CrawlJobs Logo

Csoc analyst

boeing.com Logo

Boeing

Location Icon

Location:
United Kingdom , Waddington

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

A Cyber Security Analyst is the first line of defense within our Security Operations Center (SOC) at Boeing Defence UK. You will be responsible for monitoring, triaging, and responding to security alerts generated across our network and infrastructure. This role is critical in maintaining the integrity of our systems and protecting sensitive data from emerging cyber threats.

Job Responsibility:

  • Monitoring, triaging, and responding to security alerts generated across our network and infrastructure
  • Work within the established monitoring and response frameworks to enable the timely and effective response and management of incidents, alarms, notifications, calls and all other activities related to the SOC including new and emerging cyber threats
  • Respond to security events, requests and incidents logged in management systems
  • Monitor the security posture of the IT estate and identify anomalous activity and behaviours by the use of monitoring tools
  • Perform in-depth analysis of log files, systems, and network traffic
  • Hunt for suspicious activity based on anomalous activity
  • Innovate in the areas of SIEM and SOC and develop best practice
  • Continuously identifying improvements in both tooling and processes
  • Triage/respond to 2nd/3rd line escalation of incidents
  • Work to well-defined SLAs & KPIs

Requirements:

  • A degree in Computer Science, Cyber Security, or a similar, related field
  • Prior experience in an IT Support, Helpdesk or related role/internship is highly beneficial
  • Strong analytical and problem-solving skills with high attention to detail
  • Foundational Knowledge: Solid understanding security operations and identifying threats
  • Operating Systems: Proficiency in Windows and Linux environments
  • Security Tools: Familiarity with common security tools
  • Incident Response: Basic understanding of the incident response lifecycle
  • Must have current legal authorisation to work immediately in the UK
  • Must undergo a security clearance check with no caveats (Security Check [SC])
  • Must hold, or have the ability to acquire, Security Clearance (SC)
  • UK residency required for security clearance

Nice to have:

  • Certifications: CompTIA Security+, CySA+, or equivalent entry-level security certifications
  • Tool Experience: Common SIEM and vulnerability management tooling experience
What we offer:
  • Competitive base pay and incentive programs
  • Industry-leading tuition assistance program pays your institution directly
  • Resources and opportunities to grow your career
  • Up to $10,000 match when you support your favorite nonprofit organizations

Additional Information:

Job Posted:
March 21, 2026

Expiration:
March 27, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Csoc analyst

Soar Developer

Cyber Defence Operations (CDO) is Vodafone Group’s Cyber Defence Operations Cent...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong understanding of security concepts and practices
  • Proficiency in programming languages such as Python, JavaScript or others commonly utilised in Soar development
  • In-depth knowledge and extensive hands-on experience with Soar platforms such as Splunk Phantom, Siemplify, IBM Resilient or similar tools
  • Knowledge of advanced threat detection and response methodologies alongside tools such as SIEM and SOAR
  • Comprehensive understanding of cybersecurity principles including security operations, incident response and threat intelligence
  • Strong analytical and problem-solving skills
  • Excellent familiarity with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies
  • Proven ability to work efficiently in fast-paced work environment and manage multiple priorities simultaneously
  • Bachelor’s degree or higher in Cyber Security/Information Technology or related field
  • One or more cyber security certifications such as GCIA, GCIH, GCFA, GNFA, CEH, ECSA preferred
Job Responsibility
Job Responsibility
  • Work closely with security analysts and engineers to detect and address security gaps by implementing automation workflows that enhance security operations
  • Evaluate and enhance CSOC workflows and processes by integrating automation through SOAR tools and technologies
  • Deploy CSOC automation and ensure compatibility with existing detection and response tools
  • Create and implement custom scripts to automate current detection and response workflows
  • Operate and refine the CSOC playbook and workflow automations
  • Requirement Analysis – Collaborating with stakeholders to gather and analyse requirements for the Soar and translating them into actionable development tasks
  • Risk Management – Identifying potential risks and challenges in Soar development projects alongside implementing strategies to mitigate them
  • Vendor Management – Collaborating with external vendors or partners when necessary for tool integration, support or other aspects of SOAR development
What we offer
What we offer
  • Discretionary yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity/adoption leave: 52 weeks out of which the first 13 weeks are fully paid followed by 26 weeks of half pay and 6 months - working 4 days, getting paid 5
  • Paternity leave: 16 weeks fully paid
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
  • Fulltime
Read More
Arrow Right
New

