-
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles in Central Scotland providing a 24/7 shift pattern cover for their customers.
A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable.
The roles require you to be on-site in Hampshire
* on a 4 x 4 shift pattern, whereby you will work for four 12 hour shifts and then have four shifts off.
IMPORTANT: You will be required to have only British Citizenship (i.e.
DUAL citizenship, or ILR status is not going to be eligible) AND already possess live, current SC or DV Clearance due to the timescale we are looking to hire within.
Please only apply if you have SC or DV Cleared status.
The Tier 2 Cyber Security Analyst role will involve you advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization.
This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts.
As a Tier 2 Analyst you will work to ensure a seamless SOC operation & act as a bridge between foundational & advanced threat detection & response functions.
Responsibilities:
, Conducting escalated triage & analysis on security events identified by Tier 1 Analysts, determining threat severity & advising on initial response actions.
, Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, & thorough documentation of security incidents.
, Identifying & escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response & adherence to service Tier objectives (SLOs).
, Investigating potential security incidents by conducting deeper analysis on correlated events & identifying patterns or anomalies that may indicate suspicious or malicious activity.
, Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
, Monitoring the threat landscape & documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
, Following established incident response playbooks, providing feedback for enhancements & suggesting updates to streamline internal Cyber processes & improving threat response times.
., Coordinating with Tier 3 Analysts & management to refine detection & response workflows, contributing to continuous SOC maturity.
, Collaborating with Tier 3 Analysts on tuning SIEM & detection tools to reduce false positives & improve alert fidelity, submitting tuning requests & testing configurations.
, Identifying gaps in current detection content & working with Senior Analysts to develop & validate new detection rules & use cases tailored to the organization's threat profile.
, Acting as a mentor to Tier 1 Analysts, offering guidance on triage & analysis techniques & facilitating on-the-job training.
., Assisting in training sessions and knowledge-sharing activities, contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst:
, Understands advanced networking concepts, including IP addressing, basic network protocols, & how traffic flows within a network.
, Advanced knowledge of Windows & Linux operating environments, including standard commands, file systems, & user authentication mechanisms.
, Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
, Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search & filter logs effectively.
, Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats & gathering information.
, Able to communicate clearly & efficiently with team members and stakeholders, both internally & externally, under senior analysts' direction.
, Can communicate simple technical issues to non-technical individuals in a clear & understandable way.
, Able to create concise, structured reports that outline findings from preliminary investigations & daily monitoring.
, Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
, Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
, Shows initiative in learning new technologies and techniques.
, Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in IM.
Next Steps:
If you have live SC or DV Clearance, along with the associated skills for this role & are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately.
Interviews will be conducted promptly with suitable candidates who meet all the stipulated essential Citizenship & Clearance criteria.
We are Disability Confident and neurodiverse aware.
If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process ....Read more...
Type: Permanent Location: Central Belt, Scotland
Start: With SC or DV Clearance ASAP
Salary / Rate: £48000 - £65000 per annum + Career path to DV level & Benefits
Posted: 2025-04-17 17:49:52
-
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers.
A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable.
You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within.
Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time.
If you do have SC Cleared status, or higher, i.e.
DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.
The Tier 2 Cyber Security Analyst role will involve you being responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization.
This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts.
As a Tier 2 Analyst you will works closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions.
Responsibilities:
, Conducting escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions.
, Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents.
, Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs).
, Investigating potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity.
, Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
, Monitoring the threat landscape and documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
, Following established incident response playbooks, providing feedback for enhancements and suggesting updates to streamline internal Cyber processes and improving threat response times.
., Coordinating with Tier 3 Analysts and management to refine detection and response workflows, contributing to continuous SOC maturity.
, Collaborating with Tier 3 Analysts on tuning SIEM and detection tools to reduce false positives and improve alert fidelity, submitting tuning requests and testing configurations when necessary.
, Identifying gaps in current detection content and working with Senior Analysts to develop and validate new detection rules and use cases tailored to the organization's threat profile.
, Acting as a mentor to Tier 1 Analysts, offering guidance on triage and analysis techniques and facilitating on-the-job training to elevate their technical skills and operational efficiency
., Assisting in training sessions and knowledge-sharing activities, providing feedback on areas for growth and contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst:
, Understands advanced networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
, Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
, Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
, Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
, Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
, Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.
, Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
, Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring.
, Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
, Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
, Shows initiative in learning new technologies and techniques.
, Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in IM.
Next Steps:
If you have SC Clearance, the associated skills for this role, and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately.
Interviews will be conducted ASAP with suitable candidates who meet all the criteria, with attractive packages offered to start ASAP.
We are Disability Confident and neurodiverse aware.
If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process ....Read more...
Type: Permanent Location: Hampshire, England
Start: SC or DV Clearance ASAP
Salary / Rate: £48000 - £65000 per annum + Career path to DV level & Benefits
Posted: 2025-04-11 11:48:24
-
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers.
You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within.
Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time.
If you do have SC Cleared status, or higher, i.e.
DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.
