Cyber Security Analyst

Cyber Security Analyst

Full-Time 40000 - 50000 € / year (est.) No home office possible
Thomas Miller

At a Glance

  • Tasks: Monitor and respond to cyber security threats in real-time using advanced tools.
  • Company: Join a leading firm dedicated to robust cyber security solutions.
  • Benefits: Enjoy hybrid work, competitive salary, and opportunities for professional growth.
  • Other info: Dynamic team environment with hands-on experience in cutting-edge security technologies.
  • Why this job: Make a real difference in protecting digital landscapes while developing your skills.
  • Qualifications: 1-3 years in a SOC role with strong analytical and problem-solving skills.

The predicted salary is between 40000 - 50000 € per year.

Working Arrangements: Monday to Friday 9.30am-5.30pm Hybrid work pattern.

Overall Objective of Role: The Cyber Security Operations Team is a critical component of the Thomas Miller security infrastructure, responsible for monitoring, detecting, and responding to security threats in real time. The team partners with a 3rd party to ensure constant vigilance over the security landscape. The Cyber Security Analyst detects, analyses, investigates and responds to alerts and threats within the environment.

Specific Responsibilities:

  • Monitor security alerts, events, and potential threats using SOC tools.
  • Respond to and investigate cyber security incidents, including malware outbreaks, phishing attempts and data breaches.
  • Perform incident response, including triaging, investigation, and resolution of security incidents.
  • Analyse network traffic, logs, and alerts to detect malicious activity.
  • Conduct root-cause analysis on security breaches and vulnerabilities.
  • Prepare and maintain detailed incident reports and post-incident documentation.
  • Collaborate with other teams to improve overall security posture.
  • Implement and follow standard operating procedures (SOPs) for threat management and incident response.
  • Perform regular vulnerability assessments and recommend remediation.
  • Stay updated with emerging security trends, vulnerabilities, and exploits.
  • Participate in red and blue team exercises to simulate attack and defence scenarios.
  • Collate and distribute monthly Threat Vulnerability Management (TVM) reports to senior stakeholders.

Person Specification:

  • 1-3 years of experience working in a SOC or similar role.
  • Experience with SIEM tools and performing security investigations.
  • Strong understanding of networking concepts, protocols, and security principles.
  • Knowledge of security incident handling, malware analysis, and threat intelligence.
  • Excellent problem-solving skills and attention to detail.
  • Experience with advanced threat detection techniques and tools.
  • Hands-on experience with forensic analysis, malware reverse engineering, or penetration testing.
  • Familiarity with regulatory frameworks (e.g., GDPR, FCA, PCI) and compliance requirements.
  • Strong communication skills with the ability to translate technical details to non-technical stakeholders.

Technical Skills:

  • Experience with SOC tools such as: SIEM (e.g., Splunk, IBM QRadar, ArcSight, Rapid7).
  • Endpoint Detection and Response (EDR) (e.g., CrowdStrike, Carbon Black, SentinelOne, Rapid7).
  • Vulnerability Management tools (e.g., Nessus, Qualys, Rapid7).
  • Threat Intelligence Platforms (e.g., Recorded Future, ThreatConnect).
  • Firewalls and Network Monitoring tools (e.g., Palo Alto, Cisco ASA, Checkpoint).
  • Security Orchestration Automation and Response (SOAR) platforms (e.g., Demisto, Phantom).
  • Experience with Web Gateway and Web Proxy tools (e.g., Netskope, Blue Coat, Zscaler, Forcepoint, Palo Alto).
  • Strong knowledge of operating systems (Windows, Linux) and network protocols.
  • Proficiency in analysing packet captures (Wireshark, TCPDump).
  • Familiarity with scripting languages such as Python, Bash, or PowerShell.
  • Experience with cloud security monitoring (AWS, Azure, GCP).
  • Knowledge of incident management frameworks like NIST, MITRE ATT&CK.

Preferred Qualifications:

  • Certification such as CompTIA Security+.
  • Bachelor's degree in Computer Science, Information Security, or related field.

Cyber Security Analyst employer: Thomas Miller

At Thomas Miller, we pride ourselves on being an exceptional employer, offering a dynamic work environment that fosters collaboration and innovation. Our Cyber Security Analyst role not only provides the opportunity to work with cutting-edge security technologies but also supports professional growth through continuous learning and development. With a hybrid work pattern and a strong commitment to employee well-being, we ensure our team members thrive both personally and professionally in a culture that values diversity and inclusion.

Thomas Miller

Contact Detail:

Thomas Miller Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Cyber Security Analyst

Tip Number 1

Network, network, network! Get out there and connect with professionals in the cyber security field. Attend meetups, webinars, or even local events. You never know who might have a lead on your dream job!

Tip Number 2

Show off your skills! Create a portfolio showcasing your projects, whether it's a personal blog about security trends or a GitHub repository with your scripts. This gives potential employers a taste of what you can do.

Tip Number 3

Don’t just apply blindly! Tailor your approach for each role. Research the company and mention specific tools or techniques they use in your conversations. It shows you're genuinely interested and knowledgeable.

Tip Number 4

Use our website to apply! We’ve got loads of resources to help you prepare for interviews and understand what employers are looking for. Plus, applying directly through us can give you an edge!

We think you need these skills to ace Cyber Security Analyst

Monitoring Security Alerts
Incident Response
Malware Analysis
Threat Intelligence
Network Traffic Analysis
Root-Cause Analysis
Vulnerability Assessments

Some tips for your application 🫡

Tailor Your CV:Make sure your CV is tailored to the Cyber Security Analyst role. Highlight your experience with SOC tools, incident response, and any relevant certifications. We want to see how your skills match what we're looking for!

Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your background makes you a great fit for our team. Keep it concise but impactful – we love a good story!

Show Off Your Skills:In your application, don’t just list your skills – demonstrate them! Mention specific projects or experiences where you’ve used your knowledge of SIEM tools, threat detection, or incident management. We want to see you in action!

Apply Through Our Website:We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you’ll be able to keep track of your application status. Plus, we love seeing applications come directly from our site!

How to prepare for a job interview at Thomas Miller

Know Your Tools

Familiarise yourself with the specific SOC tools mentioned in the job description, like SIEM and EDR platforms. Be ready to discuss your hands-on experience with these tools and how you've used them to detect and respond to security threats.

Showcase Your Problem-Solving Skills

Prepare examples of past incidents where you successfully triaged and resolved security issues. Highlight your analytical skills and attention to detail, as these are crucial for a Cyber Security Analyst role.

Stay Updated on Trends

Research the latest trends in cyber security, including emerging threats and vulnerabilities. Being able to discuss current events in the field will show your passion and commitment to staying informed.

Communicate Clearly

Practice explaining complex technical concepts in simple terms. You'll need to communicate effectively with non-technical stakeholders, so demonstrating your ability to bridge that gap during the interview is key.