CrawlJobs Logo

Digital Cyber Analyst

bdo.co.uk Logo

BDO UK LLP

Location Icon

Location:
United Kingdom , Birmingham

Category Icon
Category:
IT - Administration

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are looking for a high-performing individual looking to advance their career in our fast growing and dynamic Managed Cyber Security Services team in the UK. BDO global is expanding their Security Operations Centre to keep up with growing demand from our clients. We are therefore looking at hiring a skilled and experienced SOC analysts to join the global SOC team to help protect our global client base from cyber threats.

Job Responsibility:

  • Manage risk for our clients to make them stronger for the future
  • Help protect our global client base from cyber threats

Requirements:

  • Experience in using SIEM, MDR, EDR, and SOAR technologies
  • Experience working as an analyst within a SOC
  • Familiarity with relevant coding languages, e.g. Python, SQL, Robin Script, KQL, Cypher, etc.
  • One or more relevant security certification e.g. Certified Ethical Hacker, Certified SOC Analyst, Microsoft SC-200, Security+, etc.
  • Bachelor's degree in Cyber/Information security
  • Resides in the UK
  • Fluent in English
What we offer:
  • Agile working
  • Programmes, resources, and frameworks that provide clarity and structure around career development
  • Informal success conversations to formal mentoring and coaching
  • State-of-the-art collaboration spaces in our offices
  • Multidisciplinary events and dedicated resources

Additional Information:

Job Posted:
December 23, 2025

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Digital Cyber Analyst

New

Digital Network Exploitation Analyst

Altamira is searching for a Digital Network Exploitation Analyst (DNEA) in Sarat...
Location
Location
United States , Saratoga Springs
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience must be in computer or information systems design/development/analysis roles
  • It may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement
  • Must have active TS/SCI with full scope polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 1: 2 years’ applicable experience with a bachelor’s degree, OR 4 years’ applicable experience with associate degree
  • Level 2: 2 years’ applicable experience with a PhD, OR 3 years’ applicable experience with a master’s degree, OR 5 years’ applicable experience with a bachelor’s degree, OR 7 years’ applicable experience with an associate degree
  • Level 3: 4 years’ applicable experience with a PhD, OR 6 years’ applicable experience with a master’s degree, OR 8 years’ applicable experience with a bachelor’s degree, OR 10 years’ applicable experience with an associate degree
  • Level 4: 7 years’ applicable experience with a PhD, OR 9 years’ applicable experience with a master’s degree, OR 11 years’ applicable experience with a bachelor’s degree, OR 13 years’ applicable experience with an associate degree
  • Degree in Computer Science
  • Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics)
Read More
Arrow Right

AVP - SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Experience with Big Data Technologies, ETL Tools, Data Warehouse and Business Intelligence technologies is preferred
  • Experience with any scripting language and Splunk is a plus
  • Experience with vulnerability assessment as well as penetration testing or forensic analysis fields is a plus
  • Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, GWAPT and CFE]
  • 5-8 years of relevant experience in Cyber Fraud or SOC
Job Responsibility
Job Responsibility
  • The analyst performs monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms including Web Threat Detection, Real Time Fraud Risk Assessment, Big Data and Digital Application Monitoring tools (Splunk, SAS, Teradata, and enterprise real time fraud detection tools)
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

Cyber Engineering Senior Analyst

Join Citi's forward-thinking security organization as an Engineering Senior Anal...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of relevant cybersecurity and/or IT experience
  • Leadership roles across technology or cybersecurity leading large programs or transformational activities
  • Experience in Micro and/or Network segmentation products like illumio, zScaler, Palo-Alto
  • Proven strong knowledge of Cyber Security solutions and products focusing on Cloud, Firewall, Network/ Macro/ Micro Segmentation
  • Thorough understanding of industry and corporate technology standards for Cyber Security services
  • Fluency in English
  • Demonstrated ability to take ownership and work with cross functional teams to manage multiple projects simultaneously under pressure
  • Experience with Linux/Unix administration is plus
  • Strong knowledge of Proxy functionality and Proxy features
  • Bachelor’s degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Co-operating with CITI’s Cyber Security Lab, Architecture, Engineering to design, deploy and maintain micro segmentation solutions
  • Working with Transformation Program Directors, Senior Architects, Steering Committees, CISO and CTI partners in delivering the transformational Programs
  • Interfacing and supporting Citi’s Security Architecture Council and Working Groups building strong rapport across teams
  • Supporting Citi’s adoption of cloud continuum and holistic digital transformation
  • Creating automation of repetitive tasks like Software Install/upgrades, DB patching, OS Patching, Server build using Shell/Python scripting
  • Making project plans, performing impact analyses solve/work high impact problems/projects, and providing resolutions to restore services
  • Reviewing requirement documents, defining hardware requirements and examining and updating processes and procedures as necessary
  • Providing technical/strategic direction and acting as advisor/coach to junior engineers
  • Contributing to technical direction and strategic decisions by prepare, discussing and implementing strategic solutions to avoid repeated issue
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right

