Enable job alerts via email!

SOC Principal Analyst

QBE Europe

City Of London

Hybrid

GBP 70,000 - 90,000

Full time

Today
Be an early applicant

Job summary

A global insurance company in London is seeking a SOC Principal Analyst to join its cybersecurity team. This hands-on role involves analyzing threats and incidents, mentoring junior analysts, and translating business objectives into security measures. Candidates should have advanced technical expertise in various security systems and logs, with excellent communication skills to liaise with stakeholders. The position offers a hybrid work environment and a focus on improving the company's security posture.

Qualifications

  • Advanced knowledge of Windows, Linux, Networking, and Security Architecture.
  • Expertise in analyzing various types of logs including network and active directory.
  • Ability to lead security incidents and handle 2nd/3rd level security events.

Responsibilities

  • Mentor junior analysts and act as a point of escalation.
  • Translate business objectives into security objectives.
  • Execute threat hunting activities to identify emerging threats.

Skills

Security solutions and technologies expertise
Log analytics
Incident management experience
Communication skills
Job description

Primary Details Time Type: Full time Worker Type: Employee

SOC Principal Analyst

Permanent

London/ Hybrid

At QBE, our purpose is to enable a more resilient future.

We are an international insurer and reinsurer with a local presence in 27 countries.

The Opportunity

QBE Europe is currently recruiting a SOC Principal Analyst to join our cyber security team in our London Office. Reporting to regional team leads, the SOC Principal Analyst will be a key member of our rapidly growing Global Security Operations team.

Your new role

This is an exciting hands-on technical role in which the specialist will use their security skills and knowledge to perform advanced analysis on the collection of cyber threats using high-level proactive and reactive threat hunting methods, classifying, analysing, prioritising and remediating security alerts/events.

The focus is to provide effective, proactive and a highly technical analytical response to cyber security-related incidents to prevent QBE from becoming compromised by modern attack methods and techniques.

Main responsibilities:

  • Act as point of escalation and mentor to junior SOC analysts.
  • Translates business objectives into security objectives by providing support in design/architecture for new security applications to improve the current security posture globally for QBE.
  • Recommends and implements initiatives, develops IR processes and procedures.
  • Contribute to the ongoing development of security operations “best practice” and support continuous improvement.
  • Provide guidance regarding security technical support, and influence peers in following best practice.
  • Review new security products and ascertain their suitability for the QBE environment.
  • Execute threat hunting activities using various proprietary and open source tools to identify current and emerging threats that pose a risk to QBE.
  • Build strong relationships with internal and external stakeholders to maintain and improve QBE security and enhance knowledge and information sharing.
  • Actively communicate with staff and third parties to correctly identify and resolve problems and manage their expectations.
  • Document incidents, requests and problem management information to ensure required compliance standards/SLAs are achieved.
  • Use security tools and resources to correlate suspicious events, providing context around the event, determine root cause and provide regular updates and recommend modifications to existing systems and procedures.
  • Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs.
  • Actively manage and apply the phases of Incident Response (preparation, identification, containment, eradication, recovery and lessons learned).
  • Act as a point of reference to guide and advise others to ensure the sharing of knowledge and best practice throughout the team.

About you

  • Advanced technical expertise of security solutions and technologies, including: Windows, Linux, Networking, Security Architecture experience and knowledge of packet flow/TCP/UDP traffic, Firewall and proxy technologies, cloud solutions, anti-virus, static and dynamic malware analysis techniques.
  • Expert in performing analytics with different types of logs, i.e. network, active directory, database, DNS, firewall, proxies, host-based security, cloud and applications logs etc.
  • Working experience in leading security incidents at all levels related to incident response.
  • Working experience in managing 2nd/3rd level security events.
  • Ability to manage strong relationships with global security operations colleagues and other departments, including network teams and incident managers.
  • Demonstrated ability to make decisions on remediation and counter measures.
  • Be able to communicate effectively and update senior stakeholders globally.

Why QBE? At My Best

At QBE, we want our people to feel rewarded and inspired to perform at their best, that’s why we have created “At My Best ”. It’s our connection, our way of showing we have your back.

We believe in building a workplace that is fair and inclusive, and we are committed to building a diverse workforce that is reflective of the communities we operate in.

Equal Employment Opportunity:

QBE is an equal opportunity employer and is required to comply with equal employment opportunity legislation in each jurisdiction it operates.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.