Cyber Security Analyst

Cyber Security Analyst

London Full-Time 36000 - 60000 £ / year (est.) No home office possible
T

At a Glance

  • Tasks: Monitor and respond to cyber security threats in real-time.
  • Company: Join Thomas Miller, a leader in insurance and risk management.
  • Benefits: Enjoy hybrid work options and a supportive team culture.
  • Why this job: Make a real impact in cyber security while developing your skills.
  • Qualifications: 1-3 years in a SOC role; knowledge of security tools and principles required.
  • Other info: Opportunity for growth and hands-on experience with cutting-edge technology.

The predicted salary is between 36000 - 60000 £ per year.

Working Arrangements: Monday to Friday 9.30am-5.30pm Hybrid work pattern.

Overall Objective of Role: The Cyber Security Operations Team is a critical component of the Thomas Miller security infrastructure, responsible for monitoring, detecting, and responding to security threats in real time. The team partners with a 3rd party to ensure constant vigilance over the security landscape. The Cyber Security Analyst detects, analyses, investigates and responds to alerts and threats within the environment.

Specific Responsibilities:

  • Monitor security alerts, events, and potential threats using SOC tools.
  • Respond to and investigate cyber security incidents, including malware outbreaks, phishing attempts and data breaches.
  • Perform incident response, including triaging, investigation, and resolution of security incidents.
  • Analyse network traffic, logs, and alerts to detect malicious activity.
  • Conduct root-cause analysis on security breaches and vulnerabilities.
  • Prepare and maintain detailed incident reports and post-incident documentation.
  • Collaborate with other teams to improve overall security posture.
  • Implement and follow standard operating procedures (SOPs) for threat management and incident response.
  • Perform regular vulnerability assessments and recommend remediation.
  • Stay updated with emerging security trends, vulnerabilities, and exploits.
  • Participate in red and blue team exercises to simulate attack and defence scenarios.
  • Collate and distribute monthly Threat Vulnerability Management (TVM) reports to senior stakeholders.

Person Specification:

  • 1-3 years of experience working in a SOC or similar role.
  • Experience with SIEM tools and performing security investigations.
  • Strong understanding of networking concepts, protocols, and security principles.
  • Knowledge of security incident handling, malware analysis, and threat intelligence.
  • Excellent problem-solving skills and attention to detail.
  • Experience with advanced threat detection techniques and tools.
  • Hands-on experience with forensic analysis, malware reverse engineering, or penetration testing.
  • Familiarity with regulatory frameworks (e.g., GDPR, FCA, PCI) and compliance requirements.
  • Strong communication skills with the ability to translate technical details to non-technical stakeholders.

Technical Skills:

  • Experience with SOC tools such as: SIEM (e.g., Splunk, IBM QRadar, ArcSight, Rapid7).
  • Endpoint Detection and Response (EDR) (e.g., CrowdStrike, Carbon Black, SentinelOne, Rapid7).
  • Vulnerability Management tools (e.g., Nessus, Qualys, Rapid7).
  • Threat Intelligence Platforms (e.g., Recorded Future, ThreatConnect).
  • Firewalls and Network Monitoring tools (e.g., Palo Alto, Cisco ASA, Checkpoint).
  • Security Orchestration Automation and Response (SOAR) platforms (e.g., Demisto, Phantom).
  • Experience with Web Gateway and Web Proxy tools (e.g., Netskope, Blue Coat, Zscaler, Forcepoint, Palo Alto).
  • Strong knowledge of operating systems (Windows, Linux) and network protocols.
  • Proficiency in analysing packet captures (Wireshark, TCPDump).
  • Familiarity with scripting languages such as Python, Bash, or PowerShell.
  • Experience with cloud security monitoring (AWS, Azure, GCP).
  • Knowledge of incident management frameworks like NIST, MITRE ATT&CK.

Preferred Qualifications:

  • Certification such as CompTIA Security+.
  • Bachelor's degree in Computer Science, Information Security, or related field.

