cover image
E-Frontiers

E-Frontiers

www.e-frontiers.ie

2 Jobs

32 Employees

About the Company

Listed Jobs

Company background Company brand
Company Name
E-Frontiers
Job Title
Business Analyst
Job Description
Job Title: Business Analyst – Data Centre Migration Role Summary: Execute a 6‑month technical and strategic change program to migrate a large data centre. Drive business analysis, process redesign, and technical assessment to enable a seamless transition with minimal operational impact. Expectations: - Deliver high‑quality analytical outputs that inform decision‑making for the migration strategy. - Ensure alignment between business objectives and technical solutions. - Maintain clear documentation and facilitate stakeholder communication throughout the engagement. Key Responsibilities: - Gather and analyse business and technical requirements from stakeholders. - Map current and future state processes, identifying gaps and improvement opportunities. - Conduct technical assessments of legacy systems and proposed migration platforms. - Develop functional specifications, use cases, and data migration plans. - Support change management activities, including training, SOP creation, and transition support. - Monitor project progress, risks, and issues, escalating as needed. Required Skills: - Strong business analysis and requirements elicitation. - Experience with data centre migration or large‑scale IT infrastructure change. - Technical acumen: familiarity with cloud, virtualization, or server technologies. - Process modelling (BPMN, EPC). - Excellent communication, stakeholder management, and collaboration. - Ability to work independently and within cross‑functional teams. Required Education & Certifications: - Bachelor’s degree in Computer Science, Information Systems, Business Administration or related field. - Professional certifications such as CBAP, PMI‑PBA, or equivalent are preferred. ---
England, United kingdom
Hybrid
11-11-2025
Company background Company brand
Company Name
E-Frontiers
Job Title
SOC Threathunting
Job Description
**Job Title** SOC Threathunting **Role Summary** Design, develop, and maintain threat detection content while proactively hunting threats in client environments. Collaborate with lead analysts, threat intelligence, and SOC teams to tailor detection strategies to each client’s risk profile. **Expectations** - Deliver high‑quality, lifecycle‑managed detection content. - Conduct hypothesis‑driven threat hunts and report actionable findings. - Continuously refine detection logic and playbooks based on evolving threats and tool changes. - Share knowledge and insights with SOC, threat intelligence, and tooling stakeholders. **Key Responsibilities** - Develop use cases and detection logic aligned with MITRE ATT&CK and client scenarios. - Write, test, deploy, and tune detection rules across the SOC content pipeline. - Perform proactive threat hunting using telemetry, threat intel, and anomaly detection. - Document hunt outcomes, produce clear executive summaries, and present to internal teams and clients. - Review, validate, and QA detection content prior to deployment. - Update runbooks, SOPs, and playbooks; ensure content accuracy and consistency. - Engage with SOC, threat intel, and tooling teams to refine detection strategies. - Facilitate workshops, documentation, and informal knowledge‑sharing sessions. - Support cross‑team initiatives driving continuous improvement and innovation. **Required Skills** - Expertise in threat detection content development (rules, queries, scripts). - Strong understanding of MITRE ATT&CK framework and threat hunting methodologies. - Proficiency with SOC tools (SIEM, EDR, threat intel platforms). - Experience querying/visualizing telemetry (e.g., KQL, Splunk SPL, STIX/TAXII). - Ability to conduct hypothesis‑driven hunts and interpret complex data. - Excellent documentation, communication, and presentation skills. - Collaborative mindset with a focus on continuous learning and process improvement. **Required Education & Certifications** - Bachelor’s degree in Computer Science, Cybersecurity, or related field (or equivalent experience). - Relevant certifications preferred: - Certified SOC Analyst (CSA) - Certified Threat Hunting Technician (CTHT) - MITRE ATT&CK Certified™ (optional) - Splunk Certified Power User or equivalent SIEM certification.
Gloucestershire, United kingdom
On site
01-12-2025