Enable job alerts via email!

Security Analyst

Cubic Corporation

Billingham

On-site

GBP 60,000 - 80,000

Full time

14 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leader in intelligent transportation solutions in Billingham is seeking an experienced IT Security Analyst to monitor, analyze, and respond to security incidents. The successful candidate will have a proven track record in security monitoring, incident response, and compliance with regulatory standards. Candidates should have substantial knowledge of security tools like Tenable, Crowd Strike, Splunk, and others, alongside a degree in Computer Science or a related field. This role includes working with both Windows and Linux environments.

Qualifications

  • Minimum 8 years of experience in IT security or services in critical settings.
  • At least 5 years working in IT security and Payment Card processing systems.
  • Strong understanding of PCI security compliance.

Responsibilities

  • Design and implement security monitoring solutions.
  • Monitor alerts for suspicious activity using various tools.
  • Document and escalate validated security incidents.

Skills

Security Monitoring
Incident Response
Threat Detection
Risk Assessment
Network Security

Education

University degree in Computer Science or Engineering

Tools

Tenable
Crowd Strike
Splunk
Imperva
Azure Cloud Defenders
AWS Security Hub
Job description
Business Unit

Cubic Transportation Systems

Company Details

Cubic Transportation Systems (CTS) is a global leader in intelligent transportation solutions, specializing in technologies that make public transit more efficient, accessible, and user-friendly. A significant feature is providing Fare and Payment card services to government and municipal customers across the globe. As a member of the Cubic Information Security Team, you will be responsible for supporting efforts to monitor security for Cubic systems and assist in the analysis and response to incidents. The successful candidate must be proficient at security monitoring using Tenable, Crowd Strike, Splunk, and Imperva and other security tools. Work will be on Windows and Linux assets in cloud or data centers. Analysts will be responsible for IT security tools and processes to manage and report operational security risks to operations teams for remediation. The analyst must have an intimate awareness of PCI security compliance expectations. The candidate will be a partner to support external audits to facilitate PCI-DSS, ISO 27001, and SOC compliance/audit efforts. Scanning operations will involve routine daily or weekly operations as well as support for pen testing or audit efforts. Findings must be risk rated and effectively escalated for remediation. Will be recognised internally as a subject matter expert. Works autonomously, able to assess and drive work priorities, with limited support or guidance needed.

Job Details

(No specific additional content provided.)

Essential Job Duties and Responsibilities
Security Monitoring Configuration
  • Design and implement security monitoring solutions using SIEM, EDR, NDR, CSPM, and cloud-native tools (e.g. Azure Cloud Defender, AWS Security Hub, Guard Duty, Inspector, and Cloud Watch).
  • Integrate log sources from on-prem systems (firewalls, servers, endpoints, network devices) and cloud platforms (IaaS, PaaS, SaaS) into centralized monitoring systems.
  • Develop and tune detection rules and correlation logic to identify suspicious behaviour, policy violations, and potential threats.
  • Tune detection rules to reduce false positives and improve signal-to-noise ratio.
  • Maintain visibility across hybrid environments by ensuring telemetry coverage and log integrity.
Threat Detection and Analysis
  • Monitor alerts and logs for indicators of compromise (IOCs) and suspicious activity.
  • Correlate events across multiple sources to identify potential threats.
  • Perform triage and initial investigation of alerts to determine severity, scope, and potential impact.
  • Use threat intelligence feeds to enrich alerts and prioritize response.
Incident Escalation and Coordination
  • Document and escalate validated security incidents to the appropriate operations or incident response teams.
  • Provide detailed context, including affected systems, users, and potential impact.
  • Collaborate with operations staff to ensure timely containment, eradication, and recovery.
  • Track and report on escalated incidents, including root cause analysis and remediation status.
Continuous Improvement
  • Review and refine detection logic based on incident post-mortems, false positives, emerging threats, and operational feedback.
  • Participate in threat hunting and proactive analysis to identify gaps monitoring coverage.
  • Recommend and implement automation for alert triage and response workflows.
  • Contribute to playbooks and standard operating procedures for alert handling and escalation.
  • Stay current with emerging threats, vulnerabilities, and security technologies.
Compliance and Reporting
  • Ensure monitoring configurations support regulatory and policy requirements (e.g., PCI, ISO 27001, GDPR, CIS, etc).
  • Generate reports on security posture, alert trends, and incident metrics for leadership and governance teams.
  • Assist with audits and provide evidence of monitoring controls and incident handling.
General Duties and Responsibilities
  • Reliably demonstrate accountability for work assignments and proactive communications about issues and status. A strong history of proactively identifying effective solutions for challenges.
  • Able to work effectively and uphold professional standards, with the customer and system stakeholders.
  • Self‑motivated and able to work unsupervised.
  • Methodical and attentive to detail.
  • Proactive in seeking advice from security subject matter experts when required.
  • Comfortable working with staff at all levels and in other geographical locations within the organization.
  • Comply with Cubic’s Quality Management System.
  • Comply with Cubic's quality, health, safety, and security policies.
  • Support the company's strategic objectives and collaborate across departments.
  • Comply with Cubic Human Resources Procedures.
Skills/Experience/Knowledge – Essential
  • Familiarity with PCI DSS 4, ISO 27001-2022, and/or SOC I/II requirements and audits.
  • Experience installing, configuring and supporting Tenable, Crowd Strike, Splunk, and Imperva in Windows and Linux environments.
  • Experience performing monitoring in Azure and AWS cloud environments, as well as in data centres.
  • In depth understanding and experience in network security. Strong preference for someone who has had experience working as a network security admin and/or cloud or systems security admin.
  • Expert level experience collaborating with stakeholders and solution providers in a cross‑functional and matrixed IT organization. Able to adapt style efforts to persuade in delivering messages that relate to the wider business. Is frequently called on to advise others on complex matters and may be accountable through team for delivery of business targets.
  • Exhibits advanced wide‑ranging experience, using in‑depth professional knowledge, acumen, concepts and company objectives to develop, resolve complex models and procedures. Provides solutions to issues in creative and effective ways. Understands the interrelationships of different disciplines. Directs the application of existing principles and guides development of new policies and ideas.
  • Understands and works on complex issues where analysis of situations or data requires an in‑depth evaluation of variable factors. Determines methods and procedures on new assignments. Exercises judgment in selecting methods, evaluating, adapting complex techniques and evaluation criteria for obtaining results.
  • This position typically works under limited supervision and direction. Candidates for this position will regularly exercise discretionary and substantial decision‑making authority.
Skills/Experience/Knowledge – Desirable
  • Deep understanding of security risks and threats as they relate to the company’s operating environments.
Qualifications – Essential
  • Minimum 8 years’ experience in services or IT systems in a mission critical setting.
  • University degree in Computer Science, Engineering, or other technical fields, or Business Administration with relevant IT work experience.
  • At least 5 years’ experience working in IT security and/or Payment Card processing systems. Strong understanding of technical concepts, as well as demonstrated ability to understand complex internally developed systems.
Qualifications – Desirable
  • Certification as an Information Security professional (e.g. ISACA CISA/CISM/CRISC, ISC(2) CISSP, BCS CISMP/IISP)
  • Payment Card Industry Security Standards Council certification (ISA/ QSA)
Condition of Employment

Successful outcome of a UK DBS check.

Worker Type

Employee

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.