Job Search and Career Advice Platform
5,701

Analyst jobs in United Kingdom

Information Security Analyst L2 ( Talent pool )

SBV South Africa

Selby
On-site
GBP 50,000 - 70,000
Yesterday
Be an early applicant
I want to receive the latest job alerts for “Analyst” jobs

IT Senior Technical Support Analyst

Vp plc

York and North Yorkshire
On-site
GBP 40,000 - 50,000
Yesterday
Be an early applicant

Graduate Chemistry Analyst

Campden BRI

Chipping Campden
On-site
GBP 25,000 - 35,000
Yesterday
Be an early applicant

Information and Performance Analyst

NHS

Huddersfield
On-site
GBP 30,000 - 45,000
Yesterday
Be an early applicant

Claims Analyst

Direct Line Group

City Of London
Hybrid
GBP 60,000 - 80,000
Yesterday
Be an early applicant
Discover more opportunities than anywhere else.
Find more jobs now

Senior Technical Pricing Analyst

ZipRecruiter

City Of London
Hybrid
GBP 50,000 - 70,000
Yesterday
Be an early applicant

Graduate Research Analyst

THE OPPORTUNITY HUB UK LTD

Camden Town
On-site
GBP 22,000 - 30,000
Yesterday
Be an early applicant

Commercial Dual Trained Asbestos Surveyor Analyst

Penguin Recruitment

City Of London
On-site
GBP 60,000 - 80,000
Yesterday
Be an early applicant
HeadhuntersConnect with headhunters to apply for similar jobs

Marketing Data Analyst

Driftrock

City Of London
Remote
GBP 60,000 - 80,000
Yesterday
Be an early applicant

Information Security Analyst

SQUAREPOINT CAPITAL

Camden Town
On-site
GBP 30,000 - 40,000
Yesterday
Be an early applicant

Client Data Analyst – SQL & Power BI

Datatech Analytics

England
Hybrid
GBP 55,000 - 65,000
Yesterday
Be an early applicant

Financial Analyst

e-Careers

Liverpool
On-site
GBP 20,000 - 30,000
Yesterday
Be an early applicant

Business Data Analyst

SPG Resourcing

England
Hybrid
GBP 60,000 - 70,000
Yesterday
Be an early applicant

Asbestos Analyst

Penguin Recruitment

Tyseley
On-site
GBP 30,000 - 31,000
Yesterday
Be an early applicant

Renewable Energy Business Development Analyst

ZipRecruiter

Leicester
On-site
GBP 60,000 - 80,000
Yesterday
Be an early applicant

PEGA Business Analyst - Banking Domain Hybrid (UK-Based)

Tns

Camden Town
Hybrid
GBP 60,000 - 80,000
Yesterday
Be an early applicant

Apprentice IT Service Desk Analyst

Nationwide Platforms

Warrington
On-site
GBP 40,000 - 60,000
Yesterday
Be an early applicant

Infrastructure Analyst

Nextech Group Ltd

Newcastle upon Tyne
On-site
GBP 35,000 - 50,000
Yesterday
Be an early applicant

Workflow & Real-Time Analyst

Futura Design

Coventry
On-site
GBP 80,000 - 100,000
Yesterday
Be an early applicant

Asbestos Analyst

Penguin Recruitment

Thatcham
On-site
GBP 34,000 - 40,000
Yesterday
Be an early applicant

Senior Pricing Analyst 12m FTC

Direct Line Group

City Of London
Hybrid
GBP 50,000 - 70,000
Yesterday
Be an early applicant

Sustainability Analyst

ZipRecruiter

City Of London
Hybrid
GBP 40,000 - 50,000
Yesterday
Be an early applicant

Fleet Performance Analyst Apprentice

SOUTH WESTERN RAILWAY LIMITED

Basingstoke
On-site
GBP 60,000 - 80,000
Yesterday
Be an early applicant

Assistant Location Planning Analyst

ZipRecruiter

Newport Pagnell
On-site
GBP 25,000 - 35,000
Yesterday
Be an early applicant

Financial Analyst

Dallas Holdings

Leicester
On-site
GBP 60,000 - 80,000
Yesterday
Be an early applicant

Top job titles:

Nhs jobsFinance Director jobsTravel jobsContract jobsManager Transportation jobsArt Teacher jobsCompany Secretary jobsMaritime jobsEdtech jobsFashion Buyer jobs

Top companies:

Jobs at BarclaysJobs at NetflixJobs at B&mJobs at SubwayJobs at Home InsteadJobs at ExpediaJobs at AppenJobs at HubspotJobs at RaytheonJobs at Twilio

Top cities:

Jobs in NottinghamJobs in CoventryJobs in OxfordJobs in YorkJobs in PeterboroughJobs in PlymouthJobs in GloucesterJobs in BournemouthJobs in GuildfordJobs in Stoke On Trent

Similar jobs:

Business Analyst jobsSoftware Testing Analyst jobsTest Analyst jobsQuality Analyst jobsQuality Assurance Analyst jobsFinance Analyst jobsHr Analyst jobsEntry Level Data Analyst jobsKyc Analyst jobsOperations Analyst jobs
Information Security Analyst L2 ( Talent pool )
SBV South Africa
Selby
On-site
GBP 50,000 - 70,000
Full time
2 days ago
Be an early applicant

Job summary

A technology-driven security firm in the UK is seeking an Information Security Analyst L2 to conduct technology risk assessments and ensure the safety of its ecosystem. The candidate will support the development of a Cyber Security Road Map and identify innovative solutions to security threats. Qualifications include a Bachelor's degree in Information Security and relevant certifications. The role focuses on enhancing technology security practices and compliant systems.

Qualifications

  • 5+ years of experience in Information Security or Cybersecurity.
  • 2 years of IT administration experience.
  • In-depth knowledge of Cloud security platforms.

Responsibilities

  • Conduct security analysis of the organization's technology.
  • Support the development of the Cyber Security Road Map.
  • Monitor and analyze Cybersecurity operational services.

Skills

Threat analysis
Vulnerability remediation
Cybersecurity awareness training
Network security

Education

Bachelor’s degree in Information Security
CISSP
CEH

Tools

Nessus
Nmap
Job description
Overview

SBV seeks an Information Security Analyst L2 who will conduct all activities related to technology risks and remediations to protect the SBV ecosystem from potential threats including partnering with SBV Employees and vendors to drive a Cyber security conscious organisation. Support Technology Transformation & Innovation in your area of responsibility.

