×
Register Here to Apply for Jobs or Post Jobs. X

Business Development Manager

Job in Peterlee, Durham County, SR8, England, UK
Listing for: Caterpillar Financial Services Corporation
Full Time position
Listed on 2025-12-30
Job specializations:
  • IT/Tech
    Cybersecurity, Network Security
Job Description & How to Apply Below

Career Area

Technology, Digital and Data

Job Description

Your Work Shapes the World at Caterpillar Inc.

When you join Caterpillar, you're joining a global team who cares not just about the work we do – but also about each other. We are the makers, problem solvers, and future world builders who are creating stronger, more sustainable communities. We don't just talk about progress and innovation here – we make it happen, with our customers, where we work and live.

Together, we are building a better world, so we can all enjoy living in it.

Security Operations Center Analyst

The SOC (Security Operations Center) is a critical component of CSIRT (Cyber Security Incident Response Team). Analysts on the SOC are responsible for the continuous monitoring and response to security alerts and events that occur within Caterpillar’s global network. This includes investigating Malware alerts, Phishing emails, anomalous activity, and anomalous network traffic. The SOC also takes necessary action to
remediate these events.

What You Will Do
  • Monitor security information and event management (SIEM) systems for security alerts.

  • Investigate alerts with various security tools.

  • Analyze and triage security alerts, escalating, as necessary.

  • Collaborate with IT and cybersecurity teams to contain and remediate threats.

  • Monitor the Phishing inbox, investigate and respond to all reported emails.

  • Inspect file attachments and links for potential malware.

  • Investigate network alerts through the IDS tool.

  • Ensure accurate case notes are recorded.

  • Document incident findings, actions taken, and lessons learned.

What You Have
  • SOC or equivalent experience.

  • Experience with in IT (Information Technology).

  • Experience with SIEM or similar solutions (splunk, logscale, etc...).

  • Some proficiency in Power Shell, Python, SQL.

  • Proven critical thinking skills and ability to solve problems.

  • Proven ability to learn new tools, processes, and technical concepts quickly.

  • Knowledge of Incident handling, MITRE attack framework, and Cyber Security Kill Chain.

  • Understanding of Windows Authentication protocols, network technologies,

  • Explicit Proxy, IDS, EDR, UEBA, and Sandboxing.

  • Experience with Cybersecurity report writing.

  • Understanding of or experience in penetration testing.

  • Certifications (CompTIA Security+, GSEC, etc...) preferred.

Skills Descriptors Cybersecurity Standards and Policies
  • Knowledge of developing cybersecurity policies, standards, and procedures; ability to develop and communicate policies, standards and procedures that guide interactions with customers.

Endpoint Security
  • Knowledge of the tools and processes for maintaining endpoint security; ability to design and implement security programs to prevent data loss and access intrusion from external sources.

Strong experience in Enterprise Tool Support (AV, EDR, Vulnerability Scanner, SCCM, etc) Information Security Technologies
  • Knowledge of technologies and technology-based solutions dealing with information security issues; ability to protect information security across the organization using encryption technologies and appropriate security software.

Information Technology (IT) Security Policies
  • Knowledge of IT security policies, standards, and procedures; ability to utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance.

Requirements Analysis
  • Knowledge of tools, methods, and techniques of requirement analysis; ability to elicit, analyze and record required business functionality and non-functionality requirements to ensure the success of a system or software development project.

System and Technology Integration
  • Knowledge of the features and facilities of systems; ability to integrate and communicate among applications, databases, and technology platforms.

Technical Writing/Documentation
  • Knowledge of technical writing; ability to write technical documents such as manuals, reports, guidelines or documents on standards, processes, and applications.

Cyber Security
  • Knowledge of antivirus/malware attacks and the defenses used; ability to defend and prevent electronic threats, theft, and attacks.

Education / Experience:
Bachelor’s
degree in a relevant field or equivalent…

Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary