Senior Cyber Operations Analyst
Senior Cyber Operations Analyst (Associate Manager)
Locations: London | Manchester | Bristol
Salary: Up to 75,000 + excellent package
Clearance: BPSS + SC clearance (or Eligible)
Are you an experienced Cyber Security Operations specialist looking to step into a senior role within a high‐growth, high‐impact cyber practice?
We’re supporting a top‐tier consulting organisation (name anonymised) that is expanding its Blue Team and looking for a technical, curious and detail‐driven Senior Cyber Operations Analyst to join their team.
This is a fantastic opportunity to work with cutting‐edge tooling, contribute to threat‐driven defensive security, and shape advanced SecOps capabilities across enterprise environments.
About the Role
As a Senior Cyber Operations Analyst at Associate Manager level, you’ll sit at the heart of a thriving Cyber Practice covering Assurance, Compliance, SecOps, Offensive Security and Research.
You’ll play a pivotal part in threat detection, incident response, detection engineering, and security monitoring — helping defend major UK organisations.
This role is perfect for someone who thrives in technical depth, enjoys problem‐solving, and wants to contribute to a mission‐driven cyber defence team.
Key Responsibilities
You will:
- Develop, maintain and enhance detection content (primarily for Splunk SIEM) across cloud, endpoint and network platforms
- Identify detection gaps, log ingestion issues and alert improvements
- Review and uplift existing SecOps standards, logging maturity, BAU monitoring and threat‐led optimisation
- Perform day‐to‐day security monitoring, alert triage and incident response (9am–5:30pm rota)
- Investigate cyber security incidents and provide technical leadership during escalations
- Mentor junior analysts through shadowing and hands‐on guidance
- Act as a technical SME during client engagements, including presenting to senior stakeholders
- Participate in alert testing, IR tabletop exercises, and readiness assessments
- Stay up to date with emerging intelligence, attacker behaviours and evolving threat landscapes
Additional (client‐dependent) responsibilities may include:
- Proactive threat hunting
- Incident response playbook development
- Threat intelligence research
- Vulnerability scanning & reporting
- Internal (consultancy) and external (client‐side) leadership opportunity
On‐call requirement: approx. 1 week per month for high‐priority incidents (additional compensation provided).
What We’re Looking For
Not every box needs to be ticked — but strong candidates will bring experience across areas such as:
- Threat intelligence models (Pyramid of Pain, IPCE, TI lifecycle)
- Detection engineering & alert development
- Scripting skills (Python, Bash, C/C++, Java)
- Core cybersecurity fundamentals: network, cloud, cryptography, forensics
- Understanding of attacker techniques, APT behaviours and network protocol abuse
- Familiarity with Windows/Linux investigation techniques
What’s in It for You
You’ll join an organisation that invests heavily in its people and offers:
- Competitive salary
- Private medical insurance
- 25 days annual leave
- 3 days paid charity leave
- Continuous learning & development opportunities
- Access to a cutting‐edge cyber practice and diverse project portfolio
- Flexible working & mobility across multiple UK hubs
Security Clearance Requirement
This role requires eligibility for BPSS + SC clearance, which normally includes:
- 5 years continuous UK residency
- No periods of 30+ consecutive days outside the UK in that time
- British‐only nationality (no dual citizenship) due to client conditions
Interested?
If you’re passionate about defensive security, thrive in technical SecOps work and want to make a measurable impact across major UK clients, we’d love to hear from you.
Apply directly or message me for a confidential chat.