Enable job alerts via email!

SC Cleared Tier 2 Cyber Security Analyst - 24/7 shift allowance

FPSG Connect

Scotland

On-site

GBP 40,000 - 60,000

Full time

16 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

FPSG Connect has urgent openings for Cyber Security Analysts in Scotland. This role requires SC or DV Clearance and involves conducting in-depth analysis for responding to threats, mentoring junior analysts, and collaborating in SOC operations. A generous shift allowance is offered alongside a competitive salary package.

Benefits

Generous shift allowance

Qualifications

  • Current SC or DV Clearance is mandatory.
  • Proven experience with SIEM and KQL for effective analysis.
  • Ability to produce structured reports and effective communication.

Responsibilities

  • Perform escalated triage and analysis on security events.
  • Monitor evolving threat landscapes and share insights.
  • Mentor Tier 1 Analysts in triage and analysis.

Skills

Networking concepts
Windows proficiency
Linux proficiency
SIEM solutions
Kusto Query Language
OSINT techniques
Clear communication
Report writing
Workload management
Collaboration
Learning initiative
Resilience under pressure

Tools

ArcSight
Azure Sentinel

Job description

FPSG has urgent permanent opportunities for Cyber Security Analysts, offering roles with a 24/7 shift pattern for their customers. A generous shift allowance is paid on top of the basic salary, providing a competitive reward package and potential path to DV Cleared status where applicable.

You must already possess current SC Clearance or DV Clearance due to the urgent hiring timeline. This role is exclusively open to sole British Citizens who do not hold dual nationality. You must ONLY hold British Citizenship to be suitable for this requirement.

The Tier 2 Cyber Security Analyst will build upon initial work conducted by Tier 1 Analysts, providing in-depth analysis of potential threats. This role is vital in escalated investigations, triage, and responding to cyber incidents, while also supporting the training of Tier 1 Analysts. You will collaborate with senior and junior analysts to ensure seamless SOC operations and act as a bridge between foundational and advanced threat detection and response functions.

Responsibilities:

  1. Conduct escalated triage and analysis on security events identified by Tier 1 Analysts, assessing threat severity and advising on initial responses.
  2. Utilize SIEM solutions with Kusto Query Language (KQL) for log analysis, event correlation, and documenting security incidents.
  3. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service level objectives (SLOs).
  4. Investigate potential security incidents through deeper analysis of correlated events, identifying patterns or anomalies indicating malicious activity.
  5. Use OSINT techniques to enrich data and enhance detection capabilities, contributing to proactive threat management.
  6. Monitor evolving threat landscapes and share insights with internal teams to improve situational awareness.
  7. Follow incident response playbooks, provide feedback for improvements, and suggest updates to enhance threat response times.
  8. Coordinate with Tier 3 Analysts and management to refine detection and response workflows, contributing to SOC maturity.
  9. Assist in tuning SIEM and detection tools to reduce false positives, submitting tuning requests and testing configurations.
  10. Identify gaps in detection content and work with Senior Analysts to develop new detection rules and use cases.
  11. Mentor Tier 1 Analysts, guiding on triage and analysis techniques and supporting their skill development.
  12. Participate in training sessions and knowledge-sharing activities, providing feedback and fostering a supportive learning environment.

Knowledge and Skills Required:

  1. Understanding of advanced networking concepts, including IP addressing and network protocols.
  2. Proficiency with Windows and Linux operating environments, including commands, file systems, and authentication mechanisms.
  3. Experience with SIEM solutions (e.g., ArcSight, Azure Sentinel) and exposure to XDR platforms.
  4. Skilled in using KQL for log searching and filtering.
  5. Familiarity with OSINT techniques for threat identification and information gathering.
  6. Clear and effective communication skills, capable of explaining technical issues to non-technical stakeholders.
  7. Ability to produce concise, structured reports from investigations and monitoring activities.
  8. Effective workload management to meet deadlines within the SOC environment.
  9. Willingness to collaborate, accept guidance, and learn from more experienced analysts.
  10. Initiative in learning new technologies and techniques.
  11. Ability to perform under pressure, following procedures to ensure consistent performance.

Next Steps:

If you hold SC or DV Clearance, possess the relevant skills, and are willing to work a rotating shift pattern (with a generous shift allowance), please apply immediately. Suitable candidates will be interviewed ASAP, with attractive packages offered to start promptly. Note: Dual-Nationality applicants cannot be considered for this role.

We are committed to Disability Confidence and neurodiversity. If you have a disability, please inform us of any reasonable adjustments needed during the application or recruitment process.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.