Senior Cyber Operations Analyst
Salary: £65,000-£70,000 + bonus & benefits
Location: London – Hybrid (4-on, 4-off)
Newly created role with one of the most reputable Banks in the world who have arguably the most advanced Cyber Defence capability of any organisation worldwide; and are looking to bring in an experienced Senior Cyber Operations Analyst to monitor and respond to some of the most advanced threat actors out there, from their London HQ.
The volume and sophistication of threats they witness is incomparable with any other company you will come across; ranging from nation-state sponsored attacks to the most prevalent ransomware groups. You’ll be working alongside and learning from some of the most renowned cyber security professionals responding to incidents, investigating novel threat actors and defending the bank.
This is an incredibly opportunity for an experienced SOC Analyst (3+ years) to join an elite team of Cyber Defence Specialists, get access and exposure to some of the most sophisticated threat actors out there and genuinely develop your career within one of the most reputable banks worldwide.
Senior Cyber Operations Analyst – Key Responsibilities:
* Lead the investigation and response for escalated security incidents, performing in-depth analysis and coordinating containment and mitigation strategies.
* Conduct proactive threat hunting using network traffic, behavioural patterns, threat intelligence, and security telemetry.
* Utilise and fine-tune SIEM tools such as Splunk, leveraging advanced queries and dashboards to identify anomalies.
* Collaborate closely with global security teams, threat intelligence units, and stakeholders to improve detection and response playbooks
Senior Cyber Operations Analyst – Requirements:
* Strong proficiency with SIEM platforms, ideally Splunk, including custom query writing and dashboard development.
* Deep understanding of incident response, including network traffic analysis, PCAP investigation, and forensic techniques.
* Familiarity with attack frameworks such as MITRE ATT&CK, and ability to recognise TTPs in real-world data.
* Demonstrated experience analysing logs and alerts across varied data sources (network, endpoint, IDS/IPS).
If you are excited by the opportunity to work in one of the strong cyber defence outfits, meet the above requirements and able to commute to the London HQ 2-3 times per week then apply or reach out directly.