Security Operations Specialist

Security Operations Specialist

Full-Time 55000 - 65000 £ / year (est.) Home office (partial)
Colt Technology Services

At a Glance

  • Tasks: Lead incident response and manage complex cyber incidents in a global security operations team.
  • Company: Join a leading tech company making a real impact in cybersecurity.
  • Benefits: Enjoy flexible hours, remote work options, and extensive development opportunities.
  • Why this job: Be at the forefront of cybersecurity, protecting businesses and customers worldwide.
  • Qualifications: Experience in information security and strong scripting skills are essential.
  • Other info: Collaborative environment with a focus on personal growth and diversity.

The predicted salary is between 55000 - 65000 £ per year.

We are seeking a Tech Lead - SOC Responder. This is an opportunity to meaningfully contribute to a highly visible security operations function with global impact upon Colt, business units, partners, and customers. While working as part of this team, the successful individual will provide world-class incident response functions to detect, protect, respond, and sustain operations within cyberspace. This role operates at a Tier 3 level, with the expectation that the individual has undeniable experience handling major and complex cyber incidents, independently leading and managing incidents end to end, delivering clear and effective stakeholder communication, and mentoring other members of the SOC team.

What You Will Do

  • Support SOC Manager to deliver SIEM, IR tools platform management including all design, implementation and administration activities.
  • Use cases preparation and implementation, connector deployment, maintenance & health checks.
  • Responsible for operational activities, technology escalation support, security solution assessment, existing service maturing and build activities.
  • Analyse potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach.
  • Establish and govern security incident response processes, investigations and security operational processes.
  • Maintain and enhance formal service catalogue, service descriptions, targets and performance against these.
  • Ensure security services, tools and platforms are adequately maintained.
  • Monitor and report on the effectiveness of our security-enforcing technologies.
  • Identify and continuously monitor specific security risks and KPIs; produce management information to ensure Colt receives value from key security investments/services.
  • Contribute to design, development and maintenance of security standards and controls.
  • Align the team's goals and plan with Colt’s long-term priorities and strategy.
  • Develop and grow the talent and people capability within the security teams.

Key performance indicators

  • Takes ownership for understanding what is expected of them/their team and ensures it is delivered.
  • Proactively requests leadership for views and opinions; uses this feedback to improve personal performance.
  • Reviews working methods regularly to identify ways of improving service delivery – makes recommendations on what improvement can be made and owns delivery of agreed action plan and outcomes.
  • Understands cultural differences and utilises this understanding to build rapport across different teams in order to obtain the necessary cooperation.

What We're Looking For

  • Information Security Incident Response experience with a focus on detection and response to malicious activity using log data from various sources preferred.
  • Strong networking and systems experience, preferably in an enterprise environment.
  • Strong understanding of information security and the threat landscape surrounding enterprise systems.
  • Strong scripting experience (Python, PowerShell, Unix shell).
  • Experience working in all phases of the SDLC.
  • Deep understanding and experience using cyber security operations, security monitoring, endpoint (EDR), network, and SIEM tools.
  • Prior SOC experience a plus.
  • Extensive knowledge of network and server security protocols, technologies, and products.
  • Industry-recognized certifications (CISSP, GCIH, GCFA, OSCP, etc.) preferred.
  • Strong oral and written communication skills.
  • Relentless curiosity and attention to detail.
  • Ability to learn quickly and leverage prior experiences to effectively solve current security challenges.
  • Refusing to accept the status quo.

Qualifications

  • Combination of the following: Degree in Information Technology, Engineering or similar.
  • SIEM management – desirable to have advanced certification from SIEM vendors on products such as ArcSight, MS Sentinel or LogRhythm.

Benefits

  • Flexible working hours and the option to work from home.
  • Extensive induction program with experienced mentors and buddies.
  • Opportunities for further development and educational opportunities.
  • Global Family Leave Policy.
  • Employee Assistance Program.
  • Internal inclusion & diversity employee networks.

Security Operations Specialist employer: Colt Technology Services

At Colt, we pride ourselves on being an exceptional employer, offering a dynamic work culture that fosters innovation and collaboration. As a Security Operations Specialist, you will benefit from flexible working hours, a comprehensive induction programme with mentorship, and ample opportunities for professional growth within a globally impactful security operations team. Our commitment to employee well-being is reflected in our Global Family Leave Policy and robust inclusion and diversity networks, making Colt a truly rewarding place to advance your career.
Colt Technology Services

Contact Detail:

Colt Technology Services Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Security Operations Specialist

✨Tip Number 1

Network like a pro! Reach out to current employees at Colt or in similar roles on LinkedIn. A friendly chat can give you insider info and might just get your foot in the door.

✨Tip Number 2

Prepare for the interview by brushing up on your incident response skills. Be ready to discuss real-life scenarios where you've tackled complex cyber incidents. Show us how you lead and manage under pressure!

✨Tip Number 3

Don’t forget to showcase your scripting skills! Whether it’s Python or PowerShell, be prepared to demonstrate how you’ve used these tools to enhance security operations in past roles.

✨Tip Number 4

Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step to connect with us directly.

We think you need these skills to ace Security Operations Specialist

Incident Response
SIEM Management
Log Data Analysis
Networking Experience
Information Security Knowledge
Scripting (Python, PowerShell, Unix shell)
Cyber Security Operations
Security Monitoring
Endpoint Detection and Response (EDR)
Security Information and Event Management (SIEM) Tools
Network and Server Security Protocols
Industry-recognised Certifications (CISSP, GCIH, GCFA, OSCP)
Communication Skills
Attention to Detail
Problem-Solving Skills

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Security Operations Specialist role. Highlight your experience with incident response, SIEM tools, and any relevant certifications. We want to see how your skills align with what we’re looking for!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cybersecurity and how your background makes you a perfect fit for our team. Don’t forget to mention any specific projects or achievements that showcase your expertise.

Showcase Your Communication Skills: Since this role involves clear stakeholder communication, make sure your application reflects your strong written communication skills. Use concise language and structure your application well to demonstrate your ability to convey complex information effectively.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team at StudySmarter!

How to prepare for a job interview at Colt Technology Services

✨Know Your Stuff

Make sure you brush up on your knowledge of security operations and incident response. Familiarise yourself with the tools mentioned in the job description, like SIEM and EDR. Being able to discuss your hands-on experience with these technologies will show that you're not just a theory person but someone who can get things done.

✨Showcase Your Communication Skills

Since this role involves clear stakeholder communication, practice articulating complex security concepts in simple terms. Prepare examples from your past experiences where you successfully communicated during a crisis or incident. This will demonstrate your ability to lead and mentor others effectively.

✨Prepare for Scenario Questions

Expect to be asked about how you would handle specific security incidents. Think through potential scenarios and outline your thought process for detection, response, and recovery. This will help you showcase your problem-solving skills and your ability to think on your feet.

✨Cultural Fit Matters

Understand the company culture and values. Be ready to discuss how you can contribute to team dynamics and build rapport across different teams. Highlight any previous experiences where you successfully navigated cultural differences to achieve a common goal.

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>