Security Operations Analyst

Location
Location
Spain , Valencia
Salary
Salary:
Not provided
united-its.com Logo
United ITs
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A minimum of five (5) years of relevant experience in information technology field, including triage of alerts and supporting security incidents
  • Proven experience on administering a SIEM platform, preferably either Splunk or Microsoft Sentinel SIEM
  • Proven experience with the usual toolbox available in a SOC (e.g., SIEMs, EDRs) and being able to autonomously perform technical analysis of security threats and collaborate with Incident Response team
  • Deep knowledge of Microsoft Security Tools (e.g. M365, Cloud App Security, Azure, Defender for Endpoints, Azure Security, Azure Sentinel and XDR
  • Deep Knowledge of Cloud technologies (e.g. Azure, AWS and GCP)
  • Deep knowledge of SIEM tools like Splunk, QRadar, ArcSight, MS Sentinel, ELK Stack
  • Knowledge of at least one EDR solution (MS Defender for Endpoint, CrowdStrike)
  • Knowledge of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols
  • Knowledge of email security, network monitoring, and incident response
  • Knowledge of Linux/Mac/Windows
Job Responsibility
Job Responsibility
  • In close collaboration, build, adjust and implement analytics and detection rules for SIEM, EDR and AV
  • Under guidance, participate in cybersecurity architecture review of new or existing technical solutions and provide recommendations for improvement
  • Work directly with cyber threat intelligence analysts to convert intelligence into useful detection rules
  • Collaborate with incident response team to rapidly build detection rules and signatures as needed, as well as maintaining and improving existing detection rules
  • Contribute to the preparation of KPIs for cybersecurity operations capabilities
  • Monitor, triage, and investigate security alerts across Microsoft security tools, AWS, SIEM platforms, and EDR solutions
  • Identify root causes, direct remediation and recovery actions, and support incident response efforts
  • Follow structured analytical processes and collaborate with other analysts and teams to ensure effective threat management
  • Prepare and present security reports, summaries, and findings to clients
  • Contribute to the improvement of CSOC processes and procedures, including quality control procedures, documentation and knowledge base updates
  • Fulltime
Read More
Arrow Right

Cyber Defence Analyst

We are seeking a skilled and proactive Cyber Defence Analyst to join our Securit...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 3 years of experience in Cyber Security, SOC operations, SIEM, and incident management
  • Strong understanding of network and security concepts and SIEM technologies (e.g., ArcSight, Splunk, QRadar, LogRhythm)
  • Holds industry-recognised certifications such as CEH, CCNA Cyber Ops, Security+
  • Excellent analytical and communication skills
  • Degree in Computer Science, Information Technology, Engineering, or a related field
  • Experience in global customer handling and event analysis
  • Demonstrates integrity, self-motivation, and cultural sensitivity
Job Responsibility
Job Responsibility
  • Investigate, analyse, and triage security alerts using CSOC tools
  • Document event and case analysis in the incident management system and manage cases through closure
  • Perform historical analysis of detected events and support incident managers
  • Participate in daily stand-up calls and contribute to knowledge base development
  • Collaborate with local market CSIRT teams and ensure effective communication across global teams
  • Proactively reduce alert volumes through fine-tuning and process stabilisation
  • Communicate emerging threats and malware behaviours clearly to stakeholders
  • Ensure mitigation measures are in place to reduce spam and phishing alerts
  • Maintain composure under pressure and respond effectively during emergencies
What we offer
What we offer
  • Opportunity to work in a global 24/7 cyber defence environment
  • Exposure to advanced security tools and technologies
  • Collaboration with international teams and senior security experts
  • Contribution to Vodafone’s mission to protect digital assets and infrastructure
  • A dynamic and inclusive workplace that values continuous learning and innovation
Read More
Arrow Right

