CrawlJobs Logo

SOC Analyst L1

nttdata.com Logo

NTT DATA

Location Icon

Location:
United Kingdom , Birmingham

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Join NTT DATA as a SOC Analyst (L1) in Birmingham, where you'll monitor and investigate security incidents in a 24/7 operations environment. This role requires strong analytical skills, expertise in TCP/IP, and familiarity with SIEM tools like Microsoft Sentinel. Ideal candidates will have 2-3 years of experience in IT security and a Cyber Security Certification. Enjoy a collaborative culture with opportunities for growth and development.

Job Responsibility:

  • Monitor, triage, analyse and investigate alerts, log data and network traffic using the Protective Monitoring platform and Internet resources to identify cyber-attacks / security incidents
  • Categorise all suspected incidents in line with the Security Incident policy
  • Recognise potential, successful, and unsuccessful intrusion attempts and compromises through reviews and further analysis of relevant event detail and incident summary information
  • Write up high quality security incident tickets using a combination of existing knowledge resources and independent research
  • Assist with remediation activities (or support customer stakeholders) to inhibit cyber-attacks, clean up IT systems and secure networks against repeat attacks
  • Produce security incident review reports to present information about the security incident and provide security improvement recommendations based on the security incident review
  • Understand Threat Intelligence and its use in an operational environment
  • Threat Hunting and the ability to look for attacks that may not have been captured
  • Support incident response to national scale incidents in a coaching capacity
  • Support in the development and implementation of SOC Use Cases
  • Work with other teams within NTT DATA to improve services on the basis of customer needs
  • Preparing disaster recovery plans

Requirements:

  • Willingness to work in a job that involves 24/7 operations onsite in Birmingham, this will probably be 4 days on, 4 days off
  • Preferably be able to obtain SC Clearance or already hold SC clearance
  • Strong verbal and written English communication
  • Strong interpersonal and presentation skills
  • Strong analytical skills
  • Must have expertise on TCP/IP network traffic and event log analysis
  • Must have knowledge and hands-on experience of Microsoft Sentinel (or any SIEM tool)
  • Must have administrative skills in several operating systems, such as Windows, OS X, and Linux
  • Must be proficient in basic shell scripting, creating Snort rules, or other log-searching query languages and methods
  • Must be confident to handle common security incidents independently
  • Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing)
  • Knowledge of ITIL disciplines such as Incident, Problem and Change Management
  • Ability to work with minimal levels of supervision
  • Minimum of 2 to 3 years of experience in the IT security industry, preferably working in a SOC/NOC environment
  • Preferably holds Cyber Security Certification e.g. ISC2 CC, EPQ
  • Experience with Cloud platforms (AWS and/or Microsoft Azure)
  • Excellent knowledge of Microsoft Office products, especially Excel and Word

Nice to have:

  • Preferably holds Cyber Security Certification e.g. ISC2 CC, EPQ
  • Experience with Cloud platforms (AWS and/or Microsoft Azure)
What we offer:
  • We offer a range of tailored benefits that support your physical, emotional, and financial wellbeing
  • Our Learning and Development team ensure that there are continuous growth and development opportunities for our people
  • We also offer the opportunity to have flexible work options

Additional Information:

Job Posted:
February 16, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Analyst L1

SOC Analyst (L1)

The Security Managed Services Engineer (L1) is an entry-level position responsib...
Location
Location
India , New Delhi
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • BE/BTech in Electronics/EC/EE/CS/IT Engineering
  • At least one security certification such as CCNA Security, CCSA, CEH, CompTIA
  • Minimum 2 years of experience in handling security related products & services and preferably SIEM solution
  • Adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR and other security devices
  • Knowledge of packet level analysis
  • Knowledge of networking protocols and technologies and network security
  • Sound analytical and troubleshooting skills
Job Responsibility
Job Responsibility
  • Monitors client infrastructure and solutions
  • Identifies problems and errors prior to or when they occur
  • Routinely identifies common incidents and opportunities for avoidance as well as general opportunities for incident reduction
  • Investigates first line incidents assigned and identifies the root cause of incidents and problems
  • Provides telephonic or chat support to clients when required
  • Schedules maintenance activity windows for patching and configuration changes
  • Follows the required handover procedures for shift changes to ensure service continuity
  • Reports and escalates incidents where necessary
  • Ensures the efficient and comprehensive resolutions of incidents and requests
  • Updates existing knowledge articles or create new ones
  • Fulltime
Read More
Arrow Right

