Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Operations Analyst

InfoSec People Ltd

Birmingham

On-site

GBP 60,000 - 80,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity recruitment firm in Birmingham is seeking a Cyber Security Operations Analyst for a 12-month contract. The ideal candidate will support the development of monitoring controls and refine detection rules. Key responsibilities include enhancing alert logic within SIEM platforms and building automation workflows using Python. Candidates should have experience with SIEM technologies, strong analytical skills, and the ability to work collaboratively in a security operations center setting. Active SC Clearance is required.

Qualifications

  • Active SC Clearance is required.
  • Experience using one or more SIEM technologies.
  • Strong analytical mindset and interest in technical security operations.

Responsibilities

  • Support the development of monitoring controls.
  • Enhance alert logic and monitoring use cases within SIEM platforms.
  • Build and maintain automation workflows using Python.

Skills

Experience using SIEM technologies
Python skills for scripting or automation
Understanding of SOAR concepts
Familiarity with threat frameworks
Analytical mindset
Job description

Cyber Security Operations Analyst – Contract

12-Month Engagement | Inside IR35 | Day Rate : negotiable

Active SC Clearance Required

An organisation within the national security and defence ecosystem is looking for a technically minded Security Operations Analyst to strengthen its cyber detection and automation capabilities.

Role Overview

You’ll support the development of monitoring controls, help refine detection rules, and contribute to improving how threats are identified and responded to across the environment. The role involves hands‑on work with security platforms, scripting tasks, and collaborating with experienced security professionals.

Key Areas of Work
  • Enhancing alert logic and monitoring use cases within SIEM platforms
  • Building and maintaining automation workflows using Python
  • Reviewing security events and log data to spot unusual activity
  • Supporting the design of detections aligned to adversarial behaviours
  • Assisting investigations and contributing to continuous improvements within the SOC
What You’ll Bring
  • Experience using one or more SIEM technologies (e.g., Sentinel, Splunk, ELK, Rapid7, LogRhythm)
  • Python skills for scripting or automation
  • Understanding of SOAR concepts or exposure to automated playbooks
  • Familiarity with threat frameworks such as MITRE ATT&CK
  • Strong analytical mindset and interest in technical security operations
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.