At a Glance
- Tasks: Monitor and respond to security incidents while enhancing our cyber defence strategies.
- Company: Join Centrica, a leader in energy solutions, committed to safeguarding digital landscapes.
- Benefits: Enjoy flexible working, a 15% energy allowance, comprehensive healthcare, and 25 days holiday.
- Why this job: Make a real impact in cybersecurity while collaborating with passionate teams in a vibrant culture.
- Qualifications: Hands-on SOC experience, knowledge of incident response, and familiarity with cloud technologies required.
- Other info: Opportunities for growth and a chance to work with cutting-edge security tools.
The predicted salary is between 36000 - 60000 £ per year.
Overview
An opportunity to play your part – Are you ready to be a key player in Centrica\’s cyber world? As a Global Security Operations Centre Analyst, you\’ll play a pivotal role in safeguarding our organisation\’s digital fortress. Your mission: monitor, detect, and respond to security incidents with speed, while crafting and implementing top-notch security measures to protect our systems and data. You\’ll collaborate closely with our cyber defence squads, ensuring we stay one step ahead of threats and continuously enhance our security landscape. If you\’re passionate about cybersecurity and eager to make a real impact, this is the adventure you\’ve been waiting for! Location: UK, Windsor (talk to us about flexible working)
Responsibilities
- Monitor security alerts from various sources like SIEM, EDR, and other tools.
- Investigate and respond to security incidents, ensuring effective containment, remediation, and recovery while considering business requirements.
- Follow defined incident response processes and escalate to the Cyber Security Incident Response team when necessary.
- Develop and fine-tune detection rules, create and maintain detection playbooks, and collaborate with threat intelligence to identify new detection opportunities.
- Use automation tools and scripting languages (e.g., Python, PowerShell) to streamline repetitive tasks and boost efficiency.
- Proactively hunt for potential threats within the environment, leveraging threat intelligence and advanced analytics to identify and mitigate risks.
- Work closely with other cyber defence teams, including Intelligence, Vulnerability Management, Threat Hunting, and Purple Teams.
- Effectively communicate findings and recommendations to various stakeholders.
- Utilise technical expertise to analyse telemetry related to incidents and identify appropriate investigation pathways.
- Identify techniques used by attackers and support investigations with relevant intelligence.
- Record actions within an incident in a coherent and concise manner, ensuring all relevant data is secured and presented in the incident record.
Qualifications
- Hands-on experience in a Security Operations Centre (SOC).
- Deep understanding of incident response processes and the Cyber Kill Chain.
- Proficient with Microsoft Azure and AWS cloud technologies.
- Relevant certifications such as Microsoft SC-200, AWS Certified Cloud Practitioner, Microsoft AZ-900, GIAC Certified Forensic Analyst (GCFA), and GIAC Certified Incident Handler (GCIH).
- Skilled in network and application protocols, and familiar with Windows, Linux, and macOS operating systems and their artifacts.
- Experience with security tools and technologies, including EDR solutions, SOAR platforms, and advanced SIEM capabilities.
- Preferred experience in scripting or programming languages.
- Preferred experience dealing with incidents in various environments, including OT and ICS technologies.
- Preferred experience working with wider Cyber Defence teams, such as Intelligence, Vulnerability Management, Threat Hunting, and Purple Teams.
- Understanding of cyber security legislation and experience with information risk and security-related best practices, policies, standards, and regulations.
Benefits
- Enjoy a generous market salary, along with fantastic growth opportunities and a vibrant work environment.
- Power up your pay with a 15% Employee Energy Allowance, surpassing the government\’s price cap.
- Secure your future with our comprehensive pension plan, designed for peace of mind.
- Elevate your health with our fully-funded company healthcare plan, prioritizing your well-being.
- Recharge with a generous 25-day holiday allowance, plus public holidays, and even purchase up to 5 extra days for extended relaxation.
- Experience unparalleled work-life balance with an exceptional selection of flexible benefits, from tech treats and eco friendly car leases to travel insurance for your adventures.
#J-18808-Ljbffr
Global Security Operations Centre Analyst employer: Centrica
Contact Detail:
Centrica Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Global Security Operations Centre Analyst
✨Tip Number 1
Familiarise yourself with the Cyber Kill Chain and incident response processes. Understanding these concepts will not only help you in interviews but also demonstrate your proactive approach to cybersecurity.
✨Tip Number 2
Engage with online communities or forums related to cybersecurity, especially those focused on SOC roles. Networking with professionals in the field can provide insights and potentially lead to referrals.
✨Tip Number 3
Stay updated on the latest cybersecurity threats and trends. Being knowledgeable about current events in the cyber world will allow you to speak confidently about relevant topics during interviews.
✨Tip Number 4
Consider obtaining relevant certifications if you haven't already. Certifications like Microsoft SC-200 or GIAC Certified Incident Handler can significantly enhance your profile and show your commitment to the field.
We think you need these skills to ace Global Security Operations Centre Analyst
Some tips for your application 🫡
Understand the Role: Before applying, make sure to thoroughly understand the responsibilities and qualifications required for the Global Security Operations Centre Analyst position. Tailor your application to highlight relevant experiences that align with these requirements.
Highlight Relevant Experience: In your CV and cover letter, emphasise your hands-on experience in a Security Operations Centre (SOC) and any relevant certifications you hold. Mention specific tools and technologies you are proficient with, such as Microsoft Azure, AWS, and security tools like EDR solutions.
Showcase Technical Skills: Detail your technical expertise in your application. Include your familiarity with scripting languages like Python or PowerShell, and your understanding of incident response processes and the Cyber Kill Chain. This will demonstrate your capability to handle the role effectively.
Communicate Clearly: When writing your application, ensure that your communication is clear and concise. Use bullet points to list your skills and experiences, and make sure to articulate how you can contribute to Centrica's cyber defence teams. This will help your application stand out.
How to prepare for a job interview at Centrica
✨Know Your Tools
Familiarise yourself with the security tools mentioned in the job description, such as SIEM and EDR. Be prepared to discuss your hands-on experience with these tools and how you've used them to monitor and respond to security incidents.
✨Understand Incident Response
Brush up on incident response processes and the Cyber Kill Chain. Be ready to explain how you would handle a security incident from detection to recovery, showcasing your understanding of best practices in cybersecurity.
✨Showcase Your Scripting Skills
If you have experience with scripting languages like Python or PowerShell, be sure to highlight this during the interview. Discuss specific examples where you've automated tasks or improved efficiency in a previous role.
✨Communicate Effectively
Prepare to demonstrate your ability to communicate technical findings to non-technical stakeholders. Think of examples where you've had to present complex information clearly and concisely, as this is crucial for collaboration with other teams.