Enable job alerts via email!

Senior Cyber Security Analyst

Locke & Mccloud

Manchester

Hybrid

GBP 55,000 - 65,000

Full time

23 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a Senior Cyber Security Analyst to join their expanding SOC team in Manchester. This role offers the opportunity to lead threat investigations, enhance detection logic, and collaborate with clients on tailored security solutions. With a competitive salary and hybrid working flexibility, this position is perfect for a detail-oriented professional with a passion for cybersecurity. Join a dynamic environment where your expertise can make a significant impact on security operations and client satisfaction. If you're ready to take your career to the next level, this opportunity is for you.

Qualifications

  • 3+ years in a SOC or security operations function required.
  • Hands-on experience with SIEM/EDR tools is essential.

Responsibilities

  • Lead threat investigations and tune detection logic.
  • Design and improve security monitoring workflows.

Skills

Analytical Skills
Written Communication
Collaboration
Attention to Detail
Mentoring

Education

Security Certifications (e.g., Security+, CySA+, SC-200)

Tools

SIEM Tools (e.g., QRadar)
EDR Tools (e.g., SentinelOne, Defender for Endpoint)

Job description

Senior Cyber Security Analyst - Manchester - £55,000-£65,000 per annum

We’re pleased to be working with a specialist Cyber Services company that delivers security operations support to a diverse range of clients. They’re expanding their SOC team and are in search of a confident Senior Cyber Security Analyst to lead threat investigations, tune detection logic, and contribute to high-quality managed security services. The role includes a salary of £55,000-£65,000, a competitive benefits package, and hybrid working flexibility.

Your Responsibilities Will Include:

  1. Analysing security incidents and SOAR alerts with a methodical, threat-led approach
  2. Designing and fine-tuning rules and playbooks to improve threat detection and response
  3. Working with customers to shape and implement tailored security monitoring workflows
  4. Supporting both live operations and onboarding of new services
  5. Researching threat intelligence to enhance SOC processes
  6. Reviewing junior analyst cases and helping develop their capabilities
  7. Owning ticket queues, meeting SLAs, and ensuring high-quality case records
  8. Participating in projects across departments and improving internal procedures
  9. Taking part in the on-call incident escalation rota

You’ll Need:

  1. 3+ years in a SOC or security operations function
  2. Hands-on experience with SIEM/EDR tools like SentinelOne, Defender for Endpoint, QRadar
  3. Security certifications (e.g., Security+, CySA+, SC-200, SBT L1)
  4. Strong written communication and organisation skills
  5. Experience leading or mentoring junior team members
  6. High attention to detail and a collaborative mindset

Good to Have:

  1. Prior work in incident response teams
  2. Familiarity with cloud security tools and services
  3. Knowledge of SOAR toolsets and automation
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.