At a Glance
- Tasks: Join our Cyber Security team to tackle advanced threats and enhance security measures.
- Company: Baringa, a global consulting firm known for its collaborative culture and innovative solutions.
- Benefits: Enjoy generous leave, flexible working, wellbeing support, and profit-sharing opportunities.
- Other info: Be part of an award-winning workplace committed to diversity and social responsibility.
- Why this job: Make a real impact in cyber security while working with cutting-edge technology.
- Qualifications: 5+ years in security operations, strong KQL skills, and experience in incident response.
The predicted salary is between 60000 - 75000 £ per year.
About Baringa
Baringa is a global consulting firm that partners with leaders to drive change and create value. With deep industry expertise, and enabled by advanced technology, the firm helps clients to deliver with greater confidence and certainty. The firm works across energy and resources, financial services, government and public sector, consumer products and retail, pharmaceuticals and life sciences, manufacturing, and technology, media and telecoms, with capabilities spanning strategy, transformation and operational excellence – all powered by advanced technology, data, AI and digital innovation.
Our Cyber team are looking for an experienced Senior Cyber Security Analyst to join the team on a 6 month FTC. We are looking for a Senior Cyber Security Analyst to join our Defensive Operations team on a fixed-term basis. You will work across the full breadth of our defensive security capability - including advanced investigations, incident response, threat hunting, detection engineering, and vulnerability management.
This is a hands-on senior role within a hybrid SOC model, where our MDR partner delivers 24/7 Tier 1/2 monitoring and triage, and the internal team focuses on everything beyond including: response, proactive threat operations, and continuous improvement of our security posture.
What you will be doing:
- Conduct advanced investigations escalated from the MDR SOC and internally identified threats, including root cause analysis, evidence gathering, containment, and remediation across Microsoft Sentinel and Defender XDR.
- Support incident response activities through the full lifecycle - detection, analysis, containment, eradication, recovery, and lessons learned - and contribute to the development of IR playbooks and procedures.
- Contribute to MSSP oversight and quality assurance - reviewing escalation quality, providing feedback, and participating in joint detection tuning sessions.
- Develop and execute threat hunts based on threat intelligence, MITRE ATT&CK gap analysis, and incident learnings, converting findings into detection rules or tuning recommendations.
- Author and deploy detection content (KQL analytics rules) in Microsoft Sentinel, supporting the team's efforts to expand MITRE ATT&CK coverage and reduce detection gaps.
- Support vulnerability management activities, including assessment of identified vulnerabilities, prioritisation, and coordination with the Technology team on remediation.
- Produce operational metrics and MI reporting in support of governance and stakeholder reporting.
- Mentor junior analysts, providing technical guidance on investigations, KQL development, and threat analysis techniques.
Your skills and experience:
- 5+ years of experience in Security Operations, Incident Response, or a closely related defensive security role.
- Strong proficiency with Microsoft Sentinel (KQL query development, analytics rules, workbooks) and Microsoft Defender XDR.
- Good understanding of attacker techniques, tactics, and procedures (TTPs) and familiarity with the MITRE ATT&CK framework.
- Experience leading or contributing to incident response investigations through the full IR lifecycle.
- Strong KQL skills with the ability to write queries for detection, investigation, and hunting use cases.
- Experience with vulnerability management processes and tools.
- GIAC, CREST, or equivalent security certifications - or demonstrable equivalent experience.
- Strong communication skills with the ability to brief technical and non-technical stakeholders on incident status, risk, and remediation actions.
What a career at Baringa will give you:
- Generous Annual Leave Policy: We provide our employees with 5 weeks of annual leave, fully available at the start of each year. In addition to this, we have introduced our 5-Year Recharge benefit which allows all employees an additional 2 weeks of paid leave after 5 years continuous service.
- Flexible Working: We have implemented a hybrid working policy and introduced more flexibility around taking unpaid leave.
- Corporate Responsibility Days: All our employees get 3 every year to help social and environmental causes.
- Wellbeing Fund: We’ve introduced our annual People Fund to support this by offering every individual a fund to support and manage their wellbeing through an activity of their choice.
- Profit Share Scheme: All employees participate in the Baringa Group Profit Share Scheme.
Diversity and Inclusion: We are proud to be an Equal Opportunity Employer. We believe that creating an environment where everyone feels a sense of belonging is central to our culture.
Using business as a force for good: We maintain high standards of environmental performance and transparency, which can be seen through our commitment to Net Zero.
Join us. All applications received will be reviewed by a member of our Talent Acquisition team. We never rely solely on automated screening or AI tools to make hiring decisions. Your application will be considered for employment without regard to race, ethnicity, religion, gender, gender identity or expression, sexual orientation, nationality, disability, age, faith or social background.
Senior Cyber Security Analyst - 6 month FTC employer: Baringa
Contact Detail:
Baringa Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Cyber Security Analyst - 6 month FTC
✨Tip Number 1
Network like a pro! Reach out to your connections in the cyber security field and let them know you're on the lookout for opportunities. A friendly chat can lead to insider info about openings at Baringa or even a referral!
✨Tip Number 2
Prepare for interviews by brushing up on your technical skills and understanding of the MITRE ATT&CK framework. We want to see how you tackle real-world scenarios, so practice articulating your thought process during incident response.
✨Tip Number 3
Show off your passion for cyber security! Share relevant projects or experiences on platforms like LinkedIn. This not only highlights your expertise but also demonstrates your commitment to staying updated in the field.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets the attention it deserves. Plus, we love seeing candidates who take that extra step to connect with us directly.
We think you need these skills to ace Senior Cyber Security Analyst - 6 month FTC
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior Cyber Security Analyst role. Highlight your experience in security operations, incident response, and any relevant certifications. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your background makes you a great fit for our team. Keep it engaging and personal – we love to see your personality come through.
Showcase Your Technical Skills: Don’t forget to highlight your technical skills, especially with Microsoft Sentinel and KQL. Mention specific projects or experiences where you've used these tools effectively. We’re keen on seeing how you can contribute to our defensive operations!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us that you’re genuinely interested in joining our team at Baringa!
How to prepare for a job interview at Baringa
✨Know Your Stuff
Make sure you brush up on your knowledge of Microsoft Sentinel and Defender XDR. Be ready to discuss your experience with KQL query development and how you've used it in past roles. This will show that you're not just familiar with the tools, but that you can leverage them effectively.
✨Showcase Your Incident Response Skills
Prepare to talk about specific incidents you've handled in the past. Highlight your role in the incident response lifecycle, from detection to recovery. Use real examples to demonstrate your problem-solving skills and how you’ve contributed to developing IR playbooks.
✨Understand the Threat Landscape
Familiarise yourself with current cyber threats and the MITRE ATT&CK framework. Be prepared to discuss how you would approach threat hunting based on intelligence and past incidents. This shows that you’re proactive and understand the bigger picture in cybersecurity.
✨Communicate Clearly
Practice explaining complex technical concepts in simple terms. You might need to brief non-technical stakeholders about incidents or risks, so being able to communicate effectively is key. Think about how you can convey your ideas clearly and confidently during the interview.