The Tier 1 Cyber Security Analyst role will involve working under the guidance of more senior analysts, so your foundational knowledge of Security Information and Event Management (SIEM) solutions, to support the security operations team will be put to very good use.
We are looking to assess your proficiency in utilizing Kusto Query Language (KQL), for log analysis and gain experience using multiple ticketing systems to manage incidents effectively ensuring that we adhere to our service level objectives.
Responsibilities of a Tier 1 Cyber Security Analyst:
, Monitoring and reviewing security events across various SIEM platforms 24/7/365 to detect, triage, and responding to security incidents.
, Acting as the first line of response for security incidents by identifying, validating, and classifying potential threats, escalating to higher tiers when necessary.
, Performing preliminary analysis on alerts to determine false positives and escalate confirmed incidents based on pre-defined criteria.
, Creating and managing incident tickets in the system to track incident status and facilitate accurate handovers between shifts.
, Conducting and documenting formal handover / takeover procedures at the beginning and end of each shift to ensure continuity of operations.
, Liaising with Tier 2 and Tier 3 Analysts for complex investigations, continuity briefs, and updates on service status issues.
, Following and providing feedback on existing processes; identifying and suggesting improvements to streamline workflow efficiency.
, Following procedures to communicate and report incidents to appropriate team members and documenting incidents as per internal guidelines.
, Working closely with other team members, contributing to a cooperative environment while assisting in the completion of assigned tasks.
, Developing a foundational understanding of security event analysis from network traffic, host logs, and other data sources to support incident identification and escalation.
, Completing assigned tasks accurately and in a timely manner as directed by senior analysts or management.
, Engaging with available knowledge and training tools to maintaining and improving technical skills, enhancing the ability to support cyber security operations effectively.
Tier 1 Analyst Roles and Responsiblilties
, Once comprehensive training has been completed, the L1 Analyst will assume shift lead duties in the absence of an L2 Analyst.
You will be responsible for security monitoring, completion of all assigned tasks and ensuring a thorough handover at the end of the shift.
Knowledge and Skills
, Understands and can explain foundational networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
, Basic knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
, Competence in using SIEM for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
, Able to demonstrate basic knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
, Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
, Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.
, Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
, Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring activities.
, Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
, Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
, Shows initiative in learning new technologies and techniques, leveraging internal resources and training to grow professionally.
, Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in incident management.
Next Steps:
If you have SC Clearance, the associated skills for this role, and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately.
Interviews will be conducted ASAP with suitable candidates who meet all the criteria, with attractive packages offered to start ASAP.
We are Disability Confident and neurodiverse aware.
If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process ....Read more...
Type: Permanent Location: Renfrewshire, Scotland
Start: ASAP with SC Clearance
Posted: 2025-04-10 18:05:24
-
Cyber Security Analyst - Luton
Hybrid working available
£50,000 Salary
Cyber Security Analyst required for a leading client based in Luton.
My client is currently seeking a Cyber Security Analyst to come on board to responsibility is to detect, investigate, and respond to cybersecurity events and incidents.
Additional duties include managing business-as-usual security tasks, supporting cybersecurity projects, and assisting with regulatory compliance.
This role involves working with a diverse range of security tools, providing the successful candidate with broad experience across all aspects of cybersecurity.
Key skills and responsibilities,
, Cyber Security Analyst experience , Strong knowledge and experience with Microsoft Windows operating systems., Proficient in Active Directory, Group Policies, TCP/IP, DNS, DHCP, and Exchange Server., Ability to effectively multitask, prioritize workload, and manage competing demands., Experience in analyzing IT logs and event sources is preferred., Monitor and administer Security Information and Event Management (SIEM).
, Malware analysis and forensics research.
, Understanding/ differentiation of intrusion attempts and false positives.
, Investigation tracking and threat resolution.
, Familiarity with data storage systems, backup solutions, and restoration methods., Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs., Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques., Strong knowledge of cloud computing, network defence, identity management, incident management, and network security., Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response.
Interested!?! Please send your up to date CV to Dean Sadler-Parkes at Crimson for immediate review
Not interested?! Do you know anyone that might be? Refer a friend for this role to earn £250 worth of vouchers.
http://info.crimson.co.uk/referafriend
Crimson are acting as an employment business in regards to this vacancy.
Cyber Security Analyst - Luton
Hybrid working available
£50,000 Salary
Cyber Security Analyst required for a leading client based in Luton.
My client is currently seeking a Cyber Security Analyst to come on board to responsibility is to detect, investigate, and respond to cybersecurity events and incidents.
Additional duties include managing business-as-usual security tasks, supporting cybersecurity projects, and assisting with regulatory compliance.
This role involves working with a diverse range of security tools, providing the successful candidate with broad experience across all aspects of cybersecurity.
Key skills and responsibilities,
, Cyber Security Analyst experience , Strong knowledge and experience with Microsoft Windows operating systems., Proficient in Active Directory, Group Policies, TCP/IP, DNS, DHCP, and Exchange Server., Ability to effectively multitask, prioritize workload, and manage competing demands., Experience in analyzing IT logs and event sources is preferred., Monitor and administer Security Information and Event Management (SIEM).
