National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cyber Security Analyst

University of Manchester
Manchester
1 week ago
Create job alert

About IT Services
IT Services at the University of Manchester is a vibrant and fast-moving department, focusing on delivering excellent customer service and quality services for our staff, students, and researchers.
The Team
You will be part of the Identity and Security group located within the University’s IT Security Operations team. IT Security Operations supports the business operations of the organisation through monitoring, prevention, and rapid mitigation of all incidents adversely impacting the confidentiality, integrity, and availability of its information infrastructure and assets. The goal of the team is to ensure maximum operational uptime of mission-critical IT systems needed by the organisation in its daily operations. Security Operations has four key areas of focus: incident response; network monitoring and intrusion detection; security testing; and vulnerability management. Team members will be expected to work across all of these security functions as needed.
The Role
The Cyber Security Analyst plays a critical role in leading the efforts to keep the University’s systems and networks secure as part of the Tier 1 level of support. The role will be expected to engage with stakeholders across IT Services and the University to understand the security requirements and gauge the effectiveness of the team’s data security initiatives. To maintain the breadth and depth of knowledge, the Cyber Security Analyst will need to keep abreast of emerging technologies, security products, and threats to ensure these are reflected in the University’s security standards and best practices. The role is also expected to have a basic knowledge across all security functions but will primarily be responsible for security monitoring and incident detection, investigation, and response.
The Person
The successful candidate should be able to demonstrate the following:
Experience of providing first-line support as part of a security operations team.
Strong knowledge of cyber security principles, technologies, and best practices.
Experience with analysing event logs and recognising cyber intrusions or attacks.
Experience using tools such as SIEM, IDS/IPS, antivirus, and endpoint protection (e.g. Microsoft Sentinel and Microsoft Defender for Endpoint).
Knowledgeable about network protocols and devices.
Experience of working with Windows, MacOS, and Linux/Unix operating systems.
What can you expect in return
Our diverse job opportunities all include a top benefits package that includes many features that are hard to find in the private sector:
Generous annual leave allowance, including Christmas/New Year closure;
Pension scheme membership to provide benefits for you and your family;
Well-being programme with counselling, fitness, and leading sports facilities;
Learning and development opportunities;
Season ticket loans for public transport;
Cycle to Work Scheme;
Workplace nursery scheme;
Staff recognition schemes;
Staff discounts on a range of products and services including travel and high street savings.
In fact, there are so many benefits available you can see more of them by clicking HERE .
Find out more about our organisation and values:
IT Services: About us and ITS Practice Charter .
When completing the additional information section of your application, please ensure you make reference to the job description and person specification above, as this will form an integral part of the shortlisting process.
As an equal-opportunity employer, we welcome applicants from all sections of the community regardless of age, sex, gender (or gender identity), ethnicity, disability, sexual orientation, and transgender status. All appointments are made on merit.
Our University is positive about flexible working – you can find out more here .
Blended working arrangements may be considered.
Please note that we are unable to respond to enquiries, accept CVs, or applications from Recruitment Agencies.
Enquiries about the vacancy, shortlisting, and interviews:
Name: Please contact our IT Resource Management Team.
Email:
General enquiries:
Email:
Technical support:
Jobtrain:https://jobseekersupport.jobtrain.co.uk/support/home.
This vacancy will close for applications at midnight on the closing date.
Please see the link below for the Further Particulars document which contains the person specification criteria.

#J-18808-Ljbffr

Related Jobs

View all jobs

Cyber Security Analyst

Cyber Security Analyst

Cyber Security Analyst

Cyber Security Analyst

Cyber Security Analyst

Cyber Security Analyst

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.