Support Technology Transformation & Innovation
  • Support with developing and maintaining Cyber Security Road Map and interventions
  • Support with developing company-wide best practices for Technology security
  • Support improving the maturity, or efficiency, of the Cyber Security team, by identifying innovative, problem-solving solutions.
  • Creates and maintain appropriate standard operating procedures for the Cyber Security and information protection.
Support on Analysis & Planning Activities
  • Identify, respond, predict and analyse security breaches and threats to determine their root cause and report findings to relevant stakeholders on cyber-security threats, attacks, incidents, and other factors that indicate security risks as per SLA.
  • Researching, investigating and developing proficiency in current and emerging threats, vulnerabilities, and security technology developments.
  • Play an active role in Technology Security Planning sessions, driving agenda and deliverables with all participants.
  • Support managing Vendor Strategy and roadmap for Information Security
  • Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate
  • Assessment of the organisation\'s technology risk exposure and measurement of the various parameters that make up technology risks.
Support the Design for your area of responsibility
  • Work closely with other stakeholders to design, architect, consult and implement security solutions to ensure readiness for security technologies
  • In support of program design, gather client requirements and draft documentation in order to compile a draft project plan, only more complex programs need to be reviewed by the Information Security Officer
  • Identify the desired outcomes and success criteria which is to be the baseline for post project review and benefit realisation validation, as well as measuring positive effects.
  • Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated
  • Drafts procedures and or policies with regards to cyber security submitting them to the Information Security Officer for review and authorisation.
Implementation & Execution within mandate
  • Monitor and analyse Cybersecurity operational services, including intrusion detection and prevention, situational awareness of:
    • network intrusions.
    • security events.
    • data spillage; and.
    • Incident response actions.
  • Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans
  • Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management.
  • Provide daily operational effectiveness reporting to the Information Security Officer
  • Create and update weekly dashboard view of cyber risk ratings in the organisation.
  • Prepare reports for circulation to the management teams related to investigations and treats for the month, this will also be rolled up into quarterly reporting.
  • Support with managing vendor resource deliverables to ensure quality and consistency of services
  • Audit vendor services and report on non-performance or execution deficiencies to the Information Security Officer
Risk & Quality Management within one’s area of responsibility
  • Drives vulnerability testing, risk analyses and security assessments providing findings to the Information Security Officer
  • Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence.
  • Guide teams throughout the organisation, imparting knowledge to enable employees to become Technology Security champions
  • Create a collaborative program to coordinate and drive operational activities related to Cyber Security, including event and incident investigation, process development and optimization, playbooks, and exercise development.
  • Assists with managing vendor resource deliverables to ensure quality and consistency against SLA as per mandate
  • To be the point of contact that interface between vendors and business units during audits, assessments or security reviews as per mandate
  • Advise Technology business partners on regulatory, compliance (POPI, PAIA, etc) and/or legal requirements as it relates to securing of data.
  • Drive compliance regarding Information Security business continuity planning.
Create awareness of IT Security good practices to the relevant stakeholders through communication and training
  • Foster relationships within the organization in order to implement security interventions that are relevant to current business needs.
  • Work across the organization to present contextual risk information to business colleagues, influencing strategic and operational decisions.
  • Lead and collaborate on lessons learned and root cause activities, including incident response processes until closure with all relevant stakeholders.
  • Drive compliance with Cyber security Training, in conjunction with Organisational Development, and awareness including alerting and escalations of non-compliant staff
  • Develops security awareness by providing orientation, educational programs, and on-going communication.
  • Develop, document and distribute how-to guides and update the internal knowledge base
Adhere to Process and Policy
  • Strives for 0 data material breaches and findings in Audits
  • Drives any audit findings departmentally providing regular feedback to the Information Security Officer
  • Manage internal control framework ensuring internal controls are reviewed periodically by departments as well as driving internal control adherence and compliance
  • Create and maintain appropriate standard operating procedures for Information Security, including business continuity plans.
  • Establishes system controls by developing a framework for controls and levels of access, recommending improvements.
  • Comply with established security configuration standards and best practices.
Drive compliance of the audit framework
  • Monitor and drive compliance against the audit framework. Logical access, physical access, change management, security controls (hardware, software and data levels). Implement additional processes, such as Segregation of Duties, Password Safes and Audit trails, to address the risk posed by privileged Technology users.
  • Conduct reviews and assessments according to policies and standards set out (across PM Lifecycle and SDLC).
  • Conduct internal and external security audits, providing recommendations to close any potential gaps within the process and or system
  • Conduct technical security reviews and perform technical risk assessments.
Support the SBV United Ethos
  • Act as a coach or guide to new employees within the department, peers and others
  • Contribute to building a knowledge sharing culture within the department
  • Where applicable, take the opportunity to upskill oneself on future skill sets and other roles with the department/SBV
Drive the organisation culture within one’s centre
  • Drive the department’s values while inspiring confidence and generating excitement, enthusiasm and commitment towards the mission.
  • Serve as a leader of the culture program driving the desired behaviours and encouraging employee engagement
  • Create and implement strategies in collaboration with Change Management & HR to evaluate and maintain employee satisfaction
  • Drive Transformation and BBB-EE initiatives to ensure sustainable alignment to the company scorecard
Provide leadership to employees within the organisation, creating a winning culture and high moral Lead as an Ambassador and executor of Change
  • Act as a change management architect in periods of change to ensure continuity to operations
  • Effectively communicate and embed new processes and procedures as they occur addressing or escalating matters / concerns to the SME’s (subject matter experts) when required
  • Facilitate the necessary presentations, workshops or forums to ensure consistent and accurate communication is given across one’s centre/s
Requirements
Minimum Requirements: Work Experience
  • 5 Years’ experience within either an Information Security position or Cybersecurity, which include protection against social engineering, or security vulnerability remediation, of which:
  • 2 Years’ IT administration experience
  • 2 Years’ Ethical Hacking experience
  • In-depth knowledge of Cloud security platform (MS Intune / O365 Security, etc.)
  • In-depth knowledge of Firewalls and Malicious Code Defense including APT
  • Knowledge of Cybersecurity technical assessments, standards, tools, and processes
  • Knowledge of common attack vectors
  • Knowledge of Vulnerability assessment tools (Nessus, Nmap)
  • Endpoint and network security tools/techniques
Minimum Requirements: Education
  • Bachelor’s degree in Information Security or similar.
  • Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; EC-Council: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE, ISO27001 (Candidates with certifications will be given preferential reviews
  • Previous
  • 1
  • ...
  • 25
  • 26
  • 27
  • ...
  • 229
  • Next

* The salary benchmark is based on the target salaries of market leaders in their relevant sectors. It is intended to serve as a guide to help Premium Members assess open positions and to help in salary negotiations. The salary benchmark is not provided directly by the company, which could be significantly higher or lower.

Job Search and Career Advice Platform
Land a better
job faster
Follow us
JobLeads Youtube ProfileJobLeads Linkedin ProfileJobLeads Instagram ProfileJobLeads Facebook ProfileJobLeads Twitter AccountJobLeads Xing Profile
Company
  • Customer reviews
  • Careers at JobLeads
  • Site notice
Services
  • Free resume review
  • Job search
  • Headhunter matching
  • Career advice
  • JobLeads MasterClass
  • Browse jobs
Free resources
  • 5 Stages of a Successful Job Search
  • 8 Common Job Search Mistakes
  • How Long should My Resume Be?
Support
  • Help
  • Partner integration
  • ATS Partners
  • Privacy Policy
  • Terms of Use

© JobLeads 2007 - 2025 | All rights reserved