Senior Cyber Defence Analyst
Role details
Job location
Tech stack
Job description
- Act as an escalation point for complex investigations or potential security incidents.
- Manage the resolution of major incidents in line with agreed incident response plans.
- Respond to urgent security events or incidents out of hours as part of an on-call rota.
- Cover the daily responsibilities of other Cyber Defence Analysts when required, including security alert triage, analysis of phishing reports, and resolution of security requests.
- Identify and implement tuning to support the maintenance of detection use cases.
- Identify, design, and implement new detection use cases.
- Identify, design, and implement new SOAR automation playbooks.
- Develop and review standard operating procedures (SOPs), playbooks, and runbooks.
Requirements
Do you have experience in Time management?, Join the Close Brothers Security and Resilience Team where you will to protect the business form the impact of cyber threats. Working as part of the Security and Resilience team our ideal team member will have previous experience in continuous security monitoring, cyber incident response, detection engineering, threat hunting, automation development, and metric reporting with excellent time management and organisation skills., * Demonstrable experience working in an advanced level 2/3 security analyst role in a security operations centre (SOC) or cyber defence centre (CDC).
- Excellent and up-to-date knowledge of IT infrastructure (hardware, databases, operating systems, networking devices etc) and cyber security controls around them.
- Experience executing cyber response plans.
- Experience with SIEM operation and administration.
- Experience with a variety of cyber security technologies such as EDR, intrusion detection and prevention, email and web filtering.
- Excellent attention to detail by applying quality standards to all tasks undertaken.
- The ability to work independently to fully formulate and assure plans and reports before escalation.
IT IS NOT ESSENTIAL BUT IT WOULD BE GREAT IF YOU HAVE:
- Experience working in a SOC within the financial sector.
- Familiarity with public cloud providers (e.g. AWS; Azure).
- Experience with SOAR technologies, including administration and playbook creation.
- Knowledge of Threat Hunting techniques and processes.
- Knowledge of Digital Forensics techniques and processes.
- Knowledge of industry data security legislations and cyber security law.
- Knowledge of programming languages, such as Bash, PowerShell, JavaScript, and Python.