Seriously, this is a once in a lifetime opportunity for a Cyber Security Analyst to work on a complex and high profile client site that has genuine career growth.
We want you to support the Delivery Assurance Team and help deliver an efficient and effective service to a specific set of high profile clients. The primary role will be to conduct monitoring and triage of alerts associated with host and network security events for critical infrastructure. You will support the account through both delivery of client work and adding skills and ideas to the already team with varied strengths.
Role situated on site in Gloucester, London, or Manchester.
Please note that you do need to be eligible for DV Clearance for this role, and cannot start until your DV is granted.
What you'll be doing:
1. Monitor, analyse security alerts and events, conduct initial investigations, and resolve.
2. Raise complex incidents to Senior Analysts.
3. Lead all aspects of SOC Incident queues.
4. Support the maintenance of monitored asset baselines of the customer environments.
5. Prepare reports for clients to both technical and non-technical audiences and continuously improve their content and presentation.
6. Analysis and improvement of detection rules and use cases in line with Mitre Att&ck and threat-informed defence.
What you’ll bring
7. Experience in Security Operations Centre that can be shown.
8. Previous experience in IT service desks.
9. Familiarity and expertise in the Mitre Att&ck Framework.
10. Knowledge of client-server applications,, relational databases, firewalls, VPNs, and enterprise AntiVirus products.
11. Understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP.
12. Ability to read and understand multiple sets of log data – Event Viewer.
13. Cyber security certification ( CompTIA Security+,
14. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications.
It would be great if you had:
15. Programming and scripting such as Python, Perl, Bash, PowerShell, C++.
16. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications.
17. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar.
If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do apply, we’d love to hear from you!
Employment Type: Permanent
Location: Manchester, London OR Gloucester.
Security Clearance Level: Eligible for DV Clearance.
Internal Recruiter: Jane
Salary: To £32K
Benefits: 25 days annual leave with the choice to buy additional days, health cash plan, life assurance, pension, and generous flexible benefits fund.