Senior Security Analyst

Senior Security Analyst

Full-Time 52000 - 78000 ÂŁ / year (est.) Home office (partial)
I

At a Glance

  • Tasks: Join a 24/7 SOC team tackling cyber incidents and proactive threat hunting.
  • Company: Work for a leading IT firm known for its top-tier talent and technology.
  • Benefits: Enjoy flexible working, top training, and a supportive 'people first' culture.
  • Why this job: Grow your career in cyber with cutting-edge tech and expert colleagues.
  • Qualifications: 2+ years in a SOC, experience with SIEM tools, and relevant certifications required.
  • Other info: Must be eligible for SC clearance; 4 days on, 4 days off shift pattern.

The predicted salary is between 52000 - 78000 ÂŁ per year.

My client is one of the most recognisable names in IT and has some of the best people in the industry working for them. They’re top partners with all the top Vendors, which means you get to work with the best technology, the best people, the best training, the best certification programmes, and the best environment to grow!

Why?:

  • Work with some of the best cyber consultants in the country.
  • The pathway to do whatever you want in cyber is continuous.
  • “People first” culture.
  • The latest, cutting-edge technology.

You will join a 24/7 SOC team, involved in the highest level of Incident Response activities, proactive threat hunting, and development of detection and use-case capabilities. You’ll be working alongside the engineering team to help find tuning optimisation opportunities.

Candidates MUST have or be eligible to gain SC clearance upon hire.

Key Skills required:

  • 2+ years’ experience working in a SOC environment – ideally MSSP.
  • Experience in a technical security role is also considered.
  • Experience with SIEM tools, such as MS Sentinel, Alien Vault, or Splunk.
  • A cyber security qualification, certification, or degree e.g. CySA+, CompTIA SEC+, or similar experience.
  • Microsoft SC-200 Certs are desirable.
  • Excellent communication skills.
  • A strong knowledge of sophisticated threat actor methodologies, along with experience in incident response and forensic investigations.

This business has a clear picture of where they want to be, has the right individuals steering the ship, and exceptional tech talent leading the way. Impressive customers, flexible working, and a company that truly cares.

Responsibilities:

  • Leading escalated Cyber Incident Management, including Major Incidents and 2nd/3rd line analysis for ongoing investigations.
  • Carrying out proactive threat hunts, RCAs, creation of detection capabilities.
  • Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault, or Splunk).
  • 4 days on, 4 days off – days and nights rota.
  • Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and breaches are managed for successful resolution.
  • Document and manage cases to utilise information for customer reports, to provide insightful and intelligent recommendations.
  • Facilitate recovery, following the resolution of incidents.
  • Provide subject matter expertise regarding exploits, threat actors, TTPs, etc.
  • Maintain high quality across SLA’s and KPI’s.
I

Contact Detail:

InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Senior Security Analyst

✨Tip Number 1

Network with professionals in the cybersecurity field, especially those who work in SOC environments. Attend industry events, webinars, or local meetups to connect with potential colleagues and learn more about the latest trends and technologies.

✨Tip Number 2

Familiarise yourself with the specific SIEM tools mentioned in the job description, such as MS Sentinel, Alien Vault, or Splunk. Consider setting up a home lab to practice using these tools, which will give you practical experience to discuss during interviews.

✨Tip Number 3

Stay updated on the latest threat actor methodologies and incident response techniques. Follow relevant blogs, podcasts, and forums to deepen your understanding and be prepared to discuss current threats and solutions in your interviews.

✨Tip Number 4

Prepare to demonstrate your communication skills by practising how you would explain complex security concepts to non-technical stakeholders. This is crucial for roles that involve incident management and collaboration with various teams.

We think you need these skills to ace Senior Security Analyst

Experience in a SOC environment
Technical security role experience
Proficiency with SIEM tools (e.g., MS Sentinel, Alien Vault, Splunk)
Cyber security qualifications (e.g., CySA+, CompTIA SEC+)
Microsoft SC-200 certification
Excellent communication skills
Knowledge of threat actor methodologies
Incident response experience
Forensic investigation skills
Proactive threat hunting capabilities
Root Cause Analysis (RCA) skills
Ability to document and manage cases
Expertise in exploits and TTPs
Understanding of SLA and KPI management

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your experience in a SOC environment, particularly any roles in MSSP. Emphasise your familiarity with SIEM tools like MS Sentinel, Alien Vault, or Splunk, and include any relevant certifications such as CySA+ or CompTIA SEC+.

Craft a Strong Cover Letter: In your cover letter, express your passion for cybersecurity and detail how your skills align with the responsibilities of the Senior Security Analyst role. Mention your experience in incident response and threat hunting, and how you can contribute to the company's 'people first' culture.

Highlight Communication Skills: Since excellent communication skills are essential for this role, provide examples in your application that demonstrate your ability to convey complex information clearly, whether through previous job experiences or specific projects.

Showcase Continuous Learning: Mention any ongoing training or certifications you are pursuing, especially those related to Microsoft SC-200 or other relevant qualifications. This shows your commitment to professional growth and staying updated with the latest technologies in cybersecurity.

How to prepare for a job interview at InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment

✨Showcase Your Technical Skills

Make sure to highlight your experience with SIEM tools like MS Sentinel, Alien Vault, or Splunk. Be prepared to discuss specific incidents where you used these tools effectively, as this will demonstrate your hands-on expertise.

✨Demonstrate Incident Response Knowledge

Since the role involves leading escalated Cyber Incident Management, be ready to share examples of how you've handled major incidents in the past. Discuss your approach to incident response and any forensic investigations you've conducted.

✨Communicate Clearly

Excellent communication skills are a must for this position. Practice explaining complex security concepts in simple terms, as you may need to communicate findings to non-technical stakeholders during your interview.

✨Understand the Company Culture

Research the company's 'people first' culture and be prepared to discuss how you align with their values. Showing that you understand and appreciate their work environment can set you apart from other candidates.

I
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>