Cyber Security Specialist in Wokingham
Cyber Security Specialist

Cyber Security Specialist in Wokingham

Wokingham Full-Time 40000 - 55000 £ / year (est.) No home office possible
LHH

At a Glance

  • Tasks: Monitor security events, investigate incidents, and improve detection processes in a fast-paced environment.
  • Company: Join a leading organisation protecting critical national infrastructure.
  • Benefits: Competitive salary, flexible working options, and opportunities for professional growth.
  • Other info: Exciting career path with continuous learning and improvement opportunities.
  • Why this job: Make a real difference in cyber security while developing your skills in a dynamic team.
  • Qualifications: Strong communication skills and foundational knowledge of SIEM platforms required.

The predicted salary is between 40000 - 55000 £ per year.

We are seeking specialist, high-calibre Cyber Security Operations Centre (CSOC) Analysts to support essential energy operations within a Critical National Infrastructure (CNI) environment. This role is responsible for real-time security monitoring, alert triage, investigation, and early-stage incident response.

You will work with industry-standard security monitoring and incident/event management platforms to identify suspicious activity, validate alerts, and escalate confirmed incidents. This is a highly operational position requiring strong technical judgement, excellent written communication, and the ability to remain calm and effective under time pressure.

You will also contribute to continuous improvement by capturing lessons learned from incidents, helping tune detections, and strengthening operational procedures and documentation.

Key Responsibilities
  • Monitor security events and alerts using industry-standard SIEM and incident/event management platforms (e.g., Elastic, Microsoft Sentinel, Splunk).
  • Perform rapid triage to determine alert validity, severity, scope, and potential business or operational impact.
  • Correlate related events and identify patterns across multiple alerts to reduce duplication and improve incident clarity.
  • Conduct investigations across endpoint, identity, network, and log telemetry, building timelines and hypotheses grounded in evidence.
  • Maintain high-quality investigation records, including key evidence and the queries/search logic used to reach conclusions, supporting peer review, auditability, and reliable handover.
  • Apply foundational host-based forensic concepts, including process ancestry, persistence artefacts, lateral movement indicators, and log integrity considerations.
  • Manage security incidents from initial identification through to handover to incident management / incident response teams, ensuring escalations are timely, complete, and actionable.
  • Support containment and mitigation activities where authorised, including coordinating response actions with relevant teams and tooling.
  • Develop and fine-tune detection rules and alerts to identify malicious activity, validating effectiveness and reducing false positives.
  • Identify and implement lessons learned from incidents and post-incident reviews (PIRs) to improve processes, runbooks, and detection logic.
  • Contribute to a culture of quality and standardisation by improving documentation and operational practices.
Skills and Experience Required
  • Strong technical communication skills in time-pressured environments, with excellent written communication (clear, structured incident notes and stakeholder updates).
  • Strong foundational knowledge of incident and event management / SIEM platforms (e.g., Elastic, Sentinel, Splunk), including query languages used for investigations and detections such as Kusto Query Language (KQL), ES|QL, and Kibana Query Language.
  • Strong understanding of attacker tactics, techniques, and procedures (TTPs), including detecting indicators of compromise (IOCs) and knowing how to locate them in logs or telemetry.
  • Evidence of keeping up to date with industry-specific threat trends, attacker tradecraft, and emerging defensive techniques.
  • Experience across the complete lifecycle of security incidents, including initial detection, triage, escalation to incident response teams, response, remediation, and PIR learnings.
Desirable
  • Deep understanding of one or more SIEM technologies, with Elastic knowledge considered a strong advantage.
  • GIAC / SANS certifications highly desired, or equivalent credible industry certifications aligned to SOC operations, incident handling, threat detection, or forensic fundamentals.

Cyber Security Specialist in Wokingham employer: LHH

As a Cyber Security Specialist within our Cyber Security Operations Centre, you will be part of a dynamic team dedicated to safeguarding critical national infrastructure. We pride ourselves on fostering a collaborative work culture that values continuous learning and professional development, offering opportunities for growth through training and industry certifications. Located in a vibrant area, our company provides a supportive environment where your expertise will directly contribute to the security of essential energy operations, making your role both meaningful and impactful.
LHH

Contact Detail:

LHH Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Cyber Security Specialist in Wokingham

✨Tip Number 1

Network like a pro! Attend industry events, webinars, or local meetups to connect with other cyber security enthusiasts. You never know who might have the inside scoop on job openings or can put in a good word for you.

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your projects, investigations, or any relevant work you've done. This gives potential employers a taste of what you can bring to the table and sets you apart from the crowd.

✨Tip Number 3

Practice makes perfect! Prepare for interviews by simulating real-life scenarios you might face as a CSOC Analyst. Brush up on your technical knowledge and be ready to discuss how you'd handle specific incidents or alerts.

✨Tip Number 4

Don't forget to apply through our website! We love seeing applications directly from candidates who are passionate about cyber security. Plus, it shows you're proactive and genuinely interested in joining our team.

We think you need these skills to ace Cyber Security Specialist in Wokingham

Real-time Security Monitoring
Alert Triage
Incident Response
SIEM Platforms (e.g., Elastic, Microsoft Sentinel, Splunk)
Kusto Query Language (KQL)
ES|QL
Kibana Query Language
Evidence-led Analysis
Host-based Forensics
Incident Management
Threat Detection
Understanding of Attacker Tactics, Techniques, and Procedures (TTPs)
Continuous Improvement
Technical Communication Skills
Documentation Practices

Some tips for your application 🫡

Tailor Your CV: Make sure your CV speaks directly to the Cyber Security Specialist role. Highlight your experience with SIEM platforms and any relevant certifications. We want to see how your skills match what we're looking for!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your background makes you a perfect fit for our team. Keep it clear and structured, just like we value in incident notes.

Showcase Your Technical Skills: Don’t forget to mention your technical skills, especially around incident management and detection tools. We love seeing evidence of your knowledge in KQL or other query languages, so make sure to include that!

Apply Through Our Website: We encourage you to apply through our website for a smoother process. It helps us keep track of your application and ensures you don’t miss out on any important updates from us!

How to prepare for a job interview at LHH

✨Know Your Tools

Familiarise yourself with the industry-standard SIEM and incident/event management platforms mentioned in the job description, like Elastic, Microsoft Sentinel, and Splunk. Be ready to discuss your experience with these tools and how you've used them in past roles.

✨Demonstrate Your Investigation Skills

Prepare to showcase your investigative approach by discussing specific incidents you've handled. Highlight how you built timelines, correlated events, and maintained high-quality records. This will show your analytical skills and attention to detail.

✨Stay Calm Under Pressure

Since this role requires working under time pressure, practice answering questions in a calm and structured manner. You might be asked about a time you managed a security incident—be ready to explain how you kept your cool and made effective decisions.

✨Continuous Improvement Mindset

Be prepared to talk about how you've contributed to process improvements in previous roles. Discuss any lessons learned from incidents and how you've implemented changes to enhance detection rules or operational practices. This shows your commitment to quality and growth.

Cyber Security Specialist in Wokingham
LHH
Location: Wokingham

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>