, Malware analysis and forensics research.
, Understanding/ differentiation of intrusion attempts and false positives.
, Investigation tracking and threat resolution.
, Familiarity with data storage systems, backup solutions, and restoration methods., Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs., Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques., Strong knowledge of cloud computing, network defence, identity management, incident management, and network security., Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response.
Interested!?! Please send your up to date CV to Dean Sadler-Parkes at Crimson for immediate review
Not interested?! Do you know anyone that might be? Refer a friend for this role to earn £250 worth of vouchers.
http://info.crimson.co.uk/referafriend
Crimson are acting as an employment business in regards to this vacancy. ....Read more...
Type: Permanent Location: Luton, England
Start: ASAP
Salary / Rate: £45000 - £50000 per annum
Posted: 2025-04-04 15:22:00
-
Cyber Security Analyst- Biel/Bienne, Switzerland
Tech Stack: SOC, CSIRT, MITRE, NIST, EDR, SIEM, Splunk, Crowdstrike, NDR, SOAR, Threat Intelligence, Threat Hunting, Incident Response, Security Operations, Network Security, Endpoint Security, Security Analytics, Forensics, Compliance, Cloud Security, Intrusion Detection.
We have an exciting opportunity for a Cyber Security Analyst to join an iconic Swiss brand renowned for excellence and innovation.
As an experienced professional in SOC environments, you will work alongside leading experts in cybersecurity and software development, contributing to the protection of high-value digital assets.
Our client's commitment to precision and security is unmatched, and this role will allow you to play a key part in developing and implementing cutting-edge cybersecurity solutions within a world-class environment.
Our client is seeking a passionate a Cyber Security Analyst with experience in some or all of the following (full training will be provided to fill any gaps in your skill set): SOC, CSIRT, MITRE, NIST, EDR, SIEM (Splunk, Crowdstrike), NDR, SOAR, Threat Intelligence, Threat Hunting, Incident Response, Security Operations, Network Security, Endpoint Security, Security Analytics, Forensics, Compliance, Cloud Security, and Intrusion Detection.
Fluency in French is required, and candidates should be open to traveling to Geneva one day per week.
This is your opportunity to be part of a new, technically challenging project and to be involved in the creation of a new application from scratch.
All Cyber Security Analyst come with the following benefits:
Competitive Salary & Performance Bonuses.
First-Class Working Environment in a Prestigious Swiss Brand.
Flexible Working Hours for Work-Life Balance.
Generous Pension Scheme & Social Benefits.
State-of-the-Art Facilities & Cutting-Edge Technology.
Professional Development & Training Opportunities.
Location: Biel/Bienne, Switzerland/ Hybrid Working
Salary: CHF 110,000 - CHF 130,000 + Pension + Benefits
To apply for this position please send your CV to Charlie Skipper at Noir.
Applicants must be based in Switzerland and have the right to work in Switzerland even though remote working is available.
NOIRSWITZERLANDREC
NOIREUROPEREC
NOIREURNET
NC/CS/CYBBIEL110130 ....Read more...
Type: Permanent Location: Biel, Switzerland
Start: ASAP
Salary / Rate: Swiss Franc110000 - Swiss Franc130000 per annum + Benefits + Salary
Posted: 2025-03-17 02:00:26
-
An exciting opportunity has arisen for a Business Analyst to join a well-established estate agency.
This full-time role offers excellent benefits, hybrid working and a salary range of £40,000 - £45,000.
As a Business Analyst, you will be responsible for analysing data, identifying improvements to business processes, and making strategic recommendations.
What we are looking for:
* Previously worked for 3+ years as a Business Analyst, Business Intelligence Analyst, Commercial Analyst, Business Case Consultant, Business Strategy Consultant, Business Planning Consultant or in a similar role.
* Experience with Agile methodologies, including Scrum and Sprint planning.
* Degree in relevant IT or business-related subject or equivalent professional experience.
* Skilled in Confluence and Jira.
* Strong analytical and problem-solving skills.
* Excellent verbal and written communication abilities.
What's on offer:
* Competitive salary
* 33 days' paid holiday
* Additional day off for your birthday
* Pension scheme
* Company sick pay
* Rewards and incentives
* Employee assistance programme
* Paid entry fees for charitable events
Apply now for this exceptional opportunity to work with a dynamic team and further enhance your career.
Important Information: We endeavour to process your personal data in a fair and transparent manner.
In applying for this role, Additional Resources will be acting in your best interest and may contact you in relation to the role, either by email, phone or text message.
For more information see our Privacy Policy on our website.
It is important you are aware of your individual rights and the provisions the company has put in place to protect your data.
If you would like further information on the policy or GDPR please contact us.
Additional Resources Ltd is an Employment Business and an Employment Agency as defined within The Conduct of Employment Agencies & Employment Businesses Regulations 2003.
....Read more...
Type: Permanent Location: Horsham, England
Start:
Duration:
Salary / Rate: £40000 - £45000 Per Annum
Posted: 2025-03-10 17:13:00