Enable job alerts via email!

Cyber Threat Detection Analyst / Hunter / SOC Remote/Warwickshire

MYO Talent

Warwick

Hybrid

GBP 40,000 - 60,000

Full time

2 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading cybersecurity organization is seeking a Cyber Threat Hunter / Threat Intelligence Analyst in Warwickshire. The successful candidate will bring expertise in incident response and threat hunting, utilizing tools such as AWS and Azure, while working primarily remotely with occasional office attendance. A Bachelor’s degree in a relevant field is required.

Qualifications

  • Experience in Security Operations Centres and incident response.
  • Demonstrable expertise in threat hunting methodologies.
  • Strong understanding and experience with common threats.

Responsibilities

  • Conduct threat hunting activities and provide incident response.
  • Create high-quality documentation for technical teams.
  • Utilize cloud security tools effectively.

Skills

Threat hunting
Cloud security tools
Documentation skills
Active Directory knowledge
Windows logging
Malware response

Education

Bachelor’s degree in Computer Science or Cyber Security

Tools

AWS
Azure
Microsoft 365
Threat Intelligence tools

Job description

Cyber Threat Hunter / Threat Intelligence Analyst/ Cyber Threat Analyst / Threat Detection Analyst / Security Operations Center (SOC) Analyst / SOC Analyst / Cybersecurity Analyst / Threat Hunting /AWS / Azure / Microsoft 365– Warwickshire – Permanent role - £40,000 – 60,000.

One of our leading clients is looking to recruit a Cyber Threat Hunter / Analyst.

Location – Warwickshire / Remote (2 days per month in office)

Salary – £40,000 – 60,000

Experience:

  • Working in Security Operation Centres, incident response or threat hunting and associated technologies used by these roles and functions.
  • Experience with cloud security tools and platforms (e.g., AWS, Azure, Microsoft 365)
  • Strong documentation skills in order to provide high quality documentation for internal customers and technical teams.
  • A good knowledge of Active Directory and Entra, knowledge of Endpoint Operating System fundamentals.
  • Demonstrable expertise in threat hunting practices and methodologies with experience in Threat Intelligence platforms and sources.
  • Strong understanding and experience with Windows and its related logging/telemetry.
  • Strong and demonstrable practical experience responding to common threats such as malware, and social engineering. Experience must include effective use of threat artefacts, IOCs, and behavioural factors.
  • Bachelor’s degree in computer science, Cyber Security, a related field, or suitable combination of education, experience and training (such as SANS certifications).
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.