A4949 - Security Analyst 9-5026

Focused HR Solutions
Dover
1 week ago
Create job alert

100% on site.

Our direct client has an opening for a Security Analyst 5026.

This position is up to 13 months with the option of extension. The client is located in Dover, DE.

If you are interested, please submit the following:

  1. YOUR CURRENT RESUME.
  2. YOUR HOURLY RATE.

Key Responsibilities:

  1. Security Monitoring:Continuously monitor network traffic, system logs, and other security tools to detect unusual or suspicious activities that could indicate an incident or vulnerability.
  2. Incident Detection and Response:Identify and categorize security incidents such as malware infections, data breaches, and insider threats. Respond swiftly to contain, mitigate, and resolve incidents.
  3. Alert Triage:Assess alerts generated by security tools, determine their severity, and prioritize responses accordingly.
  4. Threat Intelligence and Hunting:Stay updated on the latest cybersecurity threats, vulnerabilities, and attack techniques to enhance monitoring and response efforts. Leverage these findings to conduct proactive threat hunting across SIEM and EDR platforms.
  5. Log Analysis:Examine logs from a range of sources including firewalls, intrusion detection systems, antivirus software, and system endpoints to identify irregularities that may signal a threat.
  6. Security Tool Management:Operate and manage security technologies such as SIEM systems, IDS/IPS, firewalls, PKI management, and endpoint security solutions.
  7. Documentation and Compliance:Maintain accurate records of security incidents and ensure compliance with industry standards and regulations.
  8. Collaboration:Work closely with other security and IT professionals to investigate and resolve security issues.
  9. Continuous Improvement:Contribute to refining security processes and developing new detection and prevention rules.

Required Skills:

  1. Technical Proficiency:Strong understanding of IT basics, including operating systems, network protocols, and security tools.
  2. Hands-on Experience with Security Tools:Proficiency in using SIEM systems, IDS/IPS, firewalls, antivirus, and endpoint detection tools.
  3. Coding Skills:Knowledge of programming languages like Python or PowerShell for automating tasks and creating scripts.
  4. Forensics Knowledge:Basic understanding of computer forensics for incident investigation.
  5. Log Analysis:Ability to analyze logs to spot patterns and anomalies.
  6. Incident Response:Experience in responding to security incidents effectively.
  7. Threat Intelligence:Understanding of attack patterns and tactics used by cybercriminals.
  8. Communication:Excellent communication skills for reporting and collaboration.
  9. Problem-Solving:Strong analytical and problem-solving abilities.
  10. Adaptability:Ability to adapt quickly to evolving cyber threats.

Qualifications:

  1. Education:Bachelor's degree or higher in Computer Science, Information Technology, Cybersecurity, or a related field.
  2. Experience:Previous experience in a security-related role with a strong understanding of cybersecurity principles and technologies.
  3. Certifications:Relevant certifications such as CompTIA Security+ or equivalent are beneficial.

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Non‑Technical Professionals: Where Do You Fit In?

Defence Needs More Than Hackers in Hoodies When headlines warn of ransomware crippling hospitals or deepfakes swaying elections, we picture hoodie‑clad hackers and elite penetration testers. Yet the reality of the UK’s cyber security sector is broader—and desperately short of talent. The Department for Science, Innovation & Technology (DSIT) estimates a shortfall of 11,200 cyber security professionals in 2024, while 43 % of advertised roles require governance, risk or communication skills rather than hands‑on technical exploits. Put plainly: if you can guide policy, manage projects, interpret regulations or inspire behaviour change, cyber security wants you. This guide highlights the fastest‑growing non‑technical roles, the transferable skills you already possess, and a concrete 90‑day plan to land a cyber security job—no packet sniffers required.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.