Senior Security Analyst

Arthur
Charing Cross, United Kingdom
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior
Compensation
£ 90K

Job location

Charing Cross, United Kingdom

Tech stack

Microsoft Access
Microsoft Windows
Amazon Web Services (AWS)
Azure
Bash
Cloud Computing Security
Continuous Integration
Linux
Digital Forensics
Github
Identity and Access Management
Intrusion Detection Systems
Python
Network Security
Log Analysis
Microsoft Security Essentials
Open Web Application Security
Powershell
Azure
Ansible
Security Information and Event Management
Software Vulnerability Management
Scripting (Bash/Python/Go/Ruby)
Google Cloud Platform
Office365
Mitre Att&ck
Firewalls (Computer Science)
Gitlab
Performance Monitor
Microsoft Sentinel
Terraform
Operating System Security
Jenkins
Vulnerability Analysis

Job description

  • Lead investigations, triage and containment using SIEM/EDR (Microsoft Sentinel preferred)
  • Harden IAM, PIM/PAM, Windows/Linux, endpoint baselines and identity services
  • Strengthen M365 security: Defender for Endpoint/O365/Identity, Conditional Access, Identity Protection
  • Improve detection rules, analytics, baselines and security automation
  • Run vulnerability scanning using tools like Tenable, Pentera, Varonis, Secure Score
  • Support compliance work (ISO 27001, Cyber Essentials, NIST, SOC2)
  • Contribute to threat hunting, threat intelligence application and proactive monitoring
  • Support operational resilience: scenario testing, DR exercises, post-incident reviews
  • Assist with security tooling assessments (including AD hardening tools)

Requirements

We're hiring a hands-on Senior Security Analyst/Security Engineer to strengthen a Microsoft-centric security posture across detection, response, tooling, and infrastructure hardening. Not a one-lane SOC role. Not governance-heavy. This role blends incident response with security engineering and hardening and ideal for someone with 4-5 years' experience who wants real technical ownership and variety across the full defensive life cycle., Security Engineering & Hardening

  • IAM, PIM/PAM, identity life cycle, access hardening
  • OS security hardening (Windows + Linux)
  • Network security concepts (Firewalls, IDS/IPS)

Incident Response & Detection

  • Hands-on IR: triage investigation containment recovery
  • Experience with SIEM (Sentinel strongly preferred)
  • Experience with EDR/XDR tools: Defender/CrowdStrike/SentinelOne
  • Log analysis, packet captures, forensic investigation fundamentals

Microsoft Security

  • Defender suite: Endpoint, O365, Identity
  • Azure AD/Entra ID security
  • Conditional Access, M365 identity protection signals
  • M365 Secure Score remediation

Vulnerability Management

  • Tools such as Tenable, Pentera, Varonis, Secure Score
  • Experience coordinating remediation with technical teams

Frameworks & Security Models

  • MITRE ATT&CK, OWASP Top 10
  • Exposure to zero-trust principles
  • Understanding of encryption, certificate management, secrets management

Scripting & Automation

  • PowerShell (essential)
  • Python or Bash desirable
  • Security automation experience (policy enforcement, scanning, rule tuning)

Experience Level

  • 4-5 years in SecEng/SOC/IR roles
  • Experience in regulated environments beneficial but not essential

Nice to Haves (Not Essential but a Bonus)

  • Terraform/Ansible (desirable, not required)
  • Cloud security exposure (Azure, AWS, GCP)
  • Threat Intel platform experience
  • Experience tuning SIEM/SOAR playbooks
  • CI/CD pipeline security (GitHub Actions, Jenkins, GitLab)
  • Digital forensics knowledge
  • Certifications: Security+, CySA+, GCIH, GCIA, CISSP, CISM, OSCP, CCSP

If you're looking for a role where you can respond to real threats, engineer lasting fixes, and shape security standards, reach out for a confidential conversation

Apply for this position