Senior Cyber Security Analyst

Rsg Plc
Wokingham, United Kingdom
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior
Compensation
£ 65K

Job location

Wokingham, United Kingdom

Tech stack

Computer Security
Query Languages
Intrusion Detection and Prevention
Kusto Query Language
Security Information and Event Management
Cyber Threat Analysis
Build Management
Microsoft Sentinel
Kibana
Splunk

Job description

We're supporting a major organisation operating within a Critical National Infrastructure (CNI) environment to hire a Senior Cyber Threat Hunter Specialist. This is a hands-on, high-impact role embedded within a mature Security Operations Centre, focused on protecting essential services.

The Opportunity

You'll play a key role in real-time threat detection and response, working across a complex enterprise environment. This position combines SOC operations, threat hunting, and continuous improvement, giving you the chance to influence detection capability and response maturity.

What You'll Be Doing

Monitoring & Triage

Analyse and triage security alerts using SIEM platforms

Correlate events and identify patterns across multiple data sources

Assess severity, scope, and business impact

Investigation & Analysis

Conduct detailed investigations across endpoint, network, identity, and log data

Build evidence-led timelines and document findings clearly

Apply forensic principles (process activity, persistence, lateral movement)

Incident Response

Manage incidents from detection through to escalation

Support containment and mitigation activities where required

Ensure high-quality handover to incident response teams

Continuous Improvement

Develop and tune detection rules to improve accuracy

Feed into post-incident reviews and enhance SOC processes

Contribute to documentation, playbooks, and operational standards

Requirements

Strong experience within a SOC / CSOC environment

Hands-on expertise with SIEM tools (e.g. Microsoft Sentinel, Splunk, Elastic)

Experience with query languages such as KQL / ES|QL / Kibana

Solid understanding of threat detection, IOCs, and attacker TTPs

Proven experience across the full incident lifecycle

Clear and structured communication skills, especially under pressure

Desirable:

Experience with Elastic

Relevant certifications (e.g. GIAC, SANS or equivalent)

Apply for this position