At a Glance
- Tasks: Analyse real-world attacks and build detection capabilities in a dynamic environment.
- Company: Privately backed cyber security product company focused on innovation.
- Benefits: Remote work, share options, and high ownership from day one.
- Why this job: Make a real impact on cyber security with cutting-edge technology.
- Qualifications: Experience in threat hunting, SIEM tools, and scripting skills required.
- Other info: Join a collaborative team with opportunities for growth and influence.
The predicted salary is between 50000 - 60000 £ per year.
We’re working with a privately backed cyber security product company focused on cyber deception and threat intelligence. They deploy internet-facing deception infrastructure, observe real attacker behaviour at scale, and turn that activity into detection and intelligence used by organisations globally. They are hiring two Cyber Security Analysts at different levels. This is not a SOC role. It suits people who enjoy threat hunting, analysis, and building detection capability, rather than responding to alerts.
What you’ll be doing:
- Analyse real-world attack activity captured from deception environments
- Investigate attacker techniques and exploitation patterns
- Map activity to TTPs, CVEs, and CWEs
- Build and refine detections, alerts, and behavioural indicators
- Write scripts to support analysis and automation
- Contribute to a threat intelligence and detection capability used by customers
What they’re looking for:
- Experience in threat hunting, threat intelligence, or advanced SOC or detection roles
- Evidence of building or improving detection capability, not just operating alerts
- SIEM experience such as Splunk, Sentinel, Rapid7, or similar
- Scripting or coding experience for analysis or automation, Python ideal
- Strong understanding of attacker behaviour and modern attack techniques
Important: this is not a role focused on consuming threat intel tools or reacting to tickets.
Tech snapshot:
- Scripting: Python preferred, plus Bash or PowerShell
- SIEM exposure: Splunk, Sentinel, Rapid7, or similar
- Cloud: Azure exposure helpful but not required
- Focus on analytics, automation, and detection engineering
Seniority and growth:
- Two hires, one more senior and one at a mid-level, roughly 3 to 4 years’ experience
- High ownership and influence from day one
- Share options available
Location:
- Remote within the UK
- Scotland preferred, with regular Edinburgh meetups and occasional Glasgow
- Light travel, roughly once per month
Why this role?
- No legacy SOC or rigid process to inherit - you help build the capability
- Exposure to real attack data at scale
- High‑trust, low‑bureaucracy technical environment
- Direct impact on both product and customers
Cyber Security Analyst in Telford employer: Experis Scotland
Contact Detail:
Experis Scotland Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Security Analyst in Telford
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field on LinkedIn or at industry events. We all know that sometimes it’s not just what you know, but who you know that can help you land that dream job.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your threat hunting projects or any scripts you've written. We love seeing practical examples of your work, and it gives you a chance to stand out from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on real-world attack scenarios. We recommend practising how you'd analyse and respond to these situations, as it shows you're ready to dive into the role and make an impact from day one.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we’re always on the lookout for passionate candidates who are eager to contribute to our mission.
We think you need these skills to ace Cyber Security Analyst in Telford
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in threat hunting and detection capabilities. We want to see how you've built or improved detection systems, so don’t hold back on those details!
Show Off Your Skills: When writing your application, emphasise your scripting skills, especially in Python. If you've worked with SIEM tools like Splunk or Rapid7, make sure to mention that too. We love seeing practical examples of your work!
Be Authentic: Let your personality shine through in your application. We’re looking for passionate individuals who enjoy diving into the nitty-gritty of cyber threats. Share your enthusiasm for threat intelligence and analysis!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates from our team!
How to prepare for a job interview at Experis Scotland
✨Know Your Threat Hunting
Make sure you brush up on your threat hunting skills. Be ready to discuss specific techniques you've used in the past, and how you've analysed real-world attack activity. This role is all about understanding attacker behaviour, so be prepared to share examples of how you've mapped activities to TTPs, CVEs, and CWEs.
✨Show Off Your Scripting Skills
Since scripting is a big part of this job, especially with Python, make sure you can talk about your coding experience confidently. Bring examples of scripts you've written for analysis or automation, and be ready to explain how they improved detection capabilities in your previous roles.
✨Familiarise Yourself with SIEM Tools
Get comfortable with SIEM tools like Splunk, Sentinel, or Rapid7. Be prepared to discuss how you've used these tools to build or improve detection capabilities, rather than just operating alerts. Highlight any specific projects where you made a significant impact using these technologies.
✨Emphasise Your Analytical Mindset
This role requires a strong focus on analytics and detection engineering. During the interview, showcase your analytical mindset by discussing how you've approached complex problems in the past. Share your thought process when investigating attacker techniques and how you contributed to a threat intelligence capability.