Cyber Security Analyst

Cyber Security Analyst

Posted 1 day ago by Eames Consulting

£350 Per day
Inside
Undetermined
London Area, United Kingdom

Summary: The Cyber Security Analyst role involves enhancing security operations within a six-month contract, focusing on incident detection, response, and governance. The position requires collaboration with various teams and supports the Cyber Threat Intelligence function. Candidates should have a strong SOC background and be prepared to start by February 13th. The role emphasizes continuous improvement and effective communication in managing cyber threats.

Key Responsibilities:

  • Oversee SOC responses to alerts from SIEM and other security tooling.
  • Act as an escalation point for triage, investigation, and real-time incident response.
  • Conduct investigations and root cause analysis.
  • Lead lessons-learned sessions following incidents and near misses.
  • Support the onboarding of new log sources and the development of SIEM use cases.
  • Analyse threat intelligence feeds and correlate findings with internal data.
  • Identify emerging threats and recommend proactive mitigation strategies.
  • Work closely with SOC analysts, CTI teams, IT teams, and external partners.
  • Clearly communicate incident status, impact, and remediation to stakeholders.
  • Assist with shared team mailbox management, including approvals and queries.
  • Maintain detailed incident records and post-incident reporting.
  • Contribute to the development and maintenance of incident response playbooks and runbooks.
  • Provide oversight and reporting against agreed SLAs, KPIs, and KRIs.
  • Participate in incident response exercises and simulations.
  • Recommend improvements to detection, response, and recovery processes.

Key Skills:

  • Proven experience in cyber security incident response and/or SOC operations.
  • Strong understanding of network protocols, operating systems, and security technologies.
  • Hands-on SIEM experience, particularly Microsoft Sentinel.
  • Knowledge of the MITRE ATT&CK framework and threat hunting methodologies.
  • Ability to work under pressure and manage multiple incidents simultaneously.
  • Strong analytical, problem-solving, and communication skills.

Salary (Rate): £350 daily

City: London Area

Country: United Kingdom

Working Arrangements: undetermined

IR35 Status: inside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

We are seeking an experienced Cyber Security Analyst to join our team on an initial six-month contract, playing a key role in strengthening our security operations capability. £350 per day INSIDE IR35 MUST BE ABLE TO START BY 13TH FEBRUARY This role sits at the core of our SOC and SIEM services, with a strong focus on governance, oversight, and continuous improvement across incident detection and response. You will also support the Cyber Threat Intelligence (CTI) function, help ensure the ongoing effectiveness of security controls, and assist with shared team mailbox management. If you have a strong SOC background and enjoy working across technical, operational, and governance domains, this is an excellent opportunity to broaden your impact.

What You’ll Be Doing

  • Incident Detection and Response
  • Oversee SOC responses to alerts from SIEM and other security tooling
  • Act as an escalation point for triage, investigation, and real-time incident response
  • Conduct investigations and root cause analysis
  • Lead lessons-learned sessions following incidents and near misses
  • Support the onboarding of new log sources and the development of SIEM use cases
  • Threat Intelligence and Analysis
  • Analyse threat intelligence feeds and correlate findings with internal data
  • Identify emerging threats and recommend proactive mitigation strategies
  • Support CTI resources to ensure a consistent, high-quality service
  • Collaboration and Communication
  • Work closely with SOC analysts, CTI teams, IT teams, and external partners
  • Clearly communicate incident status, impact, and remediation to stakeholders
  • Assist with shared team mailbox management, including approvals and queries
  • Documentation and Reporting
  • Ensure the operation and attestation of ISAE3000 controls within Cyber Security
  • Maintain detailed incident records and post-incident reporting
  • Contribute to the development and maintenance of incident response playbooks and runbooks
  • Provide oversight and reporting against agreed SLAs, KPIs, and KRIs
  • Continuous Improvement
  • Participate in incident response exercises and simulations
  • Recommend improvements to detection, response, and recovery processes

You’ll Enjoy This Role If You

  • Take pride in proactively identifying and managing cyber threats
  • Are driven to improve cyber security capabilities and maturity
  • Enjoy collaborating with stakeholders and advising on security matters
  • Value ownership and accountability as a key contact for SOC and SIEM operations
  • Appreciate the importance of governance, compliance, and operational resilience

What We’re Looking For

  • Proven experience in cyber security incident response and/or SOC operations
  • Strong understanding of network protocols, operating systems, and security technologies
  • Hands-on SIEM experience, particularly Microsoft Sentinel
  • Knowledge of the MITRE ATT&CK framework and threat hunting methodologies
  • Ability to work under pressure and manage multiple incidents simultaneously
  • Strong analytical, problem-solving, and communication skills