L3 SOC Analyst

Managed Services Security team are made up of teams that provide remote (offsite...
Location
Location
Ireland , Galway
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field or equivalent experience desired
  • Generally, 5+ years in SOC, Incident Response, or Threat Analysis roles
  • Strong knowledge & understanding of common attack vectors and threat actor tactics, techniques, and procedures
  • Knowledge of Elastic SIEM is preferred. If not experience on any of the other SIEM tools like Sentinel, Splunk, QRadar, LogRhythm
  • Relevant industry qualification where applicable
  • Excellent verbal and written communication skills in language to be supported
  • Advanced troubleshooting skills in a technical environment
  • Excellent analytical and problem solving skills
  • Advanced Software and hardware knowledge of computing, storage and peripheral devices
  • Specific knowledge and training with the company's products. Knowledge of multiple product lines (for example, proactive, reactive, storage, enterprise systems, tier 2 or 3 support, etc.)
Job Responsibility
Job Responsibility
  • Monitor work queues for new escalations from the L1/L2 team
  • Triage cases when there are multiple escalations in the queue
  • Perform deep-dive analysis on escalated cases
  • Uses Threat intelligence and IOA/IOC data to identify source and impact of attack
  • Clearly document your investigations as they progress and regularly add case notes to the case to maintain situational awareness
  • Complete the investigations and recommend remediations for low and medium severity security incidents
  • Initiate a war room for confirmed or suspected critical security incidents and follow the documented incident response plan
  • Complete Post Incident Review (PIR) documentation for all medium and higher severity security incidents
  • Monitor work queues for new cases requiring review
  • Triage case reviews as required
What we offer
What we offer
  • Health & Wellbeing
  • Personal & Professional Development
  • Unconditional Inclusion
  • Fulltime
Read More
Arrow Right

SOC Analyst L2

Location
Location
Egypt , Nasr City
Salary
Salary:
Not provided
el-delta.com Logo
El Delta Electronic Systems
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Information Technology, or related field
  • CCNA/CCNP security, Certified Forensic Computer Examiner (CFCE), Certified Information Systems Security Professional (CISSP) with a focus on digital forensics, or other relevant advanced security certifications highly preferred
  • 3+ years of experience in SOC Analyst role
  • Strong understanding of computer operating systems (Windows, Linux, macOS)
  • Experience with digital forensics and analysis tools and software (e.g., EnCase, FTK, Cellebrite)
  • Experience in advanced threat hunting, and incident response
  • Knowledge of common attack vectors (e.g., phishing, malware, ransomware)
  • Understanding of threat intelligence feeds and data sources
  • Experience with security orchestration and automation platforms (SOAR)
Job Responsibility
Job Responsibility
  • Conduct in-depth analysis of security alerts and incidents escalated from L1
  • Utilize advanced threat intelligence and hunting techniques to identify and investigate sophisticated threats
  • Perform malware analysis and reverse engineering techniques
  • Investigate and analyze network traffic for malicious activity
  • Develop, maintain, and enrich threat intelligence feeds, indicators of compromise (IOCs), and other relevant threat-related data
  • Lead and coordinate incident response activities, including containment, eradication, recovery, and root cause analysis
  • Develop and implement security playbooks and response procedures
  • Collaborate with other IT teams to remediate security vulnerabilities and implement security controls
  • Conduct in-depth digital forensic investigations on compromised systems and networks
  • Collect, preserve, and analyze digital evidence according to legal and industry best practices
  • Fulltime
Read More
Arrow Right

