Shape the Future of AIJoin one of the UK's fastest-growing companies and become a Professional Development Expert in Artificial Intelligence.

View Roles

Cyber Security Analyst

Connect2Employment
Luton
3 days ago
Create job alert

Main purpose of post:

The Cybersecurity Department with our client provide support for all electronic communications systems at the site, as well as taking a leading role in delivering technology change / improvement projects and managing external support agreements.

The Cyber Security Analyst is required to focus on the detection, investigation and response to cyber security events and incidents. Other tasks involve BAU security tasks, supporting cyber security projects and assisting with regulatory compliance.

Daily tasks will involve the following:

  • Endpoint monitoring and analysis.

  • Incident readiness and handling as part of the Computer Security Incident Response (CSIRT) team.

  • Monitor and administer Security Information and Event Management (SIEM).

  • Malware analysis and forensics research.

  • Understanding/ differentiation of intrusion attempts and false positives.

  • Investigation tracking and threat resolution.

  • Vulnerability identification & mitigation / remediation.

  • Compose security alert notifications.

  • Advise incident responders & other teams on threat.

  • Triage security events and incidents apply containment and mitigation/remediation strategies.

  • Generate reports and document security incidents / events.

  • Proactively monitoring the performance of systems, and make regular routine inspections of installed equipment and take corrective avoidance actions to prevent wider problems.

  • Act as the point of escalation for the Service desk for security related tickets.

  • Analysis of weekly vulnerability scans and update relevant records.

    Essential

  • A well organised and structured approach to work planning, time allocation to tasks, and a flexible approach to daily routines to deliver the desired results.

  • An ambition to constantly learn new skills and develop knowledge, with an understanding that study time outside of working hours may be required for career development.

  • Credible knowledge/experience in Microsoft Windows Operating Systems.

  • Credible knowledge/experience of Active Directory, Group policies, TCP/IP, DNS, DHCP and Exchange Server.

  • Capable of effectively multi-tasking, prioritizing work, and handling competing interests

  • Capable of analysing information technology logs and events sources preferred

  • Working knowledge of data storage systems, data backup and restoration methods.

  • Understanding of security tooling, its purpose and functionality (Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, next generation firewall/UTMs)

  • Ability to work independently while managing support to a high standard

  • Contribute credibly to IT department's delivery of SLAs and other support targets

  • Self-motivated to advance own knowledge & gain formal qualifications

  • Ability to analyse vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence

  • Advanced knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing

  • Knowledge of Cloud computing, computer network defence, identity management, incident management and network security.

  • Significant experience within a SOC environment.

  • Incident response experience

  • Qualification / Certification in Cyber Security

    Desirable

  • IT Qualifications / Certifications such as CompTIA A+, Network+, Security+

  • IT Helpdesk experience or knowledge

  • Cyber Security Operation Centre experience

  • Qualification / Certification in Cyber Security

    Person Specification:

  • Communication. Structures and conveys information and ideas effectively. Communicates to ensure they are understood by others, that they understand others and share information with colleagues at all levels.

  • Achieving results. Knows what needs to be achieved by when. Anticipates obstacles. Motivates self and others to overcome barriers and achieve results.

  • Planning & Organising. Identifies a goal and puts in place a sequence of steps to ensure priorities are delivered on time, making effective use of resources

  • Team Focus. Develops effective working relationships inside and outside traditional boundaries to achieve organisational goals. Breaks down barriers between groups and involves others in discussions and decisions

    You will be required to pass a range of referencing and vetting checks, including a Criminal Record Check and a Counter Terrorism Check (CTC). You must also have lived in the UK for at least 3 years with a 5-year work history, unless in education.

    Connect2Employment is a trading style of Luton & Kent Commercial Services LLP - A joint venture between Luton Borough Council & Commercial Services Kent Ltd. Connect2Employment is an equal opportunities Employment Agency & Business. It positively encourages applications from all suitably qualified and eligible candidates

Related Jobs

View all jobs

Cyber Security Analyst

Cyber Security Analyst

ICT Security Analyst

Cyber security Analyst

Cyber Security Analyst

Cyber Security Analyst - (M/F/D)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

10 Cyber Security Recruitment Agencies in the UK You Should Know (2025 Job‑Seeker Guide)

UK cyber security hiring remains resilient in 2025, driven by nation-state threats, cloud security investments, and NCSC regulatory pressures. Lightcast reports +42 % YoY growth in UK roles mentioning “SOC”, “cyber risk”, “offensive security” or “GRC”. Yet despite 30,000 active cyber professionals, monthly live vacancies remain in the 2,500–2,900 range. The result: strong demand across public and private sector. We reviewed 50 + consultancies and included only those that: Are registered in the UK (Companies House) Operate a dedicated Cyber Security / InfoSec / Risk & Compliance desk Posted at least 5 UK cyber security roles between March and June 2025 This guide includes 2025 salary ranges, key skills, interview prep tips, and a verified recruiter directory.

Cyber Security Jobs Skills Radar 2026: Emerging Frameworks, Tools & Certifications to Learn Now

Cyber threats are evolving—and so must the people defending against them. As ransomware, AI-enhanced phishing, and supply chain attacks grow more advanced, UK employers are urgently hiring cyber security professionals with the right mix of strategic and hands-on skills. Welcome to the Cyber Security Jobs Skills Radar 2026, your go-to guide for the most in-demand tools, frameworks, certifications, and technologies shaping the UK's cyber workforce. Whether you're a SOC analyst, penetration tester, or cloud security architect, this annual radar is designed to help you stay ahead of the market.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.