Seniority level: Associate

Employment type: Full-time

Job function: Information Technology

Industries: Insurance

Cyber Security Analyst employer: Thomas Miller

At Thomas Miller, we pride ourselves on being an exceptional employer, offering a dynamic work environment that fosters collaboration and innovation. Our hybrid work model allows for flexibility while our commitment to employee development ensures that you will have ample opportunities to grow your skills in the ever-evolving field of cyber security. Join us in London, where you will be part of a dedicated team that plays a vital role in safeguarding our clients' interests and enhancing your career in a supportive and forward-thinking culture.
T

Contact Detail:

Thomas Miller Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Cyber Security Analyst

✨Tip Number 1

Familiarise yourself with the specific SOC tools mentioned in the job description, such as Splunk and CrowdStrike. Having hands-on experience or even completing relevant online courses can give you a significant edge during interviews.

✨Tip Number 2

Stay updated on the latest cyber security trends and threats. Follow industry blogs, attend webinars, and participate in forums to demonstrate your passion and knowledge about the field when you engage with the hiring team.

✨Tip Number 3

Network with professionals in the cyber security field, especially those who work at Thomas Miller or similar companies. Use platforms like LinkedIn to connect and engage with them, which could lead to valuable insights and potential referrals.

✨Tip Number 4

Prepare for technical interviews by practising common incident response scenarios and problem-solving exercises. Being able to articulate your thought process clearly will showcase your analytical skills and readiness for the role.

We think you need these skills to ace Cyber Security Analyst

Experience with SIEM tools (e.g., Splunk, IBM QRadar)
Knowledge of security incident handling and malware analysis
Strong understanding of networking concepts and protocols
Proficiency in analysing packet captures (Wireshark, TCPDump)
Hands-on experience with forensic analysis and penetration testing
Familiarity with regulatory frameworks (e.g., GDPR, PCI)
Excellent problem-solving skills and attention to detail
Experience with Endpoint Detection and Response (EDR) tools
Knowledge of incident management frameworks like NIST and MITRE ATT&CK
Familiarity with scripting languages (e.g., Python, Bash, PowerShell)
Experience with cloud security monitoring (AWS, Azure, GCP)
Strong communication skills for translating technical details to non-technical stakeholders
Ability to conduct root-cause analysis on security breaches
Experience with vulnerability management tools (e.g., Nessus, Qualys)

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in cyber security, particularly any roles in a Security Operations Centre (SOC). Emphasise your familiarity with SIEM tools and incident response techniques, as these are crucial for the Cyber Security Analyst role.

Craft a Strong Cover Letter: In your cover letter, express your passion for cyber security and detail how your skills align with the responsibilities listed in the job description. Mention specific experiences where you've successfully handled security incidents or collaborated with teams to improve security posture.

Showcase Technical Skills: Highlight your technical skills prominently, especially those related to SOC tools, network protocols, and scripting languages. Provide examples of how you've used these skills in past roles to detect and respond to threats.

Prepare for Potential Questions: Anticipate questions related to your problem-solving abilities and your approach to incident management. Be ready to discuss specific incidents you've managed and the outcomes, as well as your understanding of regulatory frameworks like GDPR and compliance requirements.

How to prepare for a job interview at Thomas Miller

✨Know Your Tools

Familiarise yourself with the specific SOC tools mentioned in the job description, such as SIEM and EDR platforms. Be prepared to discuss your experience with these tools and how you've used them in past roles.

✨Demonstrate Problem-Solving Skills

Prepare examples of how you've tackled security incidents in the past. Highlight your analytical skills and attention to detail, especially in situations involving malware analysis or incident response.

✨Stay Updated on Trends

Show that you are proactive about staying informed on emerging security trends and vulnerabilities. Discuss any recent developments in the cyber security landscape that you find interesting or relevant.

✨Communicate Clearly

Practice explaining technical concepts in simple terms. You'll need to communicate effectively with non-technical stakeholders, so being able to translate complex information is key.

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

T
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>