Company Detail

Franklin Fitch
Member Since,
Login to View contact details
Login

About Company

Job Openings

  • Join Our Team as a SOC Analyst Are you ready to take the lead in safeg... Read More
    Join Our Team as a SOC Analyst

    Are you ready to take the lead in safeguarding critical networks and mentoring the next generation of cyber defenders? We’re on the hunt for a SOC Analyst to join our high-performing SOC team.

    As a key player in our cyber defense operations, you’ll lead from the front—managing teams, guiding investigations, and helping shape the future of our security strategy. If you’re passionate about cyber security and thrive in a fast-paced, threat-driven environment, we want to hear from you.


    What You’ll Be Doing

    Monitor & Detect: Identify and respond to security alerts from SIEM, IDS/IPS, EDR, and other tools.
    Incident Response: Investigate threats and escalate incidents, ensuring rapid containment and resolution.
    Threat Hunting: Proactively search for hidden threats and conduct forensic investigations.
    Lead & Mentor: Manage SOC analysts and support their technical and professional growth.
    Tool Optimisation: Oversee and fine-tune security platforms to maximise effectiveness.
    Security Engineering: Enhance detection rules and improve SOC procedures.
    Collaborate & Report: Liaise with customers, attend service reviews, and provide insightful technical reports.
    Continuous Improvement: Drive innovation and stay ahead of emerging threats, tactics, and techniques.
    External Engagement: Work with partners to strengthen the defensive posture and maintain compliance.
    Insider Threat Management: Lead investigations and support sensitive case handling.

    What You Bring to the Role

    Must-Have Experience:

    Strong background in cyber security, protective monitoring, and incident response.
    Proficient in SIEM tools (e.g. LogRhythm, Splunk) and IDS systems (e.g. Snort).
    In-depth knowledge of network and host security.
    Skilled in threat intelligence and threat hunting techniques.
    Exceptional communication and stakeholder management.
    Experience mentoring junior analysts and developing team capabilities.


    Nice to Have



    SANS certifications such as SEC 503, SEC 504, SEC 508, SEC 511, or LDR 551.
    Experience within a Managed Security Services (MSSP/MSP) environment.
    Familiarity with frameworks like MITRE ATT&CK, NIST, CIS, and ISO 27001.


    Qualifications & Certifications

    Bachelor’s degree in Cybersecurity, IT, or a related field – or equivalent experience.
    Certifications such as GIAC GMON, GCIA, GCIH, CEH, CySA+, or Security+.

    Why Work With Us?

    Competitive Salary & comprehensive benefits package.
    Professional Development support, including certification sponsorship.
    Flexible Working – hybrid options available.
    Environment with access to cutting-edge security technologies.
    Collaborative Culture where your voice and expertise shape the direction of our security operations. Read Less
  • Our client is looking for a Security Operations Centre (SOC) Analyst t... Read More
    Our client is looking for a Security Operations Centre (SOC) Analyst to join a modern, continuously evolving SOC environment. You’ll work hands-on with real-world threats, monitoring and investigating security events across multiple customer environments while developing your skills alongside experienced analysts.This role is ideal for someone who enjoys investigation, thrives in fast-paced environments, and wants clear progression within cybersecurity.What you’ll be doingDetect & InvestigateMonitor and triage alerts across SIEM, EDR/XDR, email and web security platformsInvestigate suspicious activity and determine impact and severityBuild clear timelines and maintain high-quality investigation notesEscalate complex cases with clear technical contextReview vulnerability outputs and provide basic prioritisation insightHunt & ImproveParticipate in threat hunting activitiesContribute ideas to improve detections, dashboards and runbooksSupport testing of new detection logic and use casesCollaborate & CommunicateProvide clear written updates to customers and internal stakeholdersTake part in shift handovers to ensure continuityWork closely with senior analysts to grow technical depthWhat you bring1+ year experience in a SOC, or3+ years in infrastructure or networking with strong security exposureExperience triaging and investigating security alertsUnderstanding of attacker behaviour, TTPs and common attack chainsAbility to identify indicators of compromise across endpoints, networks and logsHands-on experience with at least one SIEM, EDR or XDR platformFamiliarity with ticketing systems (e.g. ServiceNow, JIRA, Salesforce)Knowledge of Windows, macOS and Linux environmentsUnderstanding of DNS, HTTP, SMB and LDAPAwareness of MITRE ATT&CK and distinguishing legitimate vs suspicious activityWhy join?A technical, analyst-first SOC that values quality investigationsStructured training, cyber ranges and real incident exposureClear career paths into Threat Intelligence, SOC Engineering, Incident Response and senior SOC rolesCollaborative, agile team culture that values curiosity and continuous improvementSupportive environment with regular knowledge sharing and team eventsIf this sounds interesting for you or someone you know, please send your resume directly to or hit the apply button below. Read Less

Company Detail

  • Is Email Verified
    No
  • Total Employees
  • Established In
  • Current jobs

Google Map

For Jobseekers
For Employers
Contact Us
Astrid-Lindgren-Weg 12 38229 Salzgitter Germany