Digital Network Exploitation Analyst

Hoplite Solutions is seeking Digital Network Exploitation Analysts (DNEAs) level...
Location
Location
United States
Salary
Salary:
Not provided
hoplitesolutions.com Logo
Hoplite Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development/analysis roles
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 3: 4 years’ applicable experience with a PhD, OR 6 years’ applicable experience with a master’s degree, OR 8 years’ applicable experience with a bachelor’s degree, OR 10 years’ applicable experience with an associate degree
  • Level 4: 7 years’ applicable experience with a PhD, OR 9 years’ applicable experience with a master’s degree, OR 11 years’ applicable experience with a bachelor’s degree, OR 13 years’ applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans
  • Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network
  • Be involved in developing new tradecraft needed to perform this analysis as technologies evolve
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
What we offer
What we offer
  • 7% employer 401k contribution
  • Fully paid healthcare for our employees
  • Outstanding training benefits
  • Company funded life insurance
  • Company funded short-term disability insurance
  • Fulltime
Read More
Arrow Right

Digital Network Intelligence Analyst

The Digital Network Intelligence (DNI) Analyst will be actively integrated into ...
Location
Location
United States , Fort Meade or Columbia
Salary
Salary:
Not provided
gsconsultingllc.com Logo
GS Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree in liberal arts or sciences or equivalent military training
  • Experience with computer network operations and SIGINT tools and databases
  • Experience conducting technical analysis against target systems and networks, capabilities, vulnerabilities, and support development of techniques to exploit targets
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
  • The ability to work non-standard hours when needed
Job Responsibility
Job Responsibility
  • Conduct DNI analysis and document the analysis for dissemination
  • Conduct technical metadata analysis of the adversary information systems
  • Utilize intelligence community (IC) databases to analyze social and telecommunications networks and exploit high priority targets
  • Conduct ongoing analysis for specified adversary targets using DNI/DNR
  • Conduct analysis on network events to determine the impact to DoD/IC operations and conduct all-source research to determine adversary capability and intent
  • Write reports for customers based on research and analysis of cyber threat activities and techniques
Read More
Arrow Right

Infosec Senior Analyst

Join Citi's forward-thinking security organization as an InfoSec Senior Analyst ...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of relevant cybersecurity and/or IT experience
  • Leadership roles across technology or cybersecurity leading large programs or transformational activities
  • Proven strong knowledge of Cyber Security solutions and products focusing on Cloud, Firewall, Network/ Macro/ Micro Segmentation
  • Thorough understanding of industry and corporate technology standards for Cyber Security services
  • Fluency in English
  • Demonstrated ability to take ownership and work with cross functional teams to manage multiple projects simultaneously under pressure
  • Experience with Linux/Unix administration is plus
  • Strong knowledge of Proxy functionality and Proxy features
  • Bachelor’s degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Co-operating with CITI’s Cyber Security Lab, Architecture, Engineering to design, deploy and maintain micro segmentation solutions
  • Working with Transformation Program Directors, Senior Architects, Steering Committees, CISO and CTI partners in delivering the transformational Programs
  • Interfacing and supporting Citi’s Security Architecture Council and Working Groups building strong rapport across teams
  • Supporting Citi’s adoption of cloud continuum and holistic digital transformation
  • Creating automation of repetitive tasks like Software Install/upgrades, DB patching, OS Patching, Server build using Shell/Python scripting
  • Making project plans, performing impact analyses solve/work high impact problems/projects, and providing resolutions to restore services
  • Reviewing requirement documents, defining hardware requirements and examining and updating processes and procedures as necessary
  • Providing technical/strategic direction and acting as advisor/coach to junior engineers
  • Contributing to technical direction and strategic decisions by prepare, discussing and implementing strategic solutions to avoid repeated issue
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance
  • Paid Parental Leave Program
  • Private Medical Care Program and onsite medical rooms
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to learning and development programs, online course libraries and upskilling platforms
  • Flexible work arrangements
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right
New