L1 Cyber Defence Analyst

We are seeking a skilled and proactive Cyber Defence Analyst to join our Securit...
Location
Location
India , Pune
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 3 years of experience in Cyber Security, SOC operations, SIEM, and incident management
  • Strong understanding of network and security concepts and SIEM technologies (e.g., ArcSight, Splunk, QRadar, LogRhythm)
  • Holds industry-recognised certifications such as CEH, CCNA Cyber Ops, Security+
  • Excellent analytical and communication skills
  • Degree in Computer Science, Information Technology, Engineering, or a related field
  • Experience in global customer handling and event analysis
  • Demonstrates integrity, self-motivation, and cultural sensitivity
Job Responsibility
Job Responsibility
  • Investigate, analyse, and triage security alerts using CSOC tools
  • Document event and case analysis in the incident management system and manage cases through closure
  • Perform historical analysis of detected events and support incident managers
  • Participate in daily stand-up calls and contribute to knowledge base development
  • Collaborate with local market CSIRT teams and ensure effective communication across global teams
  • Proactively reduce alert volumes through fine-tuning and process stabilisation
  • Communicate emerging threats and malware behaviours clearly to stakeholders
  • Ensure mitigation measures are in place to reduce spam and phishing alerts
  • Maintain composure under pressure and respond effectively during emergencies
What we offer
What we offer
  • Opportunity to work in a global 24/7 cyber defence environment
  • Exposure to advanced security tools and technologies
  • Collaboration with international teams and senior security experts
  • Contribution to Vodafone’s mission to protect digital assets and infrastructure
  • A dynamic and inclusive workplace that values continuous learning and innovation
Read More
Arrow Right

SecOps Analyst L1

To support our continued success and deliver a Fanatical Experience™ to our cust...
Location
Location
India , Gurgaon
Salary
Salary:
Not provided
rackspace.com Logo
Rackspace
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Existing experience as a Security Operations Analyst/Engineer or equivalent
  • Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools
  • Experience of analysing malware and email headers
  • Skills in network security, intrusion detection and prevention systems, operating systems, risk identification and analysis, threat identification and analysis and log analysis
  • Experience of security controls
  • Knowledge of security standards (good practice) such as NIST, ISO27001, CIS, OWASP and Cloud Controls Matrix (CCM)
  • Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell
  • Knowledge of DevOps practices such as CI/CD, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins
  • Computer science, engineering, or information technology related degree (although not a strict requirement)
  • Holds one, or more, of the following certificates (or equivalent): CISSP, AZ500, SC-200, CPIA, CRIA, CCNIA, SSCP, CCSP, GCIH, GSOC
Job Responsibility
Job Responsibility
  • Ensure the Customer’s operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner
  • Analysis, handling, escalation of alerts from cloud-native SIEM (Security Information and Event Management) platforms
  • Carry out preliminary investigation on the event and act as per KB
  • Identification of false positives
  • Following SLA (Service Level Agreement) notification process based on alert severity
  • Creating tickets on the Customer ITSM ticketing system
  • Update runbooks, playbooks and knowledgebase documents
  • Sharing SLA details for weekly and monthly reports
  • Provide the data or details for use case creation, detection engineering or enhancements
  • Provide the data or details for the tuning of threat detections, log sources, dashboards, analytics rules and/or automations
  • Fulltime
Read More
Arrow Right
New

