Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
MI5
teamwork. The Role As a Senior Cyber Security Analyst, you'll be key to protecting our organisation against a range of cyber threats. From malware outbreaks and insider activity to denial-of-service attacks and phishing, your role will be vital in detecting, responding to, and mitigating risks. On … reviewing notifications from the previous night and prioritising incidents based on severity and impact. About You You'll bring a background in cyber security analysis and a passion for IT. Ideally, you'll have experience with host intrusion detection analysis, but don't worry if that's an … experience of working as a Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malwareanalysis, intrusion detection and incident response Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria More ❯
to spearhead their Global threat intelligence initiatives and enhance their Cyber Defence strategy. This is a hands-on, technical role focused on Threat hunting, Malwareanalysis, and tracking changes made by Threat Actors. This position plays a key role in shaping the Cyber Defence strategy, driving deliverables, and More ❯
skills: Demonstrated experience in responding to and investigating incidents whilst utilizing various monitoring, detection and investigation tooling – SIEM, SOAR, EDR etc. Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST … Should have an understanding of Technical Frameworks such as MITRE Attack, Lockheed Martin kill chain or Diamond model. Should be able to perform dynamic malware analysis. Qualifications: Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have Knowledge of open-source IR tools, such as … manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threat intelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. While this role is More ❯
skills: Demonstrated experience in responding to and investigating incidents whilst utilizing various monitoring, detection and investigation tooling – SIEM, SOAR, EDR etc. Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST … Should have an understanding of Technical Frameworks such as MITRE Attack, Lockheed Martin kill chain or Diamond model. Should be able to perform dynamic malware analysis. Qualifications: Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have Knowledge of open-source IR tools, such as … manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threat intelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. While this role is More ❯