Cyber Security Analyst

University of Manchester
Manchester
7 months ago
Applications closed

Related Jobs

View all jobs

Cyber Security Analyst - Training Course

Cyber Security Analyst - Training Course

Cyber Security Analyst - Training Course

IT Security Analyst

Trainee Cyber Security Analyst - Training Course

IT Cyber Security Analyst Technical Trainee Scheme

About IT Services
IT Services at the University of Manchester is a vibrant and fast-moving department, focusing on delivering excellent customer service and quality services for our staff, students, and researchers.
The Team
You will be part of the Identity and Security group located within the University’s IT Security Operations team. IT Security Operations supports the business operations of the organisation through monitoring, prevention, and rapid mitigation of all incidents adversely impacting the confidentiality, integrity, and availability of its information infrastructure and assets. The goal of the team is to ensure maximum operational uptime of mission-critical IT systems needed by the organisation in its daily operations. Security Operations has four key areas of focus: incident response; network monitoring and intrusion detection; security testing; and vulnerability management. Team members will be expected to work across all of these security functions as needed.
The Role
The Cyber Security Analyst plays a critical role in leading the efforts to keep the University’s systems and networks secure as part of the Tier 1 level of support. The role will be expected to engage with stakeholders across IT Services and the University to understand the security requirements and gauge the effectiveness of the team’s data security initiatives. To maintain the breadth and depth of knowledge, the Cyber Security Analyst will need to keep abreast of emerging technologies, security products, and threats to ensure these are reflected in the University’s security standards and best practices. The role is also expected to have a basic knowledge across all security functions but will primarily be responsible for security monitoring and incident detection, investigation, and response.
The Person
The successful candidate should be able to demonstrate the following:
Experience of providing first-line support as part of a security operations team.
Strong knowledge of cyber security principles, technologies, and best practices.
Experience with analysing event logs and recognising cyber intrusions or attacks.
Experience using tools such as SIEM, IDS/IPS, antivirus, and endpoint protection (e.g. Microsoft Sentinel and Microsoft Defender for Endpoint).
Knowledgeable about network protocols and devices.
Experience of working with Windows, MacOS, and Linux/Unix operating systems.
What can you expect in return
Our diverse job opportunities all include a top benefits package that includes many features that are hard to find in the private sector:
Generous annual leave allowance, including Christmas/New Year closure;
Pension scheme membership to provide benefits for you and your family;
Well-being programme with counselling, fitness, and leading sports facilities;
Learning and development opportunities;
Season ticket loans for public transport;
Cycle to Work Scheme;
Workplace nursery scheme;
Staff recognition schemes;
Staff discounts on a range of products and services including travel and high street savings.
In fact, there are so many benefits available you can see more of them by clicking HERE .
Find out more about our organisation and values:
IT Services: About us and ITS Practice Charter .
When completing the additional information section of your application, please ensure you make reference to the job description and person specification above, as this will form an integral part of the shortlisting process.
As an equal-opportunity employer, we welcome applicants from all sections of the community regardless of age, sex, gender (or gender identity), ethnicity, disability, sexual orientation, and transgender status. All appointments are made on merit.
Our University is positive about flexible working – you can find out more here .
Blended working arrangements may be considered.
Please note that we are unable to respond to enquiries, accept CVs, or applications from Recruitment Agencies.
Enquiries about the vacancy, shortlisting, and interviews:
Name: Please contact our IT Resource Management Team.
Email:
General enquiries:
Email:
Technical support:
Jobtrain:https://jobseekersupport.jobtrain.co.uk/support/home.
This vacancy will close for applications at midnight on the closing date.
Please see the link below for the Further Particulars document which contains the person specification criteria.

#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.