Closing Date: 2026-05-22
Job Title
Cyber Security Analyst
Location
Durrington, hybrid
Contract Type
Permanent
Hours
37 hours per week
Salary
salary to be discussed at screening stage
Overview
As a Cyber Security Analyst, you will play a critical role in safeguarding both our digital and operational technology (OT) environments. Youll lead investigations, own incident response actions, and drive improvements across our cyber monitoring capability. This is a hands‑on, high‑impact role where your expertise will directly strengthen the security of essential services relied upon by millions.
Working alongside our Senior Cyber Analysts, SOC partners, Digital teams and OT Operations, youll help shape how we detect, respond to and learn from emerging threats and contribute to the continual uplift of our cyber maturity across the enterprise.
Responsibilities
You will be responsible for:
* Lead proactive security monitoring and threat detection across IT and OT environments, making autonomous prioritisation and response decisions.
* Own cyber incident investigations, from initial triage through to containment recommendations and coordinated remediation.
* Manage digital forensics activities, ensuring data integrity, compliance and high‑quality executive and technical reporting.
* Enhance monitoring platforms, rules, playbooks and SOC tooling to continually strengthen our defence posture.
* Support organisation‑wide awareness, learning, and capability development in DFIR and threat detection.
Additional Requirements
* Work across critical infrastructure, IT and OT environments as part of incident response and monitoring cycles.
* Engage with regulated frameworks and expectations including ISO 27001, NIST CSF and CAF v4.
* May be required to support out‑of‑hours incident handling depending on operational need.
What Youll Bring
Essential
* Advanced understanding of cyber security principles, monitoring tools and incident response methodologies.
* Experience with SIEM and EDR platforms such as LogRhythm, Microsoft Defender for Endpoint or CrowdStrike.
* Strong capability in triage, investigation and root‑cause analysis of cyber incidents.
* Solid grounding in network, endpoint and identity security fundamentals.
* Educated to degree level (or equivalent experience) with 3‑7 years’ experience in cyber operations, SOC analysis or DFIR.
* Strong understanding of vulnerabilities, exploits and remediation approaches.
Desirable
* Recognised industry certifications (e.g., GCIH, GCFA, GCFE, CEH, Security+, GIAC).
* Exposure to incident handling, forensic investigation or critical infrastructure environments.
* Experience with scripting or automation (PowerShell, Python).
* A proactive, curious and analytical mindset, with strong communication and accuracy in documentation.
Commitment to Diversity
We welcome applicants from all backgrounds, identities, and experiences. We do not discriminate based on race, ethnicity, gender, sexual orientation, age, disability, religion, or any other protected characteristic. If you need reasonable adjustments during the recruitment process, please let us know.
J-18808-Ljbffr