Enable job alerts via email!

Associate Security Analyst - Investigation, EDR, Splunk, SIEM, Threat, London, Hybrid, SC Cleared

ZipRecruiter

City Of London

On-site

GBP 40,000 - 55,000

Full time

Today
Be an early applicant

Job summary

A leading recruitment agency in the UK is looking for an experienced Associate Security Analyst to support cybersecurity operations. Candidates will triage security alerts, analyze incidents, and assist in response efforts. Applicants should have 2-3 years of experience in cybersecurity along with knowledge of tools like Splunk and AWS. Active SC clearance is required for this contract role.

Benefits

Opportunity to work with Cyber Defence teams
Diversity and inclusivity encouraged

Qualifications

  • 2-3 years' experience in cyber security incident investigation and response.
  • Strong knowledge of cyber security threats and attack techniques.
  • Hands-on experience working in an Agile environment.

Responsibilities

  • Triage and investigate cybersecurity alerts and user reports.
  • Analyze systems and network traffic to determine nature of incidents.
  • Support technical response activities including containment and recovery.

Skills

Cyber security incident investigation
Analytical skills
Problem-solving skills
Familiarity with AWS

Tools

EDR
Splunk
Microsoft Sentinel
Job description

Job Description

We are seeking an experienced SC cleared Associate Security Analyst to join our team. You will support the cybersecurity operations, incident investigation, and response efforts within a dynamic environment. Your responsibilities will include investigating security alerts, analysing threats, supporting incident response activities, and contributing to ongoing improvements in security processes

Key Responsibilities:

  • Triage and investigate cybersecurity alerts and user reports
  • Analyze systems, files, network traffic, and cloud environments to determine the nature and extent of cyber incidents
  • Support technical response activities including containment, eradication, and recovery
  • Assist in coordinating cyber incident responses
  • Contribute to post-incident reviews and identify lessons learned
  • Support continual improvement initiatives for incident investigation and response capabilities
  • Collaborate with Cyber Defence teams to enhance overall security posture
  • Contribute to internal plans, playbooks, and knowledge base documentation
  • Line management of apprentice security analysts

Experience & Skills Required:

  • 2-3 years' experience in cyber security incident investigation and response
  • Strong knowledge of cyber security threats and attack techniques
  • Hands-on experience with security tools such as EDR, SIEM (Splunk , Microsoft Sentinel or equivalent acceptable)
  • Understanding of threat actor tactics, techniques, and procedures
  • Good analytical, problem-solving, and troubleshooting skills
  • Hands-on experience with Splunk
  • Experience working within an Agile environment
  • Familiarity with cloud platforms such as AWS

Please note active SC clearance is required for this role

Minorities, women, + candidates, and individuals with disabilities are encouraged to apply.

Interviews will take place next week, so please apply immediately to be considered for this contract role.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.