At a Glance
- Tasks: Monitor security events and investigate potential threats while coordinating incident responses.
- Company: Join a leading tech firm focused on security and privacy operations.
- Benefits: Enjoy competitive pay, flexible working options, and opportunities for professional growth.
- Other info: Collaborative team environment with a focus on continuous improvement and learning.
- Why this job: Make a real difference in cybersecurity and privacy while developing your skills.
- Qualifications: 3+ years in security operations with strong analytical and documentation skills.
The predicted salary is between 45000 - 55000 ÂŁ per year.
Monitor security event identification via the third-party security operations service.
Triage, analyse, and investigate incidents to validate potential threats, anomalies, or policy violations.
Coordinate incident response activities including containment, evidence collection, documentation, and recovery support.
Contribute to threat hunting activities using KQL queries and intelligence-led techniques.
Maintain accurate incident records, ensuring actions and outcomes are logged to a high standard.
Facilitate security testing and awareness through threat simulations.
Support the triage and processing of data subject rights (DSR) requests, including subject access requests (SARs).
Conduct data discovery and collection across systems, ensuring completeness and accuracy.
Support DPIA processes through data mapping, evidence gathering, and risk assessment input.
Help maintain and tune Microsoft Defender, Sentinel, and Purview policies, analytics rules, alerts, and workflows.
Support the development, testing, and maintenance of automated playbooks and response actions (e.g., Logic Apps).
Verifying compliance with expected practice in the operation of technology services, including security baseline and access right reviews.
Support vulnerability management by tracking remediation, validating fixes, and assisting with reporting.
Gather and analyse data to help identify trends, gaps, and areas for control improvement.
Assist with periodic control reviews, audits, and compliance checks as required.
Prepare operational reports, dashboards, and metrics for the Team Lead and wider stakeholders.
Develop and maintain playbooks, runbooks, and procedural documentation.
Contribute to continuous improvement activities, including identifying opportunities to streamline operations.
Ensure all actions adhere to internal policies, regulatory requirements, and industry best practice.
3+ yearsâ experience working in a security operations, IT security, privacy operations, or related technical role.
Familiarity with:
- Microsoft Defender XDR
- Microsoft Sentinel (SIEM/SOAR)
- Privacy Management Solutions (e.g. Purview, OneTrust)
Basic understanding of key cybersecurity and privacy concepts, such as:
- Threat detection and analysis
- Incident response lifecycle
- Vulnerability and exposure management
- Data privacy principles and data subject rights
Experience analysing logs, alerts, or data from security tools.
Strong documentation, investigation, and analytical skills.
Handsâon experience writing KQL queries, PowerShell, or CLI commands.
Exposure to automation or playbooks (Logic Apps, Defender workflows).
Knowledge of frameworks such as MITRE ATT&CK or NIST CSF.
Relevant certifications such as:
- SCâ900, SCâ200 (or working toward), AZâ900, AZâ500
- CISSP, CIPP/E, CompTIA Security+
- Foundationâlevel data privacy certifications (e.g., BCS Certificate in Data Protection)
Strong problemâsolving ability and attention to detail.
Curious and proactive mindset with willingness to learn.
Effective communicator able to document findings clearly and concisely.
Highly organised and able to manage multiple tasks with competing priorities.
Collaborative team player with a commitment to continuous improvement.
Ability to work with sensitive data responsibly and confidentially.
Security and Privacy Operations Analyst in London employer: Knight Frank Group
Contact Detail:
Knight Frank Group Recruiting Team
StudySmarter Expert Advice đ¤Ť
We think this is how you could land Security and Privacy Operations Analyst in London
â¨Tip Number 1
Network like a pro! Reach out to folks in the security and privacy field on LinkedIn or at industry events. A friendly chat can open doors that a CV just can't.
â¨Tip Number 2
Show off your skills! If youâve got experience with KQL queries or Microsoft Defender, bring it up in conversations. Real-world examples of your work can make you stand out.
â¨Tip Number 3
Prepare for interviews by brushing up on common incident response scenarios. Think about how youâd handle specific threats or policy violations, and be ready to share your thought process.
â¨Tip Number 4
Donât forget to apply through our website! Itâs the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive!
We think you need these skills to ace Security and Privacy Operations Analyst in London
Some tips for your application đŤĄ
Tailor Your Application: Make sure to customise your CV and cover letter to highlight your experience in security operations and privacy management. We want to see how your skills align with the specific requirements of the Security and Privacy Operations Analyst role.
Show Off Your Skills: Donât hold back on showcasing your technical skills, especially with tools like Microsoft Defender and Sentinel. If you've got hands-on experience with KQL queries or automation, let us know! We love a proactive mindset.
Be Clear and Concise: When documenting your experiences, keep it clear and to the point. We appreciate strong documentation skills, so make sure your application reflects your ability to communicate findings effectively.
Apply Through Our Website: We encourage you to apply directly through our website. Itâs the best way for us to receive your application and ensures youâre considered for the role. Plus, itâs super easy!
How to prepare for a job interview at Knight Frank Group
â¨Know Your Tools
Familiarise yourself with Microsoft Defender, Sentinel, and Purview before the interview. Be ready to discuss how you've used these tools in your previous roles, especially in incident response and threat detection.
â¨Showcase Your Analytical Skills
Prepare examples of how you've triaged and investigated security incidents. Highlight your experience with KQL queries and any relevant frameworks like MITRE ATT&CK or NIST CSF to demonstrate your analytical prowess.
â¨Document Everything
Emphasise your strong documentation skills during the interview. Be prepared to explain how you maintain accurate incident records and how this contributes to effective incident response and compliance.
â¨Be Proactive and Curious
Exhibit a proactive mindset by discussing how you've contributed to continuous improvement in your past roles. Share instances where you've identified gaps or trends in security operations and how you addressed them.