At a Glance
- Tasks: Lead security operations and manage incident response for a dynamic fintech environment.
- Company: Join Cititec, a forward-thinking company in the fintech sector.
- Benefits: Enjoy competitive pay, hybrid working, and opportunities for professional growth.
- Why this job: Make a real impact on cybersecurity while collaborating with top industry experts.
- Qualifications: Experience in incident response and familiarity with SIEM tools required.
- Other info: Work in a vibrant London office with a focus on innovation and teamwork.
The predicted salary is between 36000 - 60000 Β£ per year.
The Role
As SecOps Lead, you will act as the main liaison between internal security, engineering, and IT teams, and an external Managed Detection and Response (MDR) partner. You'll oversee incident management, enhance detection and response processes, and strengthen the company's overall security posture.
Key Responsibilities
- Serve as the primary contact for the MDR partner, managing the relationship, conducting service reviews, and ensuring SLAs are consistently met.
- Lead incident response efforts during security events β coordinating across teams to achieve fast containment and recovery.
- Review and fine-tune security alerts with the MDR provider, reducing false positives and improving detection accuracy.
- Develop and monitor MDR performance metrics (KPIs), presenting insights and trends to senior leadership.
- Maintain and evolve the security incident response plan (IRP) and playbooks in collaboration with the MDR provider.
- Translate technical security risks into actionable business recommendations for stakeholders at all levels.
- Contribute to broader cybersecurity initiatives, including vulnerability management, cloud security, data protection, and governance, risk & compliance (GRC).
Requirements
- In-depth understanding of the incident response lifecycle β preparation, detection, containment, eradication, recovery, and lessons learned.
- Hands-on experience with SIEM tools such as Splunk, Sentinel, or QRadar β including log analysis and data correlation.
- Strong familiarity with EDR platforms like CrowdStrike, SentinelOne, or Carbon Black.
- Working knowledge of network security, including protocols, firewalls, IDS/IPS, and traffic analysis.
- Experience with cloud security principles in AWS, Azure, or GCP.
- Ability to interpret and apply threat intelligence to improve controls and detection coverage.
- Experience with MacOS preferred.
- Strong communication skills β capable of articulating complex technical issues to both technical and non-technical stakeholders.
- Proven track record of managing vendor relationships and holding third-party partners accountable.
- Analytical mindset with strong problem-solving and prioritization skills.
Security Operations Specialist employer: Cititec
Contact Detail:
Cititec Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Security Operations Specialist
β¨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and connect with people on LinkedIn. You never know who might have the inside scoop on job openings or can refer you directly.
β¨Tip Number 2
Prepare for interviews by practising common questions and scenarios related to security operations. We recommend doing mock interviews with friends or using online platforms to get comfortable with articulating your experience.
β¨Tip Number 3
Showcase your skills through real-world examples. When discussing your experience, highlight specific incidents you've managed or improvements you've made in security processes. This will help you stand out as a candidate.
β¨Tip Number 4
Donβt forget to apply through our website! Itβs a great way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step to engage with us directly.
We think you need these skills to ace Security Operations Specialist
Some tips for your application π«‘
Tailor Your CV: Make sure your CV is tailored to the Security Operations Specialist role. Highlight your experience with incident response, SIEM tools, and any relevant cloud security knowledge. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a great fit for the team. Donβt forget to mention your experience with managing vendor relationships and incident management.
Showcase Your Communication Skills: Since you'll be liaising between teams, it's crucial to demonstrate your strong communication skills in your application. Use clear and concise language to convey your technical expertise and how you can translate complex issues for non-technical stakeholders.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. Itβs super easy, and youβll be able to keep track of your application status. Plus, we love seeing applications come directly from our site!
How to prepare for a job interview at Cititec
β¨Know Your Incident Response Lifecycle
Make sure you can confidently discuss each phase of the incident response lifecycle. Be prepared to share examples from your experience that demonstrate your understanding and how you've applied it in real situations.
β¨Familiarise Yourself with SIEM Tools
Since hands-on experience with SIEM tools like Splunk or QRadar is crucial, brush up on your knowledge of these platforms. Be ready to talk about specific instances where you've used them for log analysis and data correlation.
β¨Communicate Clearly with Stakeholders
Strong communication skills are key for this role. Practice explaining complex technical issues in simple terms, as you'll need to articulate these to both technical and non-technical stakeholders during the interview.
β¨Showcase Your Analytical Skills
Prepare to discuss how you've approached problem-solving in past roles. Highlight your analytical mindset by sharing examples of how you've prioritised tasks and made decisions based on data and threat intelligence.