Cybersecurity Analyst
Role details
Job location
Tech stack
Job description
At Healix International, cybersecurity is critical to protecting our people, clients, and operations. We're looking for an experienced Cybersecurity Analyst to play a key role in identifying, assessing, and mitigating cyber threats across our operational systems.
Working closely with senior technology and risk leaders, you'll take a proactive, hands-on approach to safeguarding our infrastructure, supporting incident readiness, and strengthening our cybersecurity posture as the threat landscape continues to evolve.
This is a role for someone who enjoys combining deep technical expertise with collaboration, influence, and continuous improvement., What you'll be doing
In this role, you will:
- Perform ongoing cybersecurity threat assessments across operational systems, working closely with the Group CTO, Head of IT Operations, Infrastructure teams and Solution Architects
- Design, plan and implement effective mitigations in partnership with the wider IT function
- Work with the Chief Risk Officer's team to meet cybersecurity risk management requirements
- Monitor emerging threats and evaluate new technologies to protect against them
- Ensure automated monitoring and detection capabilities are in place
- Develop and maintain incident response playbooks and lead their execution during simulations and real incidents
- Liaise with third-party security providers during hostile incursions where required
- Advise on non-technical controls and organisational changes to improve overall security
- Contribute to security awareness training and initiatives across the business
- Participate in security architecture reviews and advise on secure design principles
- Contribute to monthly infosec workshops, penetration test reviews, and red/blue team exercises
- Assess and manage third-party and supply chain cybersecurity risks
- Develop and report security metrics and KPIs to demonstrate risk reduction and programme effectiveness
- Support business continuity and disaster recovery planning from a cybersecurity perspective
- Stay up to date with relevant legal, regulatory, and compliance requirements
Requirements
Experience & background
- Minimum 5 years' experience in cybersecurity or information security roles
- Strong experience working with frameworks such as Cyber Essentials, CIS Benchmarks, and familiarity with NIST and ISO27001
Technical expertise
- Solid understanding of network protocols, operating systems, and security technologies
- Experience implementing and operating SIEM and SOAR platforms
- Familiarity with threat intelligence frameworks (e.g. MITRE ATT&CK, Cyber Kill Chain)
- Exposure to AI-driven threat detection (e.g. Darktrace), DLP, and M365 security tooling (e.g. Purview)
- Knowledge of backup, disaster recovery, and business continuity solutions
- Beneficial exposure to DevSecOps practices and tools
Tools & technologies
- Experience with tools such as: Qualys, Microsoft Defender, Splunk, SolarWinds, Kubernetes, PowerShell, Python, Azure/AWS, Windows Server, Linux, New Relic, HashiCorp, Zerto, and Jira
Key skills
- Ability to communicate complex security concepts clearly to non-technical stakeholders
- Strong problem-solving and troubleshooting skills
- Excellent organisation skills, with the ability to manage multiple priorities and deliver to agreed timescales, * CISSP certification (or equivalent such as CISM, CEH, or GIAC), * Proven cybersecurity experience - 5+ years in a cybersecurity or information security role, protecting complex operational environments
- Strong technical security expertise - hands-on experience with threat detection, SIEM/SOAR, monitoring, and incident response
- Framework-led security mindset - working knowledge of Cyber Essentials, CIS benchmarks, and recognised security frameworks
- Clear communicator & collaborator - able to explain complex security risks and controls to non-technical stakeholders
- Industry certifications - CISSP or equivalent (CISM, CEH, GIAC)
Desired criteria
- Modern security tooling exposure - experience with AI-driven detection, DLP, M365 security platforms or cloud environments
- Broader security lifecycle experience - exposure to DevSecOps, red/blue team exercises, or third-party risk management