At a Glance
- Tasks: Analyse cyber threats and respond to real-world incidents remotely.
- Company: Join Circle Recruitment, a supportive agency focused on diverse talent.
- Benefits: Enjoy competitive pay, remote work flexibility, and referral bonuses.
- Why this job: Make an impact in cybersecurity while working with a government client.
- Qualifications: Certifications like CySA+, CEH, or OSCP are preferred; experience in threat analysis is essential.
- Other info: Guaranteed interviews for candidates with disabilities who meet criteria.
Job Description
Cyber Security Analyst
£600 – £730/Day Inside IR35
UK Remote
83 Working days, adhoc
We are seeking a Cyber Security Analyst for our Government client The Home Office on a fully remote basis. This role is 86 working days from start date to Feb 2026, adhoc days as and when needed, paying between £600 – £730/Day Inside IR35.
Clearance: DV
Role Profile:
- Have experience with dealing with real world threats in the serious and organised crime or cyber threat incidents
- Have experience in analysing malware behaviour and an ability to identify associated infrastructure
- Have an excellent understanding of how cyber threat attackers build and use infrastructure to undertake malicious activity
- CompTIA Cybersecurity Analyst (CySA+) or a similar certification
- GIAC Cyber Threat Intelligence (GCTI) or a similar certification
- GIAC Reverse Engineering Malware (GREM) or a similar certification
- Certified Ethical Hacker (CEH)
- Offensive Security Certified Professional (OSCP) or a similar certification*HM will accept 2 of the above qualifications*
- Data analysis and visualisation
- Understanding of Cybersecurity Concepts and Threat Intelligence
- Internet infrastructure / security architecture
If you are interested in the above role – Click the "Apply Now" button now for immediate review
Cyber Security Analyst, Security Analyst, Security, OSCP, ETHICAL HACKER, Cyber Security Analyst, Cyber Security Analyst, DV CLEARANCE, DV CLEARED, CYBER ATTACK, Cyber Security Analyst
As a member of the Disability Confident Scheme, Circle and our Client guarantees to interview all candidates who have a disability and who meet all the essential criteria for the vacancy. In cases where we have a high volume of candidates who have a disability who meet all the essential criteria, we will interview the best candidates from within that group.
If you qualify, please notify us on igs @circlerecruitment.com. We will be in touch to discuss your suitability and arrange your guaranteed interview.
Should you require reasonable adjustments at any point during the recruitment process or if there is a better way for us to communicate, please do let us know.
Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer somebody else who fills the role! We also offer an iPad if you refer a new client to us and we recruit for them. Follow us on Facebook – Circle Recruitment , Twitter – @Circle_Rec and LinkedIn – Circle Recruitment.
Cyber Security Analyst employer: Circle Recruitment
Contact Detail:
Circle Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Security Analyst
✨Tip Number 1
Make sure to highlight your experience with real-world threats and cyber incidents during any discussions. Use specific examples from your past work to demonstrate your skills in handling serious and organised crime.
✨Tip Number 2
Familiarise yourself with the latest trends in malware behaviour and threat intelligence. Being able to discuss recent case studies or incidents can show your proactive approach and understanding of the field.
✨Tip Number 3
Network with professionals in the cybersecurity field, especially those who have worked with government clients. Attend relevant webinars or forums to gain insights and potentially get referrals.
✨Tip Number 4
If you hold any of the required certifications, be prepared to discuss how you've applied the knowledge gained from them in practical scenarios. This will reinforce your qualifications and suitability for the role.
We think you need these skills to ace Cyber Security Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cyber security, particularly with real-world threats and malware analysis. Use keywords from the job description to demonstrate your fit for the role.
Highlight Certifications: Clearly list any relevant certifications such as CompTIA Cybersecurity Analyst (CySA+), GIAC Cyber Threat Intelligence (GCTI), or Certified Ethical Hacker (CEH). If you have two of the listed qualifications, make sure to mention them prominently.
Craft a Strong Cover Letter: Write a cover letter that explains your passion for cyber security and how your skills align with the role. Mention specific experiences that relate to the job requirements, especially in data analysis and threat intelligence.
Proofread Your Application: Before submitting, carefully proofread your application materials for any spelling or grammatical errors. A polished application reflects your attention to detail, which is crucial in the field of cyber security.
How to prepare for a job interview at Circle Recruitment
✨Showcase Your Certifications
Make sure to highlight your relevant certifications like CompTIA CySA+, GIAC GCTI, or CEH during the interview. These qualifications are crucial for a Cyber Security Analyst role and demonstrate your commitment to the field.
✨Discuss Real-World Experience
Be prepared to discuss specific instances where you've dealt with cyber threats or malware analysis. Sharing concrete examples will help illustrate your expertise and problem-solving skills in real-world scenarios.
✨Understand the Role's Requirements
Familiarise yourself with the key responsibilities outlined in the job description. Understanding how cyber threat actors operate and the infrastructure they use will allow you to engage more effectively during the interview.
✨Prepare for Technical Questions
Expect technical questions related to cyber security concepts and threat intelligence. Brush up on your knowledge of internet security architecture and data analysis techniques to confidently answer these queries.