At a Glance
- Tasks: Join our Cyber Security team to monitor and respond to evolving cyber threats.
- Company: Dynamic organisation focused on innovative cyber security solutions.
- Benefits: 26 days holiday, private medical insurance, and performance-based rewards.
- Other info: Hybrid role with excellent career development opportunities and a supportive culture.
- Why this job: Make a real impact in protecting against cyber threats while growing your career.
- Qualifications: Experience in security monitoring and incident response; familiarity with SIEM tools.
The predicted salary is between 40000 - 50000 € per year.
We are seeking a Security Operations Analyst to join our Cyber Security team and play a key role in protecting our organisation from evolving cyber threats. Working as part of a Security Operations Centre (SOC), you will monitor, detect, investigate, and respond to security incidents across our technology estate. Hybrid role requiring 2 days per month onsite in Birmingham, with participation in a 1-in-6 on-call rota working either 7:00am–3:30pm or 9:00am–5:30pm shifts.
Responsibilities
- Monitor and analyse security alerts from multiple tools, including Google SecOps, Microsoft Defender, and Forcepoint, escalating incidents where required.
- Carry out initial and intermediate investigations to assess the severity, scope, and impact of security incidents.
- Perform proactive threat hunting using telemetry and intelligence from SIEM, EDR, and threat intelligence feeds.
- Use automation platforms such as Microsoft Power Automate, Python, or scripting tools to improve investigation and response workflows.
- Assist in developing LLM-based workflows to support security automation use cases including alert enrichment, triage, and documentation.
- Support the configuration, monitoring, and continuous improvement of DLP policies across Microsoft Purview, email, and endpoint channels.
- Contribute to the creation and maintenance of incident response playbooks, procedures, and documentation in line with best practice.
- Work with asset owners to ensure the security tooling inventory remains accurate and effective.
- Maintain high-quality incident records and contribute to post-incident reviews to drive continuous improvement.
- Support wider cyber security initiatives to improve detection, visibility, and response across the organisation.
Qualifications
- Strong foundational experience in security monitoring, incident response, or threat analysis within a SOC or similar environment.
- Hands-on experience with SIEM platforms, ideally Google SecOps (Chronicle) or equivalent.
- Practical experience using automation tools such as Microsoft Power Automate, Python, or PowerShell.
- Awareness of how Large Language Models can be applied in cyber security, including prompt design, data sanitisation, and responsible AI use.
- Understanding of Data Loss Prevention principles, including policy creation, triage, and escalation.
- Familiarity with the Microsoft Defender security ecosystem is highly desirable.
- Strong analytical and problem-solving skills, with attention to detail and a continuous improvement mindset.
- Clear written and verbal communication skills, with the ability to document incidents and collaborate with technical and non-technical teams.
- Relevant certifications such as CompTIA Security+, Microsoft SC-200, or similar are beneficial but not essential.
Benefits
- 26 days’ holiday + bank holidays (and the option to buy more) plus 1 paid volunteering day every year.
- Exceptional family leave, 26 weeks fully paid maternity/adoption, 4 weeks fully paid paternity, 22 weeks fully paid shared parental leave, plus 5 days paid bereavement leave.
- Robust sick pay of up to 13 weeks full pay + 13 weeks half pay.
- 24/7 Employee Assistance Programme for confidential support.
- Private medical insurance for everyone, no medical-history exclusions.
- Performance-based rewards tailored to your role, from company-wide bonuses to OTE and commission structures.
- Income protection: up to 75% salary for 5 years if you ever need it.
- SkillsHub learning platform with leadership pathways, future-manager training, and a huge online library.
- Access to external training and apprenticeships.
- MatchIt! Fundraise for a cause close to your heart and OneAdvanced will match part of the funding.
- Pennies from Heaven donate the pennies from your pay check to help make a difference without lifting a finger.
- ULEV car scheme with 1,000+ models.
- Dental insurance, Health Cash Plan, Critical Illness Cover, Partner Life Cover.
Cyber Security Ops Analyst in Birmingham employer: Limelight Health
Join a forward-thinking organisation that prioritises employee wellbeing and professional growth, offering a hybrid work model in Birmingham. With generous benefits including 26 days of holiday, exceptional family leave, and a robust support system, you will thrive in a collaborative culture that encourages continuous improvement and innovation in cyber security. Our commitment to making a difference extends beyond the workplace, with initiatives like the MatchIt! fundraising programme, ensuring your contributions have a meaningful impact.
StudySmarter Expert Advice🤫
We think this is how you could land Cyber Security Ops Analyst in Birmingham
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field on LinkedIn or at local meetups. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a personal project or contribute to open-source initiatives that showcase your expertise in security monitoring and incident response. This not only builds your portfolio but also demonstrates your passion for the field.
✨Tip Number 3
Prepare for interviews by brushing up on common SOC scenarios and incident response strategies. Practise articulating your thought process during investigations, as this will help you stand out when discussing your experience.
✨Tip Number 4
Don’t forget to apply through our website! We love seeing candidates who are genuinely interested in joining our team. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace Cyber Security Ops Analyst in Birmingham
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Cyber Security Ops Analyst role. Highlight your experience with security monitoring, incident response, and any relevant tools like Google SecOps or Microsoft Defender. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how you can contribute to our team. Be sure to mention any specific projects or experiences that relate to the responsibilities listed in the job description.
Show Off Your Skills:Don’t hold back on showcasing your technical skills! If you've got hands-on experience with automation tools or threat hunting, make sure to include that. We love candidates who can demonstrate their expertise and how they can improve our security operations.
Apply Through Our Website:We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you’ll be able to keep track of your application status. Plus, we love seeing applications come directly from our site!
How to prepare for a job interview at Limelight Health
✨Know Your Tools
Familiarise yourself with the specific tools mentioned in the job description, like Google SecOps and Microsoft Defender. Be ready to discuss your hands-on experience with these platforms and how you've used them in past roles.
✨Showcase Your Problem-Solving Skills
Prepare examples of how you've tackled security incidents or threats in previous positions. Highlight your analytical skills and attention to detail, as these are crucial for a Cyber Security Ops Analyst.
✨Understand Automation
Brush up on automation tools like Microsoft Power Automate and Python. Be prepared to discuss how you've used these tools to improve workflows or incident responses, as this will demonstrate your proactive approach to security.
✨Communicate Clearly
Practice explaining complex security concepts in simple terms. You'll need to collaborate with both technical and non-technical teams, so being able to document incidents and communicate effectively is key.