Job Description
Please note - this role is based in the UK, and we are not able to provide visa sponsorship. You must also live within a one-hour commute of our London office.
What we’re offering:
- Salary: £40,000-46,000 depending on experience.
- Holiday: 25 days paid holiday plus bank holidays (increasing by 1 day for each year worked).
- Flexible Working: We typically spend two to three days per week in our London office (39 floors up in Canary Wharf). The rest of your time, you can work from wherever you are most productive and happy.
- Working Hours: 4 days on, 4 days off; 12 hours per day.
- Training: Budget for one certification/course per year.
- Socials: Regular team socials including drinks, axe throwing, crazy golf, etc.
- Start Date: ASAP
About CyPro
We are an innovative cybersecurity firm on a mission to redefine cybersecurity for high-growth businesses.
Our founders, Jonny & Rob, have extensive experience in delivering cybersecurity for large enterprises and government, recognizing the need for a new approach, especially as SMBs are increasingly targeted by cybercriminals.
CyPro is establishing new standards, defining innovative solutions, and equipping clients to prevent attacks, secure larger clients, and grow successfully.
We are growing quickly, and joining us offers the chance to be part of an exciting journey in the industry.
The Role
You will be a lead in our Security Operations Centre, providing 365-day monitoring and response to our clients. Your responsibilities will include:
- Monitoring: Overseeing security alerts from SIEM solutions like Microsoft Sentinel, Elastic, and Datadog, assessing their severity and impact.
- Threat Intelligence: Analyzing feeds to identify threats relevant to clients.
- Development: Creating and implementing detection rules within Microsoft Sentinel, expanding coverage of the MITRE ATT&CK framework.
- Response: Managing security incidents following established procedures.
- Automation: Designing Logic Apps for automated incident responses.
- Documentation: Recording incidents, actions, and outcomes in JIRA Service Management.
- Review: Updating incident response runbooks regularly.
- Recommendations: Advising on security improvements based on incident analysis.
- Training: Contributing to security training and awareness programs.
Who are we looking for:
- Self-Starters: Comfortable working with minimal guidance in a 'green field' environment.
- Ambitious & Driven: Aspiring to grow into leadership roles.
- Always Improving: Eager to learn and develop professionally.
What we think you need to be successful:
- A background in computer science, software engineering, information security, or related fields.
- At least one year of industry experience in a Security Operations team.
- Hands-on experience with Microsoft Sentinel and Microsoft Defender.
- Certified as a Security Operations Analyst (SC-200).
- Skills include problem-solving, attention to detail, continuous improvement, communication, flexibility, analytical thinking, technical expertise, incident response, familiarity with security tools, proficiency in KQL, scripting, automation, and a proactive learning attitude.
Two Stage Hiring Process
- Initial Interview: 15-30 minutes via Teams with a CyPro partner.
- Final Assessment: 60-minute practical exercise in our Canary Wharf office, followed by an interview with the founders.