Enable job alerts via email!

Cybersecurity Defense Analyst

TN United Kingdom

Cambridgeshire and Peterborough

On-site

GBP 45,000 - 75,000

Full time

Today
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An innovative firm is seeking a Cybersecurity Defense Analyst to safeguard client assets through effective incident response and threat detection. In this dynamic role, you'll collaborate with diverse teams to develop advanced security analytics and utilize cutting-edge tools. Your expertise will drive the design of security operations and enhance threat hunting initiatives. Join a forward-thinking organization where your skills in cybersecurity will make a significant impact on protecting vital information and assets. If you're passionate about cyber defense and thrive in a fast-paced environment, this opportunity is perfect for you.

Qualifications

  • 3+ years of experience in incident response or cybersecurity operations.
  • Knowledge of InfoSec frameworks such as NIST and MITRE ATT&CK.

Responsibilities

  • Detect, analyze, and respond to security incidents.
  • Advise stakeholders on security activities and incident response.

Skills

Incident Response
Threat Detection
Network Security
Traffic Analysis
Scripting (Python, PowerShell, Bash)
Open-source Security Tools
InfoSec Frameworks (NIST, SANS)
Communication Skills

Education

Bachelor's Degree

Tools

SIEM
IDS/IPS
EDR Solutions
Wireshark
Nmap
Burp Suite
Snort
Kali Linux

Job description

Social network you want to login/join with:

Cybersecurity Defense Analyst, Cambridgeshire

Location: Cambridgeshire, United Kingdom

Job Category: Other

EU work permit required: Yes

Job Reference: fecb611ef4d6

Job Views: 8

Posted: 05.05.2025

Expiry Date: 19.06.2025

Job Description:

The Cybersecurity Defense Analyst will leverage their skills in cybersecurity to protect client assets by detecting, analyzing, and responding to security incidents. The role involves working closely with stakeholders, advising on security activities such as Tier-3 Incident Response, Security Operations Design, Threat Hunting, and Content Development. The analyst will think innovatively about cyber defense, utilizing new tools and developing advanced security analytics.

Basic Qualifications:
  • 3+ years of experience in incident response or cybersecurity operations
  • 3+ years of experience in threat detection, network security, and traffic analysis, including hunting for malicious activity and initiating response actions
  • Experience with threat detection technologies such as SIEM, IDS/IPS, and EDR solutions
  • Experience with scripting languages like Python, PowerShell, or Bash
  • Experience with open-source security tools like Wireshark, Nmap, Burp, Snort, and Kali
  • Knowledge of InfoSec frameworks such as NIST, SANS, Lockheed Martin Kill Chain, and MITRE ATT&CK
  • Proficiency with Microsoft Office tools and telework technologies
  • Knowledge of InfoSec threat sharing, including IoCs, artifacts, and forensic techniques
  • Ability to work in the EU or UK without sponsorship
  • Bachelor's degree
Additional Qualifications:
  • Ability to work with a geographically dispersed team
  • Self-management skills in a fast-paced, multi-tasking environment
  • Attention to detail, research capability, and strong reporting skills
  • Excellent verbal and written communication skills, including documentation
  • Certifications such as CISSP, GREM, GCFA, GCTI, GCFR, GNFA, ECIH, CEH, or CySA+
Commitment to Non-Discrimination

All qualified applicants will receive consideration regardless of disability, veteran status, or other protected statuses under applicable laws.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.