Cyber Security Analyst
Role details
Job location
Tech stack
Job description
Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which typically requires 5 years continuous UK address history usually including no periods of 30 consecutive days or more spent outside of the UK and declaration of being a British passport holder with no dual nationalism at the point of application. Note: The above information relates to a specific client requirement Our Cyber Practice is a fast-growing community of industry leading experts. The practice covers Assurance, Compliance, Security Operations (SecOps), Offensive Security and Security Research. It is critical that the relevance and quality of the services that we provide is maintained and augmented and that the team members have every opportunity to grow and learn with the organisation. As part of our Blue Team, you'll use the latest intelligence and tooling to analyse information systems to ensure effective incident detection and response. If you are looking to make your mark on a rapidly growing SecOps team with some very exciting clients, look no further. We are searching for a passionate and enthusiastic Cyber Security Analyst to join our Blue Team. The ideal candidate will be a self-starter with an inquisitive nature and a keen interest when it comes to technical cybersecurity topics such as threat hunting, attacker tactics and techniques, monitoring and alerting, threat intelligence, and incident readiness and response. Key responsibilities of the role are summarised below: Security monitoring and incident response Detection engineering - Develop, maintain, and enhance security detection content primarily for the Splunk SIEM, to enable the detection of threats across diverse platforms (e.g. cloud, endpoints, and networks) Use frameworks like MITRE ATT&CK to map detection rules and maximise threat coverage Use analytical platforms to query high volume datasets to identify trends and spot unusual behaviours, indicative of malicious activity Proactive threat hunting using available client data Collection and/or interpretation of different sources of threat intelligence Incident response Automation of SecOps processes using scripting
Requirements
The successful candidate should have experience in some of the following areas: Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Knowledge of the most prevalent APTs and their TTPs Ability to understand client-specific challenges and tailor solutions accordingly Commitment to staying abreast of emerging threats, technologies, and methodologies in cybersecurity Creative and resourceful in finding solutions to complex cyber challenges Knowledge of common analysis techniques associated with Windows and/or Linux Experience with Scripting and Programming - e.g. Python/Bash/c/c++/Java
Benefits & conditions
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process.