At a Glance
- Tasks: Analyse SIEM alerts and enhance customer security incident responses.
- Company: Join GTT, a global leader in AI-driven security solutions.
- Benefits: Remote work, competitive salary, and opportunities for professional growth.
- Why this job: Tackle complex challenges and make a real impact in cybersecurity.
- Qualifications: Experience with SIEM platforms and strong analytical skills required.
- Other info: Dynamic team environment with 24/7 support and career advancement opportunities.
The predicted salary is between 40000 - 50000 £ per year.
Location: UK remote with travel as and when required
Shift Pattern: 24/7 shift rota
Grow Your Career with GTT! Join GTT to be part of a global mission to simply and securely connect people and data through innovative, AI-driven solutions. We empower curious, adaptive professionals to take ownership of their work, offering a culture where your ideas have a visible, real-world reach. If you are energized by complex challenges and a supportive team that lifts each other up, GTT is the place to build a rewarding career.
Role Summary
The CSOC team at GTT specializes in providing Managed Detection and Response (MDR) services that meet and exceed government and certification body standards. Collaborating closely with our high-value customer base, the team delivers a wide range of security services, including Security Incident & Event Management, ensuring top‑notch protection and peace of mind for our clients. The GTT SIEM platform is essential for identifying customer security incidents. One of the primary tasks of our security analysts is to deeply analyse the outputs of the SIEM environment and guide our customers toward effective remediation actions, successfully mitigating risks to their corporate and hosted environments.
Duties and Responsibilities
- Providing analysis of SIEM alerts to enhance customer security.
- Working with customers to enhance security incident response procedures.
- Enhancing internal investigation processes and identifying additional toolsets required for rapid incident turnaround.
- Being part of a 24/7 customer support team providing first-level diagnosis for hosting and network customers.
- Identifying improvements and advising on best practice.
- Managing 3rd party vendor support as required.
- Adhering to team processes and direction.
- Working with senior analysts/engineers to implement platform optimizations and tuning through a structured change process.
- Performing upgrades to the SIEM environment from operating system to application to ensure the highest level of platform security.
Required Experience/Qualifications
- Proficiency in Security Information and Event Management (SIEM) platforms, particularly Splunk.
- Demonstrated experience in analysing and responding to security incidents.
- Strong understanding of cybersecurity principles and best practices.
- Experience in threat detection, analysis, and mitigation.
- Familiarity with incident response procedures and playbooks.
- Excellent analytical and problem-solving skills.
- Strong communication skills to collaborate effectively with stakeholders and customers.
- Relevant security qualifications are a plus.
Hours/Travel/Shift
Varied shift hours: occasional extended hours may be required during critical incidents and platform upgrades. SC clearance will be required.
Core Competencies
- Accuracy and Attention to Detail: understanding the necessity and value of accuracy; ability to complete tasks with high levels of precision.
- Managing Multiple Priorities: knowledge of effective self-management practices; ability to manage multiple concurrent objectives, projects, groups, or activities, making effective judgments as to prioritizing and time allocation.
- Problem Solving: knowledge of approaches, tools, and techniques for recognizing, anticipating, and resolving organizational, operational, or process problems; ability to apply knowledge of problem-solving appropriately to diverse situations.
- Root Cause Analysis: knowledge of the concepts, principles, and techniques of root cause analysis (RCA); ability to use a structured approach to identify the underlying causes of problems in a particular environment and the changes needed to prevent recurrences.
- Cybersecurity Practices: understanding of cybersecurity principles, protocols, and best practices; ability to apply security measures to protect network and data assets.
- IP Technologies and Protocols: basic theoretical knowledge of IP technologies and protocols.
Security Analyst in London employer: GTT
Contact Detail:
GTT Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Analyst in London
✨Tip Number 1
Network like a pro! Reach out to folks in the cybersecurity field, especially those who work at GTT or similar companies. Attend industry events or webinars and don’t be shy about introducing yourself – you never know who might have a lead on your dream job!
✨Tip Number 2
Show off your skills! If you’ve got experience with SIEM platforms like Splunk, make sure to highlight that in conversations. Consider creating a portfolio or case studies of past incidents you've handled to demonstrate your analytical prowess.
✨Tip Number 3
Prepare for interviews by brushing up on common security incident scenarios. Practice explaining your thought process when analysing alerts or responding to incidents. This will help you stand out as someone who can think on their feet and tackle real-world challenges.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining our team at GTT and contributing to our mission.
We think you need these skills to ace Security Analyst in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Security Analyst role. Highlight your experience with SIEM platforms like Splunk and any relevant cybersecurity qualifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how you can contribute to our mission at GTT. Keep it engaging and personal – we love to see your personality come through.
Showcase Your Problem-Solving Skills: In your application, don’t forget to mention specific examples of how you've tackled complex security challenges in the past. We’re all about problem-solving here at GTT, so let us know how you’ve made an impact!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re serious about joining our team!
How to prepare for a job interview at GTT
✨Know Your SIEM Inside Out
Make sure you brush up on your knowledge of Security Information and Event Management (SIEM) platforms, especially Splunk. Be ready to discuss how you've used these tools in past roles, as well as any specific incidents you've managed.
✨Showcase Your Problem-Solving Skills
Prepare examples that highlight your analytical and problem-solving abilities. Think of situations where you identified a security issue and the steps you took to resolve it. This will demonstrate your capability to handle complex challenges.
✨Communicate Clearly and Confidently
Since you'll be collaborating with customers and stakeholders, practice articulating your thoughts clearly. Use straightforward language to explain technical concepts, ensuring that even non-technical individuals can understand your points.
✨Familiarise Yourself with Incident Response Procedures
Review common incident response playbooks and be prepared to discuss how you would enhance security incident response procedures. Showing that you understand best practices in this area will set you apart from other candidates.