L1 Cyber Defence Analyst

We are seeking a skilled and proactive Cyber Defence Analyst to join our Securit...
Location
Location
India , Pune
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 3 years of experience in Cyber Security, SOC operations, SIEM, and incident management
  • Strong understanding of network and security concepts and SIEM technologies (e.g., ArcSight, Splunk, QRadar, LogRhythm)
  • Holds industry-recognised certifications such as CEH, CCNA Cyber Ops, Security+
  • Excellent analytical and communication skills
  • Degree in Computer Science, Information Technology, Engineering, or a related field
  • Experience in global customer handling and event analysis
  • Demonstrates integrity, self-motivation, and cultural sensitivity
Job Responsibility
Job Responsibility
  • Investigate, analyse, and triage security alerts using CSOC tools
  • Document event and case analysis in the incident management system and manage cases through closure
  • Perform historical analysis of detected events and support incident managers
  • Participate in daily stand-up calls and contribute to knowledge base development
  • Collaborate with local market CSIRT teams and ensure effective communication across global teams
  • Proactively reduce alert volumes through fine-tuning and process stabilisation
  • Communicate emerging threats and malware behaviours clearly to stakeholders
  • Ensure mitigation measures are in place to reduce spam and phishing alerts
  • Maintain composure under pressure and respond effectively during emergencies
What we offer
What we offer
  • Opportunity to work in a global 24/7 cyber defence environment
  • Exposure to advanced security tools and technologies
  • Collaboration with international teams and senior security experts
  • Contribution to Vodafone’s mission to protect digital assets and infrastructure
  • A dynamic and inclusive workplace that values continuous learning and innovation
Read More
Arrow Right

L3 Security Analyst

Join Vodafone’s Cyber Defence Operations Center of Excellence (CDO) and play a p...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experienced SOC analyst (Level 2 or above) with at least 4 years in security event analysis and incident response
  • Strong technical knowledge of networking protocols, operating systems (Windows/Linux), and security technologies (SIEM, EDR, IDS/IPS, firewalls, proxies)
  • Hands-on experience with SIEM tuning and SOAR automation
  • Familiarity with frameworks like MITRE ATT&CK and cyber kill chain
  • Knowledge of cloud platforms (Azure, AWS, Google Cloud) and scripting/programming skills
  • Excellent analytical, communication, and collaboration skills, with the ability to explain technical concepts to non-technical audiences
  • Passion for continuous learning and professional development, ideally working toward certifications such as GCIA, GCIH, GCFA, GNFA, CEH, or ECSA
  • A proactive, disciplined approach and the ability to work independently or as part of a team in a fast-paced environment
Job Responsibility
Job Responsibility
  • Investigate and validate threats using cutting-edge tools
  • Collaborate with global teams on incident investigations
  • Mentor colleagues to uplift skills across the CSOC
  • Fine-tuning SIEM systems and automating response actions
  • Delivering insightful security reports and advisories
What we offer
What we offer
  • Yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity leave: 52 weeks: the first 13 weeks are fully paid, followed by 26 weeks of half pay
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
Read More
Arrow Right
New

Cyber Security Analyst - Level 3

We are seeking a skilled Cyber Security Analyst (Level 3) to strengthen our Cybe...
Location
Location
India , Pune
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bring 10+ years of experience in SOC operations, SIEM technologies, event analysis, and incident investigation
  • Have strong hands-on expertise with SIEM platforms such as ArcSight, Splunk, QRadar, LogRhythm, or similar technologies
  • Demonstrate solid understanding of network and security concepts, correlation logic, and detection mechanisms
  • Possess analytical thinking and clear written and verbal communication skills
  • Experienced in cloud technologies and global customer environments
  • Hold an academic background in Computer Science, Information Technology, Engineering, or a related discipline
  • Preferably hold security certifications such as CISM, CISSP, or SANS credentials
  • Known for integrity, self-motivation, collaborative working, and cultural sensitivity
  • Able to guide and coach new team members effectively
Job Responsibility
Job Responsibility
  • Lead end-to-end analysis, triage, and investigation of security alerts and incidents
  • Serve as the primary subject matter expert for escalated technical queries within the CSOC
  • Drive automation initiatives and continuous process stabilisation efforts
  • Collaborate closely with onshore teams to refine alert logic, reduce false positives, and optimise detection mechanisms
  • Create and maintain Standard Operating Procedures (SOPs), Knowledge Error Databases (KEDBs), playbooks, and knowledge base articles
  • Mentor and guide new joiners to build team capability and confidence
  • Produce management reports covering alert trends, investigation insights, and process performance
  • Participate and contribute to daily stand-up discussions and incident review sessions
  • Conduct knowledge‑sharing sessions to drive continuous learning within the team
  • Engage with local market CSIRT teams to support ongoing cases and ensure positive customer experience
What we offer
What we offer
  • Opportunity to work as a senior specialist influencing cyber defence capabilities across global markets
  • Exposure to advanced SIEM technologies, cloud environments, and global threat landscapes
  • Ability to lead improvement initiatives and shape operational efficiencies
  • Continuous learning through brown-bag sessions, cross‑team collaboration, and advanced certification pathways
  • Leadership opportunities through mentoring and guiding team members
Read More
Arrow Right

