At a Glance
- Tasks: Join us as a Cyber Security Analyst, tackling cyber threats and mentoring Tier 1 Analysts.
- Company: FPSG is a leading recruitment agency, connecting talent with top employers in the tech industry.
- Benefits: Enjoy a generous shift allowance, flexible shifts, and a path to DV Cleared status.
- Why this job: Be part of a dynamic team, enhancing your skills while making a real impact in cyber security.
- Qualifications: Must have live SC or DV Clearance and a solid understanding of networking and SIEM solutions.
- Other info: We support diversity and are committed to making reasonable adjustments for applicants.
The predicted salary is between 36000 - 60000 £ per year.
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles in Central Scotland providing a 24/7 shift pattern cover for their customers. A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable. The roles require you to be on-site in Hampshire on a 4 x 4 shift pattern, whereby you will work for four 12 hour shifts and then have four shifts off.
IMPORTANT: You will be required to have only British Citizenship (i.e. DUAL citizenship, or ILR status is not going to be eligible) AND already possess live, current SC or DV Clearance due to the timescale we are looking to hire within. Please only apply if you have SC or DV Cleared status.
The Tier 2 Cyber Security Analyst role will involve you advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. As a Tier 2 Analyst you will work to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions.
Responsibilities:
- Conducting escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions.
- Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents.
- Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs).
- Investigating potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity.
- Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
- Monitoring the threat landscape and documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
- Following established incident response playbooks, providing feedback for enhancements and suggesting updates to streamline internal Cyber processes and improving threat response times.
- Coordinating with Tier 3 Analysts and management to refine detection and response workflows, contributing to continuous SOC maturity.
- Collaborating with Tier 3 Analysts on tuning SIEM and detection tools to reduce false positives and improve alert fidelity, submitting tuning requests and testing configurations.
- Identifying gaps in current detection content and working with Senior Analysts to develop and validate new detection rules and use cases tailored to the organization's threat profile.
- Acting as a mentor to Tier 1 Analysts, offering guidance on triage and analysis techniques and facilitating on-the-job training.
- Assisting in training sessions and knowledge-sharing activities, contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst:
- Understands advanced networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
- Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
- Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
- Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
- Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
- Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under senior analysts' direction.
- Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
- Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring.
- Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
- Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
- Shows initiative in learning new technologies and techniques.
- Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in IM.
Next Steps:
If you have live SC or DV Clearance, along with the associated skills for this role and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately. Interviews will be conducted promptly with suitable candidates who meet all the stipulated essential Citizenship and Clearance criteria.
We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process.
SC Cleared Tier 2 Cyber Security Analyst - 24/7 shift allowance employer: FPSG Connect
Contact Detail:
FPSG Connect Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SC Cleared Tier 2 Cyber Security Analyst - 24/7 shift allowance
✨Tip Number 1
Make sure you are well-versed in Kusto Query Language (KQL) as it's a key requirement for this role. Brush up on your skills by practicing with sample queries and familiarising yourself with common SIEM tools.
✨Tip Number 2
Network with professionals in the cyber security field, especially those who work in SOC environments. Engaging with others can provide insights into the role and may even lead to referrals.
✨Tip Number 3
Stay updated on the latest trends and threats in cyber security. Follow relevant blogs, podcasts, and forums to demonstrate your knowledge during interviews and discussions.
✨Tip Number 4
Prepare to discuss your experience with incident response and threat analysis. Be ready to share specific examples of how you've handled security incidents or contributed to team training.
We think you need these skills to ace SC Cleared Tier 2 Cyber Security Analyst - 24/7 shift allowance
Some tips for your application 🫡
Highlight Your Clearance: Make sure to clearly state your SC or DV Clearance status at the top of your CV or cover letter. This is a crucial requirement for the role, so don’t let it get buried in the details.
Tailor Your CV: Customise your CV to reflect the specific skills and experiences mentioned in the job description. Emphasise your experience with SIEM solutions, Kusto Query Language (KQL), and any relevant cyber security incidents you have managed.
Showcase Relevant Experience: In your application, provide examples of your previous work as a Cyber Security Analyst, particularly focusing on your ability to conduct escalated triage and analysis, and how you've contributed to team training and development.
Craft a Strong Cover Letter: Write a compelling cover letter that not only outlines your qualifications but also demonstrates your passion for cyber security. Mention your understanding of the threat landscape and how you can contribute to the organisation’s goals.
How to prepare for a job interview at FPSG Connect
✨Showcase Your Clearance
Since the role requires SC or DV clearance, make sure to highlight your current status right at the beginning of the interview. This will set a positive tone and demonstrate that you meet one of the key requirements.
✨Demonstrate Technical Proficiency
Be prepared to discuss your experience with SIEM solutions and Kusto Query Language (KQL). You might be asked to explain how you've used these tools in past roles, so have specific examples ready to illustrate your expertise.
✨Understand the Role's Responsibilities
Familiarise yourself with the specific duties of a Tier 2 Cyber Security Analyst. Be ready to discuss how you would handle escalated incidents and collaborate with Tier 1 and Tier 3 Analysts, showcasing your understanding of the SOC operations.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving skills under pressure. Think about past experiences where you had to triage security events or respond to incidents, and be ready to walk the interviewer through your thought process.