investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst• Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response• Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
investigate high-priority alerts, analyse logs, or network traffic and endpoint activity using tools like Splunk. Whether you're monitoring security alarms, creating new detection content, using threat intelligence to strengthen our defences, or responding to breaches, each day will begin with a team meeting to review ongoing investigations … impact. About You You’ll bring a background in cyber security analysis and a passion for IT. Ideally, you’ll have experience with host intrusiondetection analysis, but don’t worry if that’s an area you’re still developing in - plenty of training will be provided. You … working as a Cyber Security/Security Operations Centre Analyst • Evidence of experience working in at least one of the following fields: malware analysis, intrusiondetection and incident response • Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be More ❯
cybersecurity risks Security architecture knowledge, specifically designing and implementing secure systems and networks An understanding of system and network security, including security protocols, firewalls, intrusiondetection systems, and encryption technologies Be able to respond and manage security incidents effectively Compliance and Regulatory knowledge, and familiarity with laws and More ❯
maintain automated workflows to streamline incident response and reduce manual effort in security operations Collaborate with threat intelligence, IT, and compliance teams to refine detection strategies, improve alert fidelity, and enhance the overall security posture About you The successful candidate will have previously fulfilled a similar role as a … paced environment. You will also have the following skills: An ability to manage and respond to security incidents effectively Knowledge of network protocols, firewalls, intrusiondetection systems, and network monitoring tools Be able to analyse and interpret threat intelligence to identify potential security threats Knowledge of programming languages More ❯
as the primary escalation point for IT infrastructure issues. Collaborate with the Head of Cyber Security & IT Project Manager to ensure appropriate threat mitigation, intrusiondetection, and risk management for infrastructure assets. Conduct regular one-to-one meetings for coaching and professional development of team members. Manage the More ❯