Osint/pai Targeting Analyst – Subject Matter Expert

Barbaricum is seeking an OSINT/PAI Targeting Analyst (SME) to support special op...
Location
Location
United States , Fort Bragg
Salary
Salary:
Not provided
barbaricum.com Logo
Barbaricum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active DoD Top Secret clearance and SCI eligibility
  • Minimum 8 years of total experience as an intelligence analyst within the DoD or Intelligence Community
  • Minimum 3 years of OSINT/PAI exploitation experience directly supporting special operations, intelligence operations, kinetic/non-kinetic targeting, and/or HUMINT lead development
  • Minimum 2 years of experience with digital signature reduction
  • Advanced proficiency with all-source intelligence tools, databases, and repositories, and analytic/targeting methodology
  • Advanced proficiency with OSINT/PAI tools, research methods, and strong understanding of the digital information environment
  • Advanced understanding of OSINT/PAI authorities, regulations, and policy
  • Superior written communication skills and proficiency with Microsoft Office applications
  • Superior verbal briefing skills, with experience briefing at the O5/GS-14 level or above
Job Responsibility
Job Responsibility
  • Conduct advanced OSINT/PAI collection, exploitation, PED, reporting, and targeting in support of special operations requirements
  • Fuse publicly available and commercially available data to produce multi-intelligence assessments and actionable targeting intelligence
  • Interface with Intelligence Community stakeholders to synchronize analytic efforts and support operational priorities
  • Provide OSINT/PAI analytic support to special operations, including kinetic and non-kinetic targeting, HUMINT lead development, and exploitation activities
  • Apply analytic and targeting methodologies using current all-source tools, databases, and repositories
  • Use OSINT-specific tools, repositories, and research methodologies to interpret the digital information environment
  • Ensure compliance with OSINT/PAI authorities, regulations, and policy requirements
  • Deliver written intelligence products and brief senior leaders with clarity and confidence
Read More
Arrow Right

Cybersecurity Analyst

We are seeking a Cybersecurity Analyst to strengthen our security posture and pr...
Location
Location
United States , Fort Lauderdale
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Security, or a related field
  • 3-5 years of experience in cybersecurity operations, threat analysis, or incident response
  • At least one industry certification (e.g., CompTIA Security+, CEH, CISSP, CISM, OSCP)
  • Hands-on experience with cybersecurity tools (e.g., Splunk, CrowdStrike, SentinelOne, Rapid7, Palo Alto, Tenable, Wireshark)
  • Strong knowledge of firewalls, proxies, encryption, DLP, SIEM, EDR, XDR, IDS/IPS
  • Experience with cloud security (AWS, Azure, or Google Cloud)
  • Familiarity with secure coding practices, DevSecOps, and CI/CD security
  • Understanding of threat modeling, MITRE ATT&CK, cyber kill chain, and risk management
  • Strong analytical and problem-solving skills
  • Excellent verbal and written communication skills, with the ability to present security-related topics to non-technical stakeholders.
Job Responsibility
Job Responsibility
  • Monitor and analyze security alerts from various tools such as SIEM, EDR, XDR, and IDS/IPS
  • Conduct threat intelligence analysis and proactive threat hunting
  • Investigate and respond to cybersecurity incidents, breaches, and vulnerabilities
  • Perform risk assessments, vulnerability scans, and penetration testing to identify security gaps
  • Work with IT and development teams to implement security controls and enhance system defenses
  • Develop and enforce security policies, procedures, and incident response plans
  • Conduct digital forensics and root cause analysis for security incidents
  • Stay up to date with emerging cyber threats, attack techniques, and security technologies
  • Ensure compliance with industry security frameworks (e.g., NIST, ISO 27001, CIS, PCI-DSS, GDPR, HIPAA)
  • Assist in security awareness training and company-wide security initiatives
What we offer
What we offer
  • Access to top jobs
  • competitive compensation and benefits
  • free online training
  • medical, vision, dental, and life and disability insurance
  • eligibility to enroll in company 401(k) plan.
  • Fulltime
Read More
Arrow Right
Welcome to CrawlJobs.com
Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.