24 x 7 Security Analyst

24 x 7 Security Analyst

Full-Time 28800 - 43200 € / year (est.) No home office possible
L

At a Glance

  • Tasks: Monitor security incidents and respond to threats in real-time.
  • Company: Join a leading global assurance provider focused on security and sustainability.
  • Benefits: Competitive salary, flexible hours, and opportunities for professional growth.
  • Other info: Diverse and inclusive culture with a focus on collaboration and community.
  • Why this job: Be part of a dynamic team making a real impact in cybersecurity.
  • Qualifications: Experience in incident management and proficiency in security tools required.

The predicted salary is between 28800 - 43200 € per year.

This role reports to the SOC Team Lead. As the SOC Analyst, you will be accountable for the effective delivery of your tasks, ensuring expected performance standards while continuously developing your skills as part of a high‑trust, high‑performing security service. You will leverage your experience in security operations to enable the smooth delivery of our award‑winning defensive monitoring service, supporting proactive detection and response for clients across the globe.

You will be expected to contribute hands‑on, technically where and when needed, including deep‑dive investigations, supporting incident response, threat hunting, tuning detections, and, if required, delivering technical training to new starters. You must proactively initiate actions, work independently, mitigate threats quickly, set an example, maintain operational continuity, make informed decisions, and ensure efficient delivery of tasks under pressure.

  • Analyst & Operations Oversight: Perform day‑to‑day activities of SOC analysts across all shifts. Ensure all alarms/cases are reviewed and responded to within the predefined SLA. Maintain and keep documentation up to date (including design specifications, diagrams and process documentation). Complete all HALO case files on time with accurate and timely data/results. Aim to ensure high‑quality incident triage and investigation following predefined and agreed SOC processes. Coordinate with other shifts to maintain operational continuity and consistent processes.
  • Key Performance Indicators, Service Level Agreements & Reporting: KPIs are goals that must be achieved to demonstrate satisfactory or above performance for this job role. KPIs will be monitored on an ongoing basis throughout each year and explored further as part of the performance management process. Service KPIs/SLAs and deliverables are tracked, adhered to and deviations remediated through root‑cause analysis and non‑conformance.
  • Threat Detection: Review real‑time alerts and telemetry to identify suspicious activity or breaches. Analyse logs, network flows and endpoint data to validate alerts and understand threat context. Maintain and tune SIEM/SOAR correlation rules and endpoint detection signatures to reduce false positives and improve coverage. Triage and investigate unusual events to confirm incidents or dismiss benign anomalies.
  • Threat Hunting: Perform hypothesis‑driven threat hunts across multiple client networks using telemetry, threat intelligence and the MITRE ATT&CK framework. Identify weak spots or blind spots in monitoring coverage and recommend new rules, queries or sensors to close them. Analyse Indicators of Compromise (IOCs) and emerging threat data to discover stealthy intrusions, document hunting methods, findings and update detection content as needed. Use advanced analytics in SIEM/SOAR and EDR to dig deeper than automated alerts, leveraging both in‑house and public threat intelligence.
  • Management Reports: These reports are written on a monthly, bimonthly and quarterly basis. The production of reports is a shared responsibility between senior and junior analysts. When a report is prepared by a SOC analyst, it must be reviewed for quality assurance by a senior analyst or the SOC team lead before sharing with the client. Due to the usual workload, the production of management reports is generally completed by the night shift, with support from the day shift when operationally feasible.
  • Incident Handling & Escalation: Oversee detection, validation and containment of security incidents/alerts. When required, provide technical guidance during live incidents and ensure appropriate escalation.
  • Quality Assurance & Process Improvement: Identify and eliminate false positives by creating new fine‑tuning detection rules in collaboration with team leads and engineering. Recommend improvements to XDR/SIEM/SOAR configurations and workflows.
  • Reporting & Communication: Communicate important incidents to the cybersecurity leadership team as needed. Maintain clear documentation of incidents, lessons learned and operational notes.
  • Training & Mentoring: Support training for new SOC analysts, helping them grow technically and operationally.
  • Compliance & Governance Support: Ensure analysts follow LRQA Cybersecurity established security policies, procedures, and SLAs. Align SOC practices with frameworks (e.g., ISO 27001 & MITRE ATT&CK). Ensure incident documentation meets regulatory and audit requirements.
  • Collaboration: Work closely with Threat Intelligence, Vulnerability Management and Incident Response teams to enhance detection capability. Collaborate with IT operations and network teams for containment and recovery actions. Maintain regular verbal and written communication with customers, suppliers and internally as required.
  • Client Success: Client feedback is actively encouraged and serves as a key measure of success. Positive feedback reflects our achievements, while suggestions or complaints are reviewed with management to assess potential inclusion in service improvements.
  • Experience & Qualifications: Experience supporting incident management. Proficient in SIEM, EDR, XDR, EPP and NetMon tools, including usage, configuration and rule creation. Skilled in analysing log data across multiple device types to support incident management. In‑depth understanding of attack vectors, with the ability to distinguish normal from abnormal activity and recommend countermeasures and remediation. Proven experience working in complex, high‑performing enterprise SOC/MSSP environments. Familiarity with offensive tools, techniques and vulnerabilities, including Kali, Metasploit, Veil, MITRE ATT&CK, CVE and OWASP frameworks.
  • Core Soft Skills & Emotional Intelligence: Strong soft skills, including effective communication, collaboration and emotional intelligence, enabling clear stakeholder engagement and the ability to manage high‑pressure situations with composure.

