Job Search and Career Advice Platform

Enable job alerts via email!

Senior Defense and Response Analyst

Live Nation Entertainment

Greater London

On-site

GBP 50,000 - 75,000

Full time

10 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading live entertainment company is seeking a Senior DART Analyst to enhance their cybersecurity capabilities. You'll lead investigations, provide mentorship, and manage security incidents. This role requires 3-5 years of cybersecurity experience and familiarity with SIEM, EDR, and NDR tools. Join a dynamic team dedicated to ensuring safe and uninterrupted live events.

Qualifications

  • 3-5+ years of experience in a cybersecurity analyst role, preferably in a SOC or incident response function.
  • Strong understanding of threat actor TTPs and practical experience applying MITRE ATT&CK or similar frameworks.
  • Solid investigative mindset and ability to operate effectively in high-pressure scenarios.

Responsibilities

  • Monitor and triage alerts from SIEM, EDR, and NDR platforms.
  • Conduct thorough investigations into security events.
  • Provide technical guidance and mentorship to junior analysts.
  • Support shift operations ensuring alert queues are processed accurately.

Skills

Experience in a cybersecurity analyst role
Understanding of threat actor TTPs
Hands-on experience with SIEM, EDR, and NDR platforms
Familiarity with AWS, Azure, and GCP
Strong written and verbal communication skills

Tools

SIEM
EDR
NDR
Job description
Job Summary : About Us

Live Nation Entertainment is the world’s largest live entertainment company, composed of global market leaders: Ticketmaster, Live Nation Concerts, and Live Nation Media & Sponsorship. With 550 million fans and operations in over 40 countries, our security mission is to ensure those experiences remain uninterrupted and safe. The Detection and Response Team (DART) plays a key role in maintaining that trust, security, and resilience.

Job Purpose

As a Senior DART Analyst, you will support the detection and response mission by leading complex investigations, guiding junior analysts, and ensuring timely response to security incidents. Reporting to the DART Lead, you will assist in operational execution across shifts, ensure adherence to best practices, and contribute to the development of tools, playbooks, and detection logic.

This role combines technical depth, mentorship, and reliability during critical security events.

Key Responsibilities
Security Monitoring & Incident Response
  • Monitor and triage alerts from SIEM, EDR, and NDR platforms, escalating or investigating as appropriate.
  • Conduct thorough investigations to determine scope, impact, and root cause of security events.
  • Collaborate with cross-functional teams during containment and remediation efforts.
  • Document findings clearly and contribute to after‑action reviews and incident post‑mortems.
Operational Execution
  • Support shift operations by ensuring alert queues are processed accurately and efficiently.
  • Contribute to shift handovers and knowledge transfers to ensure continuity of service.
  • Help enforce process consistency and adherence to escalation paths.
Mentorship & Training
  • Provide technical guidance and mentorship to junior analysts during investigations.
  • Assist the DART Lead with onboarding and upskilling new team members.
  • Promote knowledge sharing and maintain a culture of learning within the team.
Process Improvement
  • Help identify gaps in detection, visibility, or workflow inefficiencies.
  • Contribute feedback on tooling, processes, and documentation to the DART Lead.
  • Assist in maintaining and refining playbooks, queries, and automated response actions.
Collaboration
  • Work closely with the DART Lead and other senior team members to ensure coverage and preparedness.
  • Coordinate with other security teams (e.g., threat intelligence, engineering) to ensure findings are actioned and learned from.
Required Qualifications
  • 3–5+ years of experience in a cybersecurity analyst role, preferably in a SOC or incident response function.
  • Strong understanding of threat actor TTPs and practical experience applying MITRE ATT&CK or similar frameworks.
  • Hands‑on experience with SIEM, EDR, and NDR platforms.
  • Familiarity with cloud environments such as AWS, Azure, and GCP.
  • Solid investigative mindset and ability to operate effectively in high‑pressure scenarios.
  • Strong written and verbal communication skills.
Preferred Certifications
  • GIAC Security Expert (GSE)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Intrusion Analyst (GCIA)
  • CompTIA Cybersecurity Analyst (CySA+)
  • OSCP – Offensive Security Certified Professional
  • CISSP – Certified Information Systems Security Professional
  • Microsoft Certified: Cybersecurity Architect Expert or AWS Certified Security
  • CompTIA Security Plus (Sec +)
Additional Expectations
  • Willingness to participate in a 24 / 7 on‑call rotation.
  • Flexibility to work in a dynamic environment across shifts and time zones.
  • Commitment to maintaining a strong security posture and improving team performance.
Equal Opportunities

We are passionate and committed to our people and go beyond the rhetoric of diversity and inclusion. You will be working in an inclusive environment and be encouraged to bring your whole self to work. We will do all that we can to help you successfully balance your work and homelife. As a growing business we will encourage you to develop your professional and personal aspirations, enjoy new experiences, and learn from the talented people you will be working with. It’s talent that matters to us and we encourage applications from people irrespective of their gender identity, race, sexual orientation, religion, age, disability status or caring responsibilities.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.