Enable job alerts via email!

Security Analyst (Network & Endpoint)

Atrium Workforce Solutions Ltd

City Of London

Hybrid

GBP 45,000 - 60,000

Part time

Today
Be an early applicant

Job summary

A leading workforce solutions provider is seeking a Security Analyst (Network & Endpoint) to manage security operations in a hybrid environment. Responsibilities include optimising network detection systems, managing endpoint protection, and responding to incidents. The ideal candidate will hold essential certifications such as CompTIA Security+ and have experience with technologies like Darktrace and CrowdStrike. This contract position offers flexibility with the working location.

Qualifications

  • Experience in optimising network threat detection systems.
  • Ability to deploy and manage enterprise security solutions.
  • Knowledge of monitoring and investigating security incidents.

Responsibilities

  • Administer and optimise Darktrace for threat detection.
  • Act as a Level 2 SOC Analyst and respond to security incidents.
  • Monitor threat feeds and manage IOCs.

Skills

Network threat detection
Incident response
Endpoint security management
Threat intelligence monitoring

Education

CompTIA Security+
Microsoft Certified: Security Operations Analyst Associate (SC–200)
CrowdStrike Certified Falcon Administrator (CCFA)

Tools

Darktrace
CrowdStrike Falcon
Microsoft Sentinel
Microsoft Entra ID
Zscaler
Job description
Role Overview
  • Job Title: Security Analyst (Network & Endpoint)
  • Location: England/Remote
  • Contract Type: Contract
  • Duration: Contract till 31st Mar 26
  • Sector: Healthcare
Key Responsibilities
Network Detection & Response
  • Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis.
  • Investigate anomalies and escalate incidents based on network telemetry.
Endpoint Protection
  • Deploy and manage CrowdStrike Falcon agents across enterprise endpoints.
  • Maintain and update detection rules, ensuring alignment with threat intelligence.
Security Operations Centre (SOC)
  • Act as a Level 2 SOC Analyst and Incident Handler.
  • Triage, investigate, and respond to security alerts and incidents.
  • Collaborate with other SOC team members to ensure timely resolution and documentation.
Threat Intelligence & Insider Threat Monitoring
  • Monitor threat feeds and manage Indicators of Compromise (IOCs).
  • Conduct insider threat analysis and support investigations.
Cloud & Identity Security
  • Use Microsoft Sentinel for incident investigation, alert correlation, and dashboard monitoring.
  • Manage identity governance and conditional access policies via Microsoft Entra ID.
  • Monitor Entra ID logs and integrate with Sentinel for rule–based alerting.
Additional Technologies
  • Experience with Zscaler for secure web gateway and DLP.
  • Exposure to Google SecOps is advantageous.
Team Leadership
  • Operate at a team lead level, supporting junior analysts and coordinating operational tasks.
  • Provide technical guidance and contribute to process improvement initiatives.
Preferred Certifications

Essential:

  • CompTIA Security+
  • Microsoft Certified: Security Operations Analyst Associate (SC–200)
  • CrowdStrike Certified Falcon Administrator (CCFA)
  • Darktrace Analyst Certification (if available)

Desirable:

  • GIAC Certified Intrusion Analyst (GCIA)
  • EC–Council Certified Threat Intelligence Analyst (CTIA)
  • Microsoft Certified: Identity and Access Administrator Associate (SC–300)
  • CISSP or equivalent foundational certification

Please feel free to contact myself – Daisy Nguyen at Gibbs Consulting for a confidential chat to know more details about the role.

Please also note: Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.