Diversity and Inclusion at LRQA: We are on a mission to be the place where we all want to work and we are passionate about embracing different perspectives because we understand the value this brings to our business, our clients and each other. We are all about creating a safer and more sustainable future and our inclusive culture is right at the heart of our business. Together our employees make our communities better and we want you to be part of our diverse team! LRQA is a leading global assurance provider. The integrity and expertise we bring to our partnership with clients support their journey to a safer, more secure and more sustainable future.

24 x 7 Security Analyst employer: LRQA Group Limited 2021

At LRQA, we pride ourselves on being an exceptional employer, offering a dynamic work culture that fosters continuous learning and professional growth. As a 24 x 7 Security Analyst, you will be part of a high-performing team dedicated to delivering top-notch security services globally, with opportunities for hands-on involvement in incident response and threat hunting. Our commitment to diversity and inclusion ensures a supportive environment where every employee's perspective is valued, making LRQA not just a workplace, but a community focused on creating a safer and more sustainable future.

L

Contact Detail:

LRQA Group Limited 2021 Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land 24 x 7 Security Analyst

Tip Number 1

Network like a pro! Get out there and connect with folks in the cybersecurity field. Attend meetups, webinars, or even online forums. You never know who might have the inside scoop on job openings or can give you a leg up.

Tip Number 2

Show off your skills! Create a portfolio that highlights your experience with SIEM, EDR, and incident management. Include case studies or examples of how you've tackled security challenges. This will make you stand out when it comes to interviews.

Tip Number 3

Practice makes perfect! Prepare for technical interviews by brushing up on your knowledge of threat hunting and incident response. Use mock interviews to get comfortable discussing your experience and problem-solving skills under pressure.

Tip Number 4

Apply through our website! We love seeing candidates who are genuinely interested in joining our team. Make sure to tailor your application to highlight how your skills align with our mission and values. Let's make cybersecurity safer together!

We think you need these skills to ace 24 x 7 Security Analyst

Security Operations
Incident Response
Threat Hunting
SIEM
EDR
XDR
Log Analysis

Some tips for your application 🫡

Tailor Your Application:Make sure to customise your CV and cover letter to highlight your relevant experience in security operations. We want to see how your skills align with the role of a SOC Analyst, so don’t hold back on showcasing your expertise!

Show Off Your Technical Skills:Since this role involves hands-on technical work, be sure to mention your proficiency with SIEM, EDR, and other tools. We love seeing candidates who can dive deep into investigations and have a solid understanding of threat detection.

Keep It Clear and Concise:When writing your application, clarity is key! Use straightforward language and avoid jargon unless it’s relevant. We appreciate well-structured applications that are easy to read and get straight to the point.

Apply Through Our Website:We encourage you to submit your application through our website. It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it’s super easy to do!

How to prepare for a job interview at LRQA Group Limited 2021

Know Your Tools Inside Out

Make sure you’re well-versed in the tools mentioned in the job description, like SIEM, EDR, and XDR. Familiarise yourself with their configurations and how to create detection rules. Being able to discuss your hands-on experience with these tools will show that you’re ready to hit the ground running.

Demonstrate Your Problem-Solving Skills

Prepare to share specific examples of how you've handled security incidents in the past. Think about times when you had to make quick decisions under pressure or when you identified a threat and took action. This will highlight your ability to mitigate threats effectively.

Show Off Your Communication Skills

Since this role involves collaboration with various teams, practice articulating complex technical concepts in simple terms. Be ready to explain how you would communicate important incidents to stakeholders and how you’ve done this in previous roles.

Be Ready for Technical Questions

Expect to dive deep into technical scenarios during your interview. Brush up on the MITRE ATT&CK framework and be prepared to discuss how you would approach threat hunting or incident response. Showing your analytical thinking and understanding of attack vectors will impress the interviewers.