National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cyber Security Analyst

University of Manchester
Manchester
4 weeks ago
Applications closed

Related Jobs

View all jobs

Cyber Security Analyst

Cyber Security Analyst

Cyber Security Analyst

Cyber Security Analyst

cyber security analyst ot

The Client - Cyber Security Analyst

About IT Services
IT Services at the University of Manchester is a vibrant and fast-moving department, focusing on delivering excellent customer service and quality services for our staff, students, and researchers.
The Team
You will be part of the Identity and Security group located within the University’s IT Security Operations team. IT Security Operations supports the business operations of the organisation through monitoring, prevention, and rapid mitigation of all incidents adversely impacting the confidentiality, integrity, and availability of its information infrastructure and assets. The goal of the team is to ensure maximum operational uptime of mission-critical IT systems needed by the organisation in its daily operations. Security Operations has four key areas of focus: incident response; network monitoring and intrusion detection; security testing; and vulnerability management. Team members will be expected to work across all of these security functions as needed.
The Role
The Cyber Security Analyst plays a critical role in leading the efforts to keep the University’s systems and networks secure as part of the Tier 1 level of support. The role will be expected to engage with stakeholders across IT Services and the University to understand the security requirements and gauge the effectiveness of the team’s data security initiatives. To maintain the breadth and depth of knowledge, the Cyber Security Analyst will need to keep abreast of emerging technologies, security products, and threats to ensure these are reflected in the University’s security standards and best practices. The role is also expected to have a basic knowledge across all security functions but will primarily be responsible for security monitoring and incident detection, investigation, and response.
The Person
The successful candidate should be able to demonstrate the following:
Experience of providing first-line support as part of a security operations team.
Strong knowledge of cyber security principles, technologies, and best practices.
Experience with analysing event logs and recognising cyber intrusions or attacks.
Experience using tools such as SIEM, IDS/IPS, antivirus, and endpoint protection (e.g. Microsoft Sentinel and Microsoft Defender for Endpoint).
Knowledgeable about network protocols and devices.
Experience of working with Windows, MacOS, and Linux/Unix operating systems.
What can you expect in return
Our diverse job opportunities all include a top benefits package that includes many features that are hard to find in the private sector:
Generous annual leave allowance, including Christmas/New Year closure;
Pension scheme membership to provide benefits for you and your family;
Well-being programme with counselling, fitness, and leading sports facilities;
Learning and development opportunities;
Season ticket loans for public transport;
Cycle to Work Scheme;
Workplace nursery scheme;
Staff recognition schemes;
Staff discounts on a range of products and services including travel and high street savings.
In fact, there are so many benefits available you can see more of them by clicking HERE .
Find out more about our organisation and values:
IT Services: About us and ITS Practice Charter .
When completing the additional information section of your application, please ensure you make reference to the job description and person specification above, as this will form an integral part of the shortlisting process.
As an equal-opportunity employer, we welcome applicants from all sections of the community regardless of age, sex, gender (or gender identity), ethnicity, disability, sexual orientation, and transgender status. All appointments are made on merit.
Our University is positive about flexible working – you can find out more here .
Blended working arrangements may be considered.
Please note that we are unable to respond to enquiries, accept CVs, or applications from Recruitment Agencies.
Enquiries about the vacancy, shortlisting, and interviews:
Name: Please contact our IT Resource Management Team.
Email:
General enquiries:
Email:
Technical support:
Jobtrain:https://jobseekersupport.jobtrain.co.uk/support/home.
This vacancy will close for applications at midnight on the closing date.
Please see the link below for the Further Particulars document which contains the person specification criteria.

#J-18808-Ljbffr

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.