Cyber Security Analyst

Luton
3 weeks ago
Applications closed

Related Jobs

View all jobs

Cyber Security Analyst

Cyber Security Analyst

Cyber Security Analyst - Training Course

Cyber Security Analyst - Training Course

Cyber Security Analyst - Training Course

IT Security Analyst

Main purpose of post:

The Cybersecurity Department with our client provide support for all electronic communications systems at the site, as well as taking a leading role in delivering technology change / improvement projects and managing external support agreements.

The Cyber Security Analyst is required to focus on the detection, investigation and response to cyber security events and incidents. Other tasks involve BAU security tasks, supporting cyber security projects and assisting with regulatory compliance.

Daily tasks will involve the following:

  • Endpoint monitoring and analysis.

  • Incident readiness and handling as part of the Computer Security Incident Response (CSIRT) team.

  • Monitor and administer Security Information and Event Management (SIEM).

  • Malware analysis and forensics research.

  • Understanding/ differentiation of intrusion attempts and false positives.

  • Investigation tracking and threat resolution.

  • Vulnerability identification & mitigation / remediation.

  • Compose security alert notifications.

  • Advise incident responders & other teams on threat.

  • Triage security events and incidents apply containment and mitigation/remediation strategies.

  • Generate reports and document security incidents / events.

  • Proactively monitoring the performance of systems, and make regular routine inspections of installed equipment and take corrective avoidance actions to prevent wider problems.

  • Act as the point of escalation for the Service desk for security related tickets.

  • Analysis of weekly vulnerability scans and update relevant records.

    Essential

  • A well organised and structured approach to work planning, time allocation to tasks, and a flexible approach to daily routines to deliver the desired results.

  • An ambition to constantly learn new skills and develop knowledge, with an understanding that study time outside of working hours may be required for career development.

  • Credible knowledge/experience in Microsoft Windows Operating Systems.

  • Credible knowledge/experience of Active Directory, Group policies, TCP/IP, DNS, DHCP and Exchange Server.

  • Capable of effectively multi-tasking, prioritizing work, and handling competing interests

  • Capable of analysing information technology logs and events sources preferred

  • Working knowledge of data storage systems, data backup and restoration methods.

  • Understanding of security tooling, its purpose and functionality (Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, next generation firewall/UTMs)

  • Ability to work independently while managing support to a high standard

  • Contribute credibly to IT department's delivery of SLAs and other support targets

  • Self-motivated to advance own knowledge & gain formal qualifications

  • Ability to analyse vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence

  • Advanced knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing

  • Knowledge of Cloud computing, computer network defence, identity management, incident management and network security.

  • Significant experience within a SOC environment.

  • Incident response experience

  • Qualification / Certification in Cyber Security

    Desirable

  • IT Qualifications / Certifications such as CompTIA A+, Network+, Security+

  • IT Helpdesk experience or knowledge

  • Cyber Security Operation Centre experience

  • Qualification / Certification in Cyber Security

    Person Specification:

  • Communication. Structures and conveys information and ideas effectively. Communicates to ensure they are understood by others, that they understand others and share information with colleagues at all levels.

  • Achieving results. Knows what needs to be achieved by when. Anticipates obstacles. Motivates self and others to overcome barriers and achieve results.

  • Planning & Organising. Identifies a goal and puts in place a sequence of steps to ensure priorities are delivered on time, making effective use of resources

  • Team Focus. Develops effective working relationships inside and outside traditional boundaries to achieve organisational goals. Breaks down barriers between groups and involves others in discussions and decisions

    You will be required to pass a range of referencing and vetting checks, including a Criminal Record Check and a Counter Terrorism Check (CTC). You must also have lived in the UK for at least 3 years with a 5-year work history, unless in education.

    Connect2Employment is a trading style of Luton & Kent Commercial Services LLP - A joint venture between Luton Borough Council & Commercial Services Kent Ltd. Connect2Employment is an equal opportunities Employment Agency & Business. It positively encourages applications from all suitably qualified and eligible candidates

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.