At a Glance
- Tasks: Monitor and respond to cyber threats in a fast-paced environment.
- Company: Join a leading organisation protecting critical national infrastructure.
- Benefits: Competitive salary, flexible working hours, and opportunities for professional growth.
- Other info: Dynamic team culture with a focus on continuous improvement and learning.
- Why this job: Make a real difference in safeguarding essential services and enhancing security.
- Qualifications: Strong technical skills in cybersecurity and incident management required.
The predicted salary is between 45000 - 55000 £ per year.
We are seeking specialist, high-calibre Cyber Security Operations Centre (CSOC) Analysts to support essential energy operations within a Critical National Infrastructure (CNI) environment. This role is responsible for real-time security monitoring, alert triage, investigation, and early-stage incident response.
You will work with industry-standard security monitoring and incident/event management platforms to identify suspicious activity, validate alerts, and escalate confirmed incidents. This is a highly operational position requiring strong technical judgement, excellent written communication, and the ability to remain calm and effective under time pressure.
You will also contribute to continuous improvement by capturing lessons learned from incidents, helping tune detections, and strengthening operational procedures and documentation.
Key Responsibilities- Monitor security events and alerts using industry-standard SIEM and incident/event management platforms (e.g., Elastic, Microsoft Sentinel, Splunk).
- Perform rapid triage to determine alert validity, severity, scope, and potential business or operational impact.
- Correlate related events and identify patterns across multiple alerts to reduce duplication and improve incident clarity.
- Conduct investigations across endpoint, identity, network, and log telemetry, building timelines and hypotheses grounded in evidence.
- Maintain high-quality investigation records, including key evidence and the queries/search logic used to reach conclusions, supporting peer review, auditability, and reliable handover.
- Apply foundational host-based forensic concepts, including process ancestry, persistence artefacts, lateral movement indicators, and log integrity considerations.
- Manage security incidents from initial identification through to handover to incident management / incident response teams, ensuring escalations are timely, complete, and actionable.
- Support containment and mitigation activities where authorised, including coordinating response actions with relevant teams and tooling.
- Develop and fine-tune detection rules and alerts to identify malicious activity, validating effectiveness and reducing false positives.
- Identify and implement lessons learned from incidents and post-incident reviews (PIRs) to improve processes, runbooks, and detection logic.
- Contribute to a culture of quality and standardisation by improving documentation and operational practices.
- Strong technical communication skills in time-pressured environments, with excellent written communication (clear, structured incident notes and stakeholder updates).
- Strong foundational knowledge of incident and event management / SIEM platforms (e.g., Elastic, Sentinel, Splunk), including query languages used for investigations and detections such as Kusto Query Language (KQL), ES|QL, Kibana Query Language.
- Strong understanding of attacker tactics, techniques, and procedures (TTPs), including detecting indicators of compromise (IOCs) and knowing how to locate them in logs or telemetry.
- Evidence of keeping up to date with industry-specific threat trends, attacker tradecraft, and emerging defensive techniques.
- Experience across the complete lifecycle of security incidents, including initial detection, triage, escalation to incident response teams, response, remediation, and PIR learnings.
- Deep understanding of one or more SIEM technologies, with Elastic knowledge considered a strong advantage.
- GIAC / SANS certifications highly desired, or equivalent credible industry certifications aligned to SOC operations, incident handling, threat detection, or forensic fundamentals.
Cyber Security Specialist in Reading employer: LHH
Contact Detail:
LHH Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Security Specialist in Reading
✨Tip Number 1
Network, network, network! Get out there and connect with people in the cyber security field. Attend industry events, join online forums, and don’t be shy about reaching out to professionals on LinkedIn. You never know who might have a lead on your dream job!
✨Tip Number 2
Practice your interview skills! Mock interviews can help you feel more confident when it’s time to shine. Focus on articulating your technical knowledge clearly and how you’ve handled incidents in the past. Remember, they want to see how you think under pressure!
✨Tip Number 3
Showcase your passion for cyber security! Share your insights on recent threats or trends during interviews. This not only demonstrates your knowledge but also shows that you’re genuinely interested in the field. Employers love candidates who are proactive and engaged!
✨Tip Number 4
Don’t forget to apply through our website! We’ve got some fantastic opportunities waiting for you. Tailor your application to highlight your relevant experience and skills, and make sure to follow up after applying. It shows initiative and keeps you on their radar!
We think you need these skills to ace Cyber Security Specialist in Reading
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Cyber Security Specialist role. Highlight your experience with SIEM platforms and any relevant certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your background makes you a great fit for our team. Keep it clear and structured, just like you'd want your incident notes to be.
Showcase Your Technical Skills: In your application, don't forget to mention your technical skills, especially around incident management and detection. We love seeing candidates who are up-to-date with industry trends and can demonstrate their knowledge of attacker tactics.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It helps us keep track of applications and ensures you’re considered for the role. Plus, it’s super easy!
How to prepare for a job interview at LHH
✨Know Your Tools Inside Out
Make sure you’re familiar with the industry-standard SIEM and incident/event management platforms mentioned in the job description, like Elastic, Microsoft Sentinel, and Splunk. Brush up on their functionalities and be ready to discuss how you've used them in past roles or projects.
✨Demonstrate Your Incident Response Skills
Prepare to share specific examples of how you've managed security incidents from detection to resolution. Highlight your ability to remain calm under pressure and how you’ve effectively communicated during critical situations. This will show that you can handle the demands of a CSOC Analyst role.
✨Stay Updated on Cyber Threats
Show your passion for cyber security by discussing recent trends, threats, and attacker tactics. Being knowledgeable about current events in the cyber world will demonstrate your commitment to continuous improvement and your proactive approach to threat detection.
✨Practice Clear Communication
Since strong written communication is key for this role, practice articulating your thoughts clearly and concisely. Prepare to explain complex technical concepts in simple terms, as you may need to communicate findings to stakeholders who aren’t as tech-savvy.