and processes, mentoring the SOC team, and managing OT alerts and incidents. The ideal candidate will have a deep understanding of SecOps, IT, and OT environments, with responsibilities including incidentmanagement, threat detection, and security improvement. Strong communication skills are essential for collaboration with cross-functional teams. Key Responsibilities Contextualise OT Specific Threats: Understand OT estate, threats, and … like Claroty; build relationships with Operations teams. Maintain Security Operations: Improve security processes; support tools like Microsoft Sentinel, SOAR, EDR/XDR, and PAM; reduce alert fatigue and improve incident resolution times. Proactive Risk Remediation: Identify and evaluate risks; perform threat hunting; demonstrate risk reduction metrics. Incident Readiness & Response: Lead incident triage and response; reduce business impact … educate staff on incident procedures. Continuous Improvement: Drive process automation and efficiency; track improvements via KPIs and dashboards. Key Relationships CISO, Operational Technology Teams, IT Operations, Security Operations Manager, Security Architecture Manager, Cyber Security Programme Manager, Cyber Resilience Manager, Network Operations Manager, Business Change and Engagement, Key Business Stakeholders, Service Owners. Candidate Requirements Essential Experience Minimum 3 years in More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
defences by maintaining and optimising security operations tools and processes. You'll focus on monitoring, analysing, and responding to cyber threats, while supporting the SOC team and ensuring effective incidentmanagement across the business. Your role will involve collaborating with technology and business stakeholders, investigating security alerts, enhancing tooling performance, and supporting the delivery of continuous improvement and … to readiness for significant incidents and play a key role in proactive threat hunting and compliance reporting. What you'll be doing as a Senior Cyber Security Analyst: Security Incident Response : Investigate security alerts from SIEM and third-party MSSPs, triage and respond to incidents, and support root cause analysis to drive remediation. Stakeholder Engagement : Work closely with technology … alert tuning and automation. SOC Support & Escalation : Act as a key contact and escalation point for the SOC team, providing guidance and mentoring to support operational effectiveness. On-Call & Incident Readiness : Participate in a 24/7/365 on-call rota with MSSP partners, supporting out-of-hours investigations and maintaining incident readiness. Threat Hunting & Continuous Improvement More ❯
health, performance, and stability, proactively resolving issues to meet SLAs. Issue Resolution: Respond to user enquiries and tickets, diagnose technical problems, and collaborate with IT teams to resolve them. IncidentManagement: Maintain and close incident records within SLA timelines, lead complex troubleshooting, and support problem management to prevent reoccurrence. Customer Support: Deliver effective, high-quality support More ❯