At a Glance
- Tasks: Monitor security events, investigate incidents, and support data protection compliance.
- Company: Dynamic tech firm focused on security and privacy operations.
- Benefits: Competitive daily rate, hybrid work model, and opportunities for professional growth.
- Other info: Hands-on role with opportunities to learn advanced detection techniques.
- Why this job: Join a high-performing team and make a real impact in cybersecurity.
- Qualifications: 3+ years in security operations and familiarity with Microsoft security tools.
The predicted salary is between 42000 - 48000 £ per year.
This role plays a key role in the operational management of security and privacy risk across the firm’s technology environment. Working with third party service providers, it ensures the effective operation of threat detection, incident response, data protection controls, and operational workflows supporting UK GDPR compliance.
This is a hands‑on technical role requiring strong analytical skills, attention to detail, and a proactive mindset. The ideal candidate will have practical experience with Microsoft security and compliance technologies, an interest in learning advanced detection and automation techniques, and a desire to contribute to a growing, high‑performing security operations capability.
Key Responsibilities- Monitor security event identification via the third-party security operations service.
- Triage, analyse, and investigate incidents to validate potential threats, anomalies, or policy violations.
- Coordinate incident response activities including containment, evidence collection, documentation, and recovery support.
- Contribute to threat hunting activities using KQL queries and intelligence-led techniques.
- Maintain accurate incident records, ensuring actions and outcomes are logged to a high standard.
- Facilitate security testing and awareness through threat simulations.
- Support the triage and processing of data subject rights (DSR) requests, including subject access requests (SARs).
- Conduct data discovery and collection across systems, ensuring completeness and accuracy.
- Support DPIA processes through data mapping, evidence gathering, and risk assessment input.
- Help maintain and tune Microsoft Defender, Sentinel, and Purview policies, analytics rules, alerts, and workflows.
- Support the development, testing, and maintenance of automated playbooks and response actions (e.g., Logic Apps).
- Verifying compliance with expected practice in the operation of technology services, including security baseline and access right reviews.
- Support vulnerability management by tracking remediation, validating fixes, and assisting with reporting.
- Gather and analyse data to help identify trends, gaps, and areas for control improvement.
- Assist with periodic control reviews, audits, and compliance checks as required.
- Prepare operational reports, dashboards, and metrics for the Team Lead and wider stakeholders.
- Develop and maintain playbooks, runbooks, and procedural documentation.
- Contribute to continuous improvement activities, including identifying opportunities to streamline operations.
- Ensure all actions adhere to internal policies, regulatory requirements, and industry best practice.
- Essential
- 3+ years’ experience working in a security operations, IT security, privacy operations, or related technical role.
- Familiarity with:
- Microsoft Defender XDR
- Microsoft Sentinel (SIEM/SOAR)
- Privacy Management Solutions (e.g. Purview, OneTrust)
- Threat detection and analysis
- Incident response lifecycle
- Vulnerability and exposure management
- Data privacy principles and data subject rights
- SC‑900, SC‑200 (or working toward), AZ‑900, AZ‑500
- CISSP, CIPP/E, CompTIA Security+
- Foundation‑level data privacy certifications (e.g., BCS Certificate in Data Protection)
Security Analyst in London employer: Norton Blake
Contact Detail:
Norton Blake Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Analyst in London
✨Tip Number 1
Network like a pro! Reach out to folks in the security field on LinkedIn or at industry events. A friendly chat can open doors that a CV just can't.
✨Tip Number 2
Show off your skills! If you’ve got experience with Microsoft Defender or KQL queries, make sure to highlight that in conversations. Practical examples of your work can really impress.
✨Tip Number 3
Prepare for interviews by brushing up on common security scenarios. Think about how you’d handle incidents or improve processes. We want to see your proactive mindset in action!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are keen to join us directly.
We think you need these skills to ace Security Analyst in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Security Analyst role. Highlight your experience with Microsoft security technologies and any relevant projects you've worked on. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about security operations and how your background makes you a great fit. Don’t forget to mention any hands-on experience you have with incident response or threat detection.
Show Off Your Analytical Skills: Since this role requires strong analytical skills, make sure to include examples of how you've used these in past roles. Whether it's analysing logs or conducting data discovery, we want to see your thought process and problem-solving abilities!
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you’ll be able to keep track of your application status. Plus, we love seeing applications come directly from our site!
How to prepare for a job interview at Norton Blake
✨Know Your Tech Inside Out
Make sure you brush up on your knowledge of Microsoft security and compliance technologies. Be ready to discuss your hands-on experience with tools like Microsoft Defender, Sentinel, and Purview. They’ll likely want to hear about specific incidents where you’ve used these tools effectively.
✨Show Off Your Analytical Skills
Prepare to demonstrate your analytical skills during the interview. Think of examples where you've triaged or investigated incidents, and be ready to explain your thought process. Use the STAR method (Situation, Task, Action, Result) to structure your responses.
✨Get Familiar with KQL Queries
Since this role involves threat hunting using KQL queries, it’s a good idea to practice writing some before your interview. You might be asked to solve a problem or analyse a scenario using KQL, so being comfortable with it will give you an edge.
✨Understand GDPR and Compliance
Brush up on UK GDPR compliance and data privacy principles. Be prepared to discuss how you’ve handled data subject rights requests or contributed to DPIA processes in the past. Showing that you understand the regulatory landscape will impress your interviewers.