Security Operations Analyst

Anson McCade
Charing Cross, United Kingdom
8 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior
Compensation
£ 75K

Job location

Charing Cross, United Kingdom

Tech stack

Java
Microsoft Windows
Bash
C++
Cloud Computing Security
Computer Security
Computer Programming
Intrusion Detection and Prevention
Python
Network Security
Linux System Administration
Network Protocols
Security Information and Event Management
Data Logging
Scripting (Bash/Python/Go/Ruby)
Cyber Threat Analysis
SC Clearance
Software Coding
Cyber Warfare
Splunk
Blue Team (Cyber Security)

Job description

£75000 GBP Hybrid WORKING Location: Central London, Greater London - United Kingdom Type: Permanent Senior Cyber Operations Analyst Location: London (hybrid) Salary: Up to £75,000 + on-call compensation We are seeking an accomplished Senior Cyber Operations Analyst to join a high-performing Blue Team operating at the forefront of modern security operations. This is a technical role suited to an experienced analyst with strong engineering instincts, hands-on coding capabilities, and a deep understanding of incident response, detection engineering, and adversary tradecraft. This position includes approximately one week per month of on-call availability for high-priority incident response. Additional compensation is provided, and frequency may vary by client. We are looking for a senior analyst who brings curiosity, technical depth, and a proactive mindset. This role is ideal for someone who has likely grown from an engineering background and can write scripts (Python, Bash) to automate, enhance, and refine detection and response workflows. Experience with Splunk, SIEM operations, cloud endpoints, networks, and detection engineering will be highly advantageous. NOTE: Candidates for this role must be eligible for UK SC Clearance. Key Responsibilities Develop, maintain, and optimise detection content (primarily within Splunk SIEM) to identify threats across cloud, endpoint, and network environments. Collaborate across security functions to identify gaps in logging, alerting, and detection coverage aligned to business risk. Improve SecOps processes by recommending enhanced logging, identifying trends, and driving operational optimisation. Conduct security monitoring, alert triage, and continuous improvement of detection rules (core hours 9:00-17:30 on rotation). Lead and support incident response investigations, ensuring high-quality documentation and escalation. Mentor and support junior analysts, providing guidance, coaching, and technical oversight. Serve as a

Requirements

technical SME on client engagements; present findings and recommendations to senior stakeholders. Participate in alert testing, readiness exercises, and incident response tabletop sessions. Stay current on emerging threat intelligence, attacker techniques, and relevant research. Required Experience & Attributes 3+ years experience as a Cyber Security Operations Analyst Familiarity with threat intelligence frameworks and methodologies Detection engineering and alert development expertise. Strong scripting or programming skills (Python, Bash, C/C++, Java). Solid grounding in cybersecurity fundamentals: network security, cloud security, cryptography, forensics. Understanding of common network protocols and attacker abuse patterns. Awareness of current APT groups and their TTPs. Knowledge of analysis techniques for Windows and/or Linux environments. If you are a technically driven senior analyst ready to advance a modern Blue Team capability, apply today.

Apply for this position