Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Operations Analyst

InfoSec People Ltd

Manchester

On-site

GBP 80,000 - 100,000

Part time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A national security organization in Manchester is seeking a Cyber Security Operations Analyst for a 12-month contract. The role involves enhancing cyber detection and automation capabilities, developing monitoring controls, and refining detection rules. Candidates must have experience with SIEM technologies and Python skills. This position offers a flexible day rate and requires active SC clearance.

Qualifications

  • Experience using one or more SIEM technologies (e.g., Sentinel, Splunk, ELK, Rapid7, LogRhythm).
  • Python skills for scripting or automation.
  • Understanding of SOAR concepts or exposure to automated playbooks.
  • Familiarity with threat frameworks such as MITRE ATT&CK.
  • Strong analytical mindset and interest in technical security operations.

Responsibilities

  • Support the development of monitoring controls.
  • Help refine detection rules for improved threat identification.
  • Enhance alert logic and monitoring use cases within SIEM platforms.
  • Build and maintain automation workflows using Python.
  • Assist in investigations and contribute to improvements within the SOC.

Skills

Experience using one or more SIEM technologies
Python skills for scripting or automation
Understanding of SOAR concepts
Familiarity with threat frameworks
Job description

Cyber Security Operations Analyst – Contract

12-Month Engagement | Inside IR35 | Day Rate : negotiable

Active SC Clearance Required

An organisation within the national security and defence ecosystem is looking for a technically minded Security Operations Analyst to strengthen its cyber detection and automation capabilities.

Role Overview

You’ll support the development of monitoring controls, help refine detection rules, and contribute to improving how threats are identified and responded to across the environment. The role involves hands‑on work with security platforms, scripting tasks, and collaborating with experienced security professionals.

Key Areas of Work
  • Enhancing alert logic and monitoring use cases within SIEM platforms
  • Building and maintaining automation workflows using Python
  • Reviewing security events and log data to spot unusual activity
  • Supporting the design of detections aligned to adversarial behaviours
  • Assisting investigations and contributing to continuous improvements within the SOC
What You’ll Bring
  • Experience using one or more SIEM technologies (e.g., Sentinel, Splunk, ELK, Rapid7, LogRhythm)
  • Python skills for scripting or automation
  • Understanding of SOAR concepts or exposure to automated playbooks
  • Familiarity with threat frameworks such as MITRE ATT&CK
  • Strong analytical mindset and interest in technical security operations
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.