Engineer the Quantum RevolutionYour expertise can help us shape the future of quantum computing at Oxford Ionics.

View Open Roles

Cyber Security Analyst

Insight Investment
Greater London
1 year ago
Create job alert

Division Description:
The Cyber Security operation's function is responsible for the day-to-day provision of enterprise cyber security services to support the business. These services include all aspects of Cyber Risk Management, implementation and maintenance of technical security controls, vulnerability and patch management and operate effective incident management and cyber investigations.

The department’s key objective is to ensure Insight Investment operates a safe, secure, and resilient IT environment that enables it to confidently go about its day-to-day activity.

Position Description:
The purpose of this role is to design new, mature existing and support the operation of cyber security controls and processes within Insight Investment in line with cyber security risks and the cyber security policies and standards. This includes Identity & Access Management (IAM), PAM security monitoring, cloud security, scheduled security checks, security monitoring working with the MSSP (SIEM and other), security incident management, pen-testing. vulnerability management and KRI/KPI reporting.

Role Responsibilities

• Developing a familiarity with new tools and best practices for security operations
• Defining, implementing and maintaining operational security processes
• Reviewing and maturing the Identity and Access Management process in line with industry best practice
• Reviewing incoming SOC requests/incidents
• Assisting in the investigation of SIEM alarms, reported by the MSSP and performing on call once a month
• Assisting in the operational support for the SIEM MSSP
• Helping to develop and fully document new SIEM use cases including how to respond to alarms
• Performing Cloud Security operations related checks
• Developing and maintaining operational Security KRIs/KPIs
• Maintaining technical documentation of operational security controls
• Providing 1/2nd line security incident response capabilities within the Insight SOC
• Creating schedules, writing up Pen-test findings from the report and following through mitigations/remediation plans
• Assisting in the development of new and changes to existing security policies and standards
• Supporting internal and external audits evidence gathering of cyber security
• Chairing Vulnerability management meetings and following through on reports and remediations with the tech teams. Performing risk analysis on when vulnerability management incidents
• Being integral to projects related to Security Operations
• Staying up to date with the latest threat intelligence and threat hunting methodologies to recommend improvements to current processes and security controls
• Performing DSAR requests


Experience Required

• 5 years+ experience in a SOC environment
• Strong communication and collaboration skills
• Fast high paced environment with the ability to work with strict timed deadlines
• Strong prioritisation and an ability to handle multi-tasking situations
• A positive and enthusiastic attitude to investigate and find solutions to security problems
• Hands on experience in the operation of security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, vulnerability management, etc.
• Technical working knowledge of security systems including:
- Network and application firewalls reviews and approvals
- IDS/IPS systems
- Web Proxies and Content Filtering
- Endpoint security including antivirus, host-based firewalls and execution control (Trend Micro an advantage)
- Authentication technologies (Active Directory)
- Network Access Management.
- Privilege Access Management (CyberArk would be an advantage)
- VMWare including VDI
- Vulnerability Management tools. (Qualys VMDR, CSAM and/or Asset management would be an advantage)
- Endpoint Detection Response (EDR)
- Pen-test write up and remediation
- Forensics investigations
- Cloud security in MS Azure
• Experience of participating in security incident response including identification, preservation and interpretation of computer evidence
• Familiarity with database and operating system security
• Threat hunting
• Defence in Depth techniques
• Previous experience working in a technical information security role with similar responsibilities to the above
• Experience in being a key stakeholder in projects with proof of concept
• Experience in being 2nd line incident responder when liaising with MSSP
• Experience in being on-call and escalate where necessary
• Security Certification (e.g. CISSP, SANS, CEH)

Advantageous (not essential)

• Cloud Secrets Management (Cloud Vaults / Key Management & Rotation / MFA / Passwords).
• Scripting tool such as Python etc.
• API Security


Insight is committed to being an inclusive employer and encourages applications from all suitably qualified applicants irrespective of background, circumstances, age, disability, gender identity, ethnicity, religion or belief and sexual orientation.

Related Jobs

View all jobs

Cyber Security Analyst

cyber security Analyst

Cyber Security Analyst

Cyber Security Analyst

Information Security Analyst - Audit & Compliance

Cyber Security Analyst

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Pre-Employment Checks for Cyber Security Jobs: DBS, References & Right-to-Work and more Explained

The cyber security sector in the UK stands at the forefront of protecting national infrastructure, business operations, and personal data from increasingly sophisticated cyber threats. As organisations across all sectors recognise cyber security as a critical business function, employers are implementing the most rigorous pre-employment screening processes in the technology industry to ensure they recruit professionals capable of defending against advanced persistent threats and maintaining the highest standards of security and trustworthiness. Whether you're a penetration tester, security analyst, incident response specialist, or chief information security officer, understanding the comprehensive vetting requirements is essential for successfully advancing your career in this security-critical field. This detailed guide explores the extensive background checks and screening processes you'll encounter when applying for cyber security positions in the UK, from fundamental eligibility verification to the most stringent security clearance requirements and specialised threat intelligence assessments.

Why Now Is the Perfect Time to Launch Your Career in Cyber Security: The UK's Digital Defence Revolution

The United Kingdom faces an unprecedented cyber security challenge that presents an extraordinary career opportunity. With cyber attacks increasing by 300% year-on-year and the average cost of a data breach reaching £4.24 million, Britain urgently needs skilled cyber security professionals to defend its digital infrastructure, protect citizens' data, and maintain national security in an increasingly connected world. If you've been considering a career change or seeking to future-proof your professional trajectory, cyber security represents one of the most secure, well-compensated, and socially impactful career choices available. The convergence of escalating threats, skills shortage, government investment, and regulatory requirements has created a perfect storm of opportunity that shows no signs of abating.

Automate Your Cyber Security Jobs Search: Using ChatGPT, RSS & Alerts to Save Hours Each Week

Cyber roles drop across consultancies, MSSPs, hyperscalers, banks, gov & start-ups every day—often buried in ATS portals or duplicated across boards. The fix is simple: put discovery on autopilot with keyword-rich alerts, RSS feeds & a reusable ChatGPT workflow that triages listings, ranks fit, & tailors your CV in minutes. This copy-paste playbook is built for www.cybersecurityjobs.tech readers. It’s UK-centric, practical, & designed to save you hours each week. What You’ll Have Working In 30 Minutes A role & keyword map spanning SecOps/Detection, DFIR, AppSec, Cloud Security, GRC, Red Team, Threat Intel, IAM/PAM, OT/ICS & Vulnerability Management. Shareable Boolean search strings for Google & job boards to cut noise fast. Always-on alerts & RSS feeds delivering fresh roles to your inbox/reader. A ChatGPT “Cyber Job Scout” prompt that deduplicates, scores fit & outputs tailored actions. A simple pipeline tracker so deadlines & follow-ups never slip.