Onsite Endoscopic Specialist

At KARL STORZ, we are driven by a mission to enhance global health through innov...
Location
Location
United States , Arlington
Salary
Salary:
Not provided
karlstorz.com Logo
KARL STORZ
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A minimum of high school diploma or equivalent
  • Experience in Sterile Processing, Sales, or other Surgical Technology/Medical role
  • Our successful candidate will have excellent written and spoken English language business communication skills. They will also have demonstrated success working in a collaborative, service-oriented team environment.
  • Effective communicator, collaborative, and effective time management
  • Possess exceptional organizational skills and the ability to multi-task
  • MS Office - proficient user as the role will need to work with Excel spreadsheets and reporting
  • Role requires the completion of a drug screening for safety-sensitive positions
  • Must be able to lift/push/pull up to 25lbs
Job Responsibility
Job Responsibility
  • Face-to-face customer support, including OR, SPD and Biomed
  • Video tower/system set-up and support
  • Inspection, repair, troubleshooting and replacement of KARL STORZ devices
  • Monitoring, reporting, and facilitating repair/ exchange transactions
  • Transporting, cleaning/sterilization and packaging of instruments after use
  • Trouble shoot video and instrument issues in the O.R.
  • Instrument/equipment repair management
What we offer
What we offer
  • Relocation Support
  • Professional Growth & Development
  • Collaborative & Dynamic Work Environment
  • Access to Cutting-Edge Medical Technologies
  • Medical / Dental / Vision including a state-of-the-art wellness program and pet insurance, too
  • 3 weeks vacation, 11 holidays plus paid sick time
  • Up to 8 weeks of 100% paid company parental leave
  • 401(k) retirement savings plan providing a match of 60% of the employee’s first 6% contribution (up to IRS limits)
  • Section 125 Flexible Spending Accounts
  • Life, STD, LTD & LTC Insurance
  • Fulltime
Read More
Arrow Right
New

Pharmacy Technician

We’re building a world of health around every individual — shaping a more connec...
Location
Location
United States , Columbus
Salary
Salary:
17.00 USD / Hour
https://www.cvshealth.com/ Logo
CVS Health
Expiration Date
July 11, 2026
Flip Icon
Requirements
Requirements
  • Must comply with any state board of pharmacy requirements or laws governing the practice of pharmacy, which includes but is not limited to, age, education, and licensure/certification
  • If the state board of pharmacy does not address or mandate a minimum age requirement, must be at least 16 years of age
  • If the state board of pharmacy does not address or mandate a minimum educational requirement, must have a high school diploma or equivalent, or be actively enrolled in high school or high school equivalency program
Job Responsibility
Job Responsibility
  • Living our purpose by following all company SOPs at each workstation to help our Pharmacists manage and improve patient health
  • Following pharmacy workflow procedures at each pharmacy workstation (i.e., production, pick-up, drive-thru, and drop-off) for safe and accurate prescription fulfillment
  • Contributing to positive patient experiences by showing empathy and genuine care: creating heartfelt and personalized moments while serving patients at pick-up, drive-thru, and over the phone
  • keeping patients healthy by offering immunizations and other services at the register and over the phone
  • and demonstrating compassionate care by solving or escalating patient problems
  • Completing basic inventory activities, as permitted by law, and as directed by the pharmacy leadership team, such as accurately putting away medication deliveries and completing cycle counts, returns-to-stocks, waiting bin inventories, etc.
  • Contributing to a high-performing team, embracing a growth mindset, and being receptive to feedback
  • actively seeking opportunities to expand clinical and technical knowledge needed to better assist patients
  • Remaining flexible for both scheduling and business needs, while contributing to a safe, inclusive, and engaging team dynamic
  • voluntarily traveling to stores in the market to work shifts as needed by the business
What we offer
What we offer
  • dental
  • vision
  • wellness resources
  • employee discounts
  • access to certain voluntary benefits
  • other programs
  • Parttime
Read More
Arrow Right
New

Assistant General Manager

Assistant General Manager, at Boston Pizza, one of Canada’s Best Managed Compani...
Location
Location
Canada , Lac La Biche
Salary
Salary:
22.00 - 30.00 CAD / Hour
bostonpizza.com Logo
Boston Pizza
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1+ year of casual dining experience
  • Previous leadership or supervisory experience is an asset
  • A positive attitude and strong work ethic
  • Excellent communication and team-building skills
  • Ability to thrive in a fast-paced environment
  • A passion for hospitality and guest service
  • Open availability
Job Responsibility
Job Responsibility
  • Support day-to-day operations
  • Lead and motivate the team
  • Ensure an exceptional guest experience
What we offer
What we offer
  • Competitive pay
  • Medical
  • dental benefits
  • Staff accommodations available
  • Flexible scheduling
  • Room to grow within the company
  • Hands-on management training
  • A supportive, close-knit team environment
  • Fulltime
Read More
Arrow Right