Enable job alerts via email!

Principal Security Analyst - SecOps (Chronicle) at Cyderes United Kingdom

Itlearn360

United Kingdom

On-site

GBP 50,000 - 80,000

Full time

6 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading company seeks a Principal Security Analyst specializing in SecOps to deliver security solutions and enhance client experiences. The role includes mentoring analysts, conducting advanced threat investigations, and ensuring high-quality deliverables aligned with customer expectations. Candidates should have at least 5 years of experience and expertise in various cybersecurity tools and techniques.

Qualifications

  • Minimum 5+ years of professional experience in cybersecurity.
  • Expertise in securing and investigating incidents in various OS environments.
  • Strong understanding of networking concepts and logs analysis.

Responsibilities

  • Own security outcomes for assigned customers.
  • Perform advanced threat hunting and proactive investigations.
  • Lead post-incident reviews and tailor detection strategies.

Skills

Communication
Threat Hunting
Malware Analysis

Education

CISSP
GCIH
GCFA
OSCP

Tools

SentinelOne
CrowdStrike
Microsoft Defender
Microsoft Sentinel
Splunk
Google Chronicle
IBM QRadar

Job description

Principal Security Analyst - SecOps (Chronicle) job at Cyderes. United Kingdom.

The Managed Services Principal Security Analyst Is a Customer-Facing Role Focused on Delivering Security Solutions and Exceptional Client Experiences. As A Trusted Advisor, The Principal Security Analyst Is Responsible for Strategic Advisory, Advanced Analysis, And Custom Security Content for Cyderes’ Managed Service Customers. This Role Requires Consistent Representation of The Cyderes Brand Through Effective Collaboration and Positive Engagement with Internal Teams and Clients.

Responsibilities:

  • Own security outcomes for assigned customers, ensuring high-quality SOC deliverables and alignment with client expectations.

  • Lead customer-facing calls to discuss incident investigations, provide strategic guidance, and offer recommendations for improving security posture.

  • Perform advanced threat hunting and proactive investigations to detect, isolate, and mitigate malicious activities in customer environments.

  • Act as a technical lead within the SOC, providing mentorship, guidance, and leadership to other Security Analysts.

  • Oversee real-time monitoring and detection activities using SIEM, EDR, and other security tools, ensuring timely identification and escalation of threats.

  • Collaborate with internal teams, such as Detection Engineering, to refine detection rules and enhance automation workflows to close gaps in customer security posture.

  • Maintain and update security operations processes and incident response playbooks to ensure they remain current and effective.

  • Provide training to Security Analysts on tools, processes, and emerging threats to enhance team capabilities.

  • Lead post-incident reviews, identifying lessons learned, and sharing findings to improve operational effectiveness.

  • Tailor detection and response strategies to meet the unique needs of individual customer environments.

  • Stay informed of the evolving threat landscape to provide actionable insights and ensure a proactive approach to security operations.

Requirements:

  • Experience: Minimum 5+ years of professional experience in cybersecurity, with a strong background in security operations.

  • System Administration Knowledge/Experience: Expertise securing and investigating security incidents on Windows, Unix/Linux, and MacOS environments.

  • Networking Proficiency: Advanced understanding of networking concepts, including the ability to analyze network artifacts and logs effectively.

  • Endpoint Detection and Response (EDR): Hands-on experience with EDR tools such as SentinelOne,

  • CrowdStrike, Microsoft Defender, or equivalent platforms.

  • Security Information and Event Management (SIEM): Advanced knowledge and experience with at least one SIEM platform, such as Microsoft Sentinel, Splunk, Google Chronicle, or IBM QRadar.

  • Technical Skills: Proficient in threat hunting, malware analysis, and leveraging security tools to investigate and mitigate threats.

  • Communication: Strong written and verbal communication skills, with the ability to create and present reports, dashboards, and strategic recommendations.

  • Certifications (Preferred): Industry-recognized certifications such as CISSP, GCIH, GCFA, OSCP, or equivalent.

Cyderes i s an Equal Opportunity Employer (EOE). Qualified applicants are considered for employment without regard to race, religion, color, sex, age, disability, sexual orientation, genetic information, national origin, or veteran status.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.