SIEM Content Development Specialist

The SIEM Content Development Specialist plays a critical role in advancing the C...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 2-5 years’ experience in SIEM content (rule logic and code) development role
  • Minimum of 2 years of SOC analyst experience (Level2 or above) required
  • In depth and extensive hands-on experience in security event analysis, create and refine SIEM/EDR rules and deliver efficiency within the SIEM and all other technologies used within the team
  • Deep knowledge of IPv4/IPv6, TCP networking protocols
  • Deep knowledge of Windows/Linux operating systems
  • Exceptional working knowledge of security technologies such as SIEM (ArcSight, Sentinel, QRadar, LogRhythm, Splunk), EDR (Microsoft Defender, FireEye, Tanium), IDS/IPS, firewalls, proxies, web application firewalls, anti-virus, etc.
  • Comprehensive understanding of Window Security Event logs and Syslog
  • Excellent familiarity with endpoint/perimeter security attack vectors and detection (blue/purple teaming)
  • Excellent familiarity with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies
  • Outstanding knowledge of cloud platforms such as Azure, O365, Google cloud, AWS, Oracle
Job Responsibility
Job Responsibility
  • Contribute to continuous improvement initiatives across multiple technologies by developing and refining content that enhanced threat detection and response capabilities
  • Contribute to the development and optimisation of threat detection content, including the tuning of threat and vulnerability management technologies and the continual refinement of SIEM rules and logic to enhance detection accuracy and operational performance
  • Lead and contribute to the optimisation and modernisation of SIEM content, supporting the adoption of next-generation SIEM technologies and cloud-native security tools
  • Manage the lifecycle of detection content, including development, testing, release, and retirement, using version control and documentation best practices
  • Collaborate with DevOps/SecOps teams to integrate security content into broader CI/CD workflows
  • Collaborate with the CSOC Manager to support improvements in security operations through effective content contributions
  • Support security event analysis by participating in and may drive security event analysis activities to address current cyber threats
  • Assist in threat response activities, providing analytical input from a blue team perspective to help identify potential threat group behaviours
  • Contribute to the creation of cyber security reports and advisories, ensuring timely and accurate dissemination to key stakeholders
  • Participate in residual risk assessments, supporting post-incident analysis and the documentation of operational and technical lessons learned
What we offer
What we offer
  • Yearly bonus: 10%
  • Annual leave: 28 days + bank holidays + the opportunity to buy/sell/carry over 5 days/year
  • Charity days: 5 days/year
  • Maternity leave: 52 weeks: the first 13 weeks are fully paid, followed by 26 weeks of half pay
  • Private pension: You can contribute up to 5% of your basic pay with 2:1 matching from Vodafone up to 10%
  • Access to: private medical, private dental, free health assessments, share save scheme
  • Additional discounts: Vodafone retail, gym, cinema, cycle to work, season ticket loan
  • Fulltime
Read More
Arrow Right

Cyber Defence Analyst

We are seeking a Cyber Defence Analyst to join our Cyber Security Operations Cen...
Location
Location
India , Pune
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 3 years of experience in Cyber Security, SOC operations, SIEM technologies, and incident management
  • Strong understanding of networking and security concepts, with hands-on experience in SIEM tools such as ArcSight, Splunk, QRadar, or LogRhythm
  • Industry-recognised certifications such as CEH, CCNA Cyber Ops, or Security+
  • Excellent analytical and communication skills, with the ability to follow defined triage playbooks
  • Knowledge of cybersecurity threats, attack techniques, and operational monitoring of security events
  • Degree in Computer Science, Information Technology, Engineering, or equivalent
  • Experience in global customer handling and a reputation for integrity and cultural sensitivity
Job Responsibility
Job Responsibility
  • Act as a frontline cyber defender, ensuring protection of digital assets from unauthorised access
  • Investigate, analyse, and triage security alerts using CSOC tools and processes
  • Document event analysis and maintain case ownership until closure
  • Perform historical analysis of detected events and support incident managers during critical situations
  • Participate in daily stand-up calls and contribute to knowledge base articles
  • Collaborate with global CSIRT teams for ongoing cases and document SOPs and processes
  • Proactively work on alert reduction and process stabilisation
  • Ensure mitigation measures for spam and phishing alerts
  • Communicate effectively about threats, malware behaviour, and risks to business stakeholders
What we offer
What we offer
  • Opportunity to work in a global 24/7 Cyber Security Operations Centre
  • Exposure to advanced security tools and technologies
  • Collaborative environment with global teams and industry experts
  • Continuous learning and development in cybersecurity trends and practices
  • Fulltime
Read More
Arrow Right