Security Operations Analyst
Role details
Job location
Tech stack
Job description
Charles Taylor is looking for a Senior Security Operations Analyst on a 12 months fixed term contract that will complement our existing team, and who will be responsible for performing real-time analysis and security alert investigation for both on-prem and Cloud environments. The ideal candidate will assist in the delivery of key security initiatives and activities and provide excellent client service while evaluating the type and severity of security events and resolve issues by taking the appropriate corrective action.
Success in this role requires a 'can do' attitude and positive engagement with senior management that concentrates on delivering transparent non-disruptive security solutions to enable the business to secure clients, to grow and to innovate rapidly and securely.
This role can be performed remotely but occasional travel to London office every 3-6 months might be required., * Identify, triage, and respond to security events in a timely manner with consideration to criticality and urgency and support the security operations function during all security related incidents.
- Provide 2^nd and 3^rd line incident response and analysis and support the security operations function during security related incidents with timely escalation, and drive to ensure the closure of incidents.
- Working semi-independently, undertaking information security engagements including working co-ordination (client interaction, deliverables, work plans, escalations etc.)
- Maintain information security controls and processes as part of a global SOC team (UK and Asia).
- Provide clear, organised findings, and recommendations, and tracking progress towards resolution and risk mitigation.
- Identify control gaps/weaknesses within existing business and new business and take part in remediation activities with direction and support from the management.
- Support the Security Operations Manager in the execution of their duties and assist in successful delivery of the cyber security strategy.
- Identify control gaps/weaknesses within existing business and new business and taking ownership for remediation activities with direction and support from the Security Operations Manager.
- Producing high-quality presentations and management reports, and metrics for technical and non-technical audiences.
- Maintain awareness of developments in the information security industry.
- Work semi-independently, liaising with other team members across CT, producing high quality oral and written work product and presenting complex technical matters clearly and concisely.
- Carry out Ad Hoc duties and tasks that are allocated to you at the discretion of management and that are within your capabilities and within the scope of your post.
- Demonstrate and champion Charles Taylor Values by ensuring Agility, Integrity, Care, and Accountability and Collaboration.
Requirements
- Advanced understanding of Operating System and Networking fundamentals alongside OS Security (Windows & Linux) and Network Security best practices (perhaps with a home lab you use to learn more).
- Advanced hands-on experience with centrally managed information security tools such as Anti-Virus, EDR, SIEM or SOAR, ideally Azure Sentinel, MS Defender, Active Directory and Entra ID.
- Good knowledge of a scripting language such as Python or PowerShell and some experience of using it to automate aspects of Security Operations.
- Perform log analysis from a variety of sources to identify potential threats.
- Perform security incident root cause analysis and drive implementation of containment and mitigation strategies.
- Experience investigating and responding to both external and insider threats.
- Experience with attacker tactics, techniques, and procedures.
- Experience in threat hunting including the ability to leverage intelligence data to proactively identify and iteratively investigate suspicious behavior across networks and systems.
- Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development.
- Good ability to configure alerts for Microsoft security technologies (e.g., Azure Sentinel, MS Defender)
- Good familiarity with Cloud Security (ASW/Google/Azure)- Azure Cloud, Microsoft Defender, M365 E5, and/or Azure Sentinel would be advantageous.
- Good analytical and problem-solving skills, ability to think laterally about complex problems.
- Good knowledge of common adversary tactics and techniques as well as interest in emerging threats.
- Good ability as a team player and having the capability to expand/adapt your skills in fast-paced ever-changing industry.
- Basic understanding of traditional ITIL concepts i.e., Incident, Change and Problem management.
- Certifications relating to IT or Information Security- degree, certifications, or extended experience
- Up to 3 years of professional experience in IT or Information Security, ideally Security Operations.
- Proven passion for information security and technology, and evidence of continuous learning