Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Operations Analyst

InfoSec People Ltd

Sheffield

On-site

GBP 60,000 - 80,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A national security organization in the UK is seeking a Cyber Security Operations Analyst for a 12-month contract. This role involves enhancing cyber detection capabilities and requires active SC clearance. You'll support the development of monitoring controls and collaborate with experienced security professionals. The ideal candidate will possess experience with SIEM technologies, strong Python scripting skills, and an analytical mindset. This is a hands-on position focusing on improving threat identification and response within the security operations environment.

Qualifications

  • Experience with SIEM technologies like Sentinel, Splunk, ELK, Rapid7, or LogRhythm.
  • Proven skills in Python for automation and scripting.
  • Understanding of SOAR concepts and automated playbooks.

Responsibilities

  • Support the development of monitoring controls.
  • Enhance alert logic and monitoring use cases.
  • Build and maintain automation workflows using Python.
  • Review security events and log data.
  • Assist investigations and contribute to SOC improvements.

Skills

Experience using SIEM technologies
Python skills for scripting or automation
Understanding of SOAR concepts
Familiarity with threat frameworks
Strong analytical mindset
Job description

Cyber Security Operations Analyst – Contract

12-Month Engagement | Inside IR35 | Day Rate : negotiable

Active SC Clearance Required

An organisation within the national security and defence ecosystem is looking for a technically minded Security Operations Analyst to strengthen its cyber detection and automation capabilities.

Role Overview

You’ll support the development of monitoring controls, help refine detection rules, and contribute to improving how threats are identified and responded to across the environment. The role involves hands‑on work with security platforms, scripting tasks, and collaborating with experienced security professionals.

Key Areas of Work
  • Enhancing alert logic and monitoring use cases within SIEM platforms
  • Building and maintaining automation workflows using Python
  • Reviewing security events and log data to spot unusual activity
  • Supporting the design of detections aligned to adversarial behaviours
  • Assisting investigations and contributing to continuous improvements within the SOC
What You’ll Bring
  • Experience using one or more SIEM technologies (e.g., Sentinel, Splunk, ELK, Rapid7, LogRhythm)
  • Python skills for scripting or automation
  • Understanding of SOAR concepts or exposure to automated playbooks
  • Familiarity with threat frameworks such as MITRE ATT&CK
  • Strong analytical mindset and interest in technical security operations
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.