20 billion a year collectively.

Experis UK have partnerships with major clients across the UK spanning multiple industries; our approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development.

Skills required:

  • Microsoft Certified: Security Operations Analyst Associate Certification (SC200) is a mandatory requirement for role fulfilment
  • Experience working with SIEM technologies and security tooling
  • An understanding of IT Infrastructure and Networking An understanding of vulnerability and threat management
  • An understanding of the incident response lifecycle T
  • he ability to work in a close team and independently
  • The ability to be adaptable to a high pace changeable workload
  • An interest in security and threat management

Nice to have skills

  • A SOC Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers.
  • They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement
  • The role involves working alongside other team members including SOC engineers and Service Managers.

Benefits Include:

  • Contributory pension scheme
  • Employee Assistance Program
  • Medical and Dental cover
  • 22 days holiday + bank holidays
  • Maternity Pay/Shared Parental leave and paternity leave
  • Sick pay

Suitable Candidates should submit CVs in the first instance.

This advertiser has chosen not to accept applicants from your region.

SOC Analyst - SC Cleared

Hampshire, South East Experis

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

full time

ROLE TITLE: SOC Analyst - SC Cleared
LOCATION: Hursley

The ideal candidate will have active SC Clearance or be eligible to undergo SC Clearance.

We are actively looking to secure an SOC Analyst to join Experis.

Experis Consultancy is a Global entity with a well-established team with over 1000 consultants on assignment across 20 clients globally. Our UK operation is growing and has very aggressive plans for expansion over the coming years. We form part of the Manpower group of companies that turn over $20 billion a year collectively.

Experis UK have partnerships with major clients across the UK spanning multiple industries; our approach is a very personal one, with both our clients and our own employees. We are passionate about training, technology and career development.

Skills required:

  • Microsoft Certified: Security Operations Analyst Associate Certification (SC200) is a mandatory requirement for role fulfilment
  • Experience working with SIEM technologies and security tooling
  • An understanding of IT Infrastructure and Networking An understanding of vulnerability and threat management
  • An understanding of the incident response lifecycle T
  • he ability to work in a close team and independently
  • The ability to be adaptable to a high pace changeable workload
  • An interest in security and threat management

Nice to have skills

  • A SOC Analyst will be responsible for providing Protective Monitoring Services across a range of Secure Customers.
  • They will be responsible for the day to day monitoring using various SIEM Tools (Qradar, Sentinel & LogRhythm). Some of the responsibilities that come along with this role include the following: Security Analytics Incident investigation, triage and escalation Threat monitoring and response Trend reporting Rule tuning and continual service improvement
  • The role involves working alongside other team members including SOC engineers and Service Managers.

Benefits Include:

  • Contributory pension scheme
  • Employee Assistance Program
  • Medical and Dental cover
  • 22 days holiday + bank holidays
  • Maternity Pay/Shared Parental leave and paternity leave
  • Sick pay

Suitable Candidates should submit CVs in the first instance.

This advertiser has chosen not to accept applicants from your region.

24/7 SOC Analyst

Fujitsu

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

**24/7 SOC Analyst**
**Location: Belfast, UK**
Work Your Way is our approach to flexible working, this is available from day 1 of joining.
Our purpose is to make the world more sustainable by building trust is society through innovation. As a 24/7 SOC Analyst you will contribute to this by helping drive for service excellence within the SOC. This drive protects our customers and positions Fujitsu as a trusted leader in security, driving our business forward.
**Your role will involve:**
Being part of a team of security professionals within the 24/7 SOC team. This role is crucial in being at the forefront of security operations and ensuring round the clock capability in providing security services to Fujitsu and its customers.
**Monitor** : Proactively monitor security tools, logs and alerts for suspicious activity using various tools such as SIEM, EDR and network monitoring systems.
**Analysis** : Investigate and analyse security events and incidents to determine their nature, impact, and root cause. This includes correlating data from multiple sources, identifying patterns and applying your knowledge of security best practices and attacker tactics, techniques and procedures.
**Reporting** : Using ITSM toolsets to produce clear and concise reporting on security events, incidents and trends to various stakeholders, including customers, management, IT teams and other departments.
**Collaboration** : Working closely with other security teams, IT teams and business stakeholders to ensure effective security operations and communication. This includes fostering strong relationships and working collaboratively to achieve common goals.
**Continuous Learning** : Stay up to date on the latest security threats, vulnerabilities and best practices through training, reading industry publications and participating in security communities.
The Security Operations Center (SOC) is the front line of defence against cyberattacks. Our 24/7 SOC team is dedicated to constantly monitoring and responding to security threats, protecting our customers digital assets. The team utilise advanced technologies, including SIEM, EDR, NGAV, and IDPS, to continuously monitor, triage, analyse, correlate, and prioritize security alerts from various technologies and sources. Their expertise helps the SOC identify and respond to potential threats. This team's expertise, combined with their 24/7 availability, ensures a robust and proactive defence against evolving cyber threats.
**Please note, this is a shift-based role, therefore you will be required to work a combination of nights and days, including weekends, and will be compensated with a shift allowance.**
**All candidates will need to live within a commutable distance from the SOC's location in Belfast.**
**Your transferable skills and experience**
- Previous experience as a SOC Analyst or in a similar security role.
- Strong understanding of security concepts and attacker techniques, including network, endpoint, cloud security and the MITRE ATT&CK framework.
- Experience with security tools and technologies, including SIEM, EDR, firewalls, and intrusion detection systems.
- Excellent analytical and problem-solving skills.
- Strong communication and interpersonal skills.
- Security certifications (e.g., CompTIA Security+, Microsoft SC200, SANS SEC275 Foundations) are a plus.
**Please note: It's still worth applying even if you do not meet all the requirements above. We are passionate about investing in you and your career and if you have the transferable skills and/or background in Cyber Security this could be the next opportunity for you.**
**Your benefits**
25 days annual leave plus public holidays
Pension - double matching contributions of up to 10%
Life assurance
Companywide incentive plans
Your choices (flexible benefits such as increased holidays, travel, dental, critical illness and more)
Perks at work - employee discounts
Employee assistance programme / virtual GP
**Recruitment process**
The recruitment process consists of up to two stages of interviews.
We are a Disability Confident Employer and will offer an interview to disabled applicants who meet the minimum/essential criteria for the role. Email if you would like to apply through the Disability Confident Interview Scheme.
**Achieve together**
We are recognised as a responsible and inclusive employer: Not only are we a certified Disability Confident Leader, a Times Top 50 employer for Gender Equality, a Top 75 employer for Social Mobility, accredited with the Living Wage Foundation and a signatory for the Race at Work Charter, but we are also committed to the United Nations standards for LGBTI+ and a Stonewall Top 100 Employer.
We are people centric: Our work environments enable you to Be Completely You. Our active people-led Inclusive Community networks are representative of all aspects of diversity and are instrumental in enabling and supporting our innovative approach to inclusion.
**#LifeAtFujitsu**
**Requisition ID** : 31705
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Soc Analyst Jobs