National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Information Security Analyst (City of London)

NorthMark Strategies
City of London
3 days ago
Create job alert

The Company:

NorthMark Strategies is a leading investment firm, combining capital, innovation, and engineering to drive long-term value. From operating complex businesses to backing breakthrough technologies, our mission is to build enduring businesses. Our team combines intelligent risk-taking, operational excellence, exceptional talent, and world-class computing capacity to create shareholder value.


Our company offers a dynamic environment where individuals have the freedom to lead companies toward bold achievements by embracing innovation, leveraging technology, and fostering differentiated business strategies. Our values are Integrity, Ability, and Energy, and the company aims to hire individuals who possess those qualities.


At NorthMark Strategies, we believe the future isn’t something to hope for, it’s something to build. We don’t just invest, we create. Bringing together strategic insight and technical horsepower to deliver outcomes that endure.


The Position

The IT Security team is responsible for the oversight and execution of a “cloud-first” Cyber Defense, Business Continuity and Risk Management programs to support our business goals. This includes, but is not limited to security operations, vulnerability and patch management, incident response, disaster recovery, business continuity, risk identification and mitigation planning / implementation, identity management, network security, privacy, and compliance.


In the Cyber Defense Security Analyst role, you will be working to help build and maintain security programs at a rapidly growing investment company as well as its associated holdings. You will report to the Manager, Cyber Defense Operations and will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents and executing strategies to detect and deter insider threats. This position will serve as a project member on multiple projects simultaneously and will interact regularly with technical subject matter experts.


The ideal candidate will hold a Bachelor of Science degree in Information/Cyber Security or applicable field and have at least 3+ years of experience in a Security or Technology role. The candidate must possess a strong understanding of the role of Information Security Policies and Standards and a proficient understanding of the Microsoft 365 / Azure platforms/ AWS


Responsibilities:

  • Monitor security event logs and alerts generated by various security technologies, including SIEM, IDS/IPS, firewalls, and endpoint protection systems.
  • Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.
  • Identify, analyze, and assess potential insider threats through behavioral analytics, log review, and threat intelligence.
  • Maintain and improve SOC processes and procedures, staying current with the latest security trends and technologies.
  • Assist in developing strategies to handle security incidents and coordinate responses to insider threats.
  • Support the development and implementation of use cases, detection rules, and playbooks.
  • Perform threat hunting activities to proactively identify threats within the environment.
  • Continuously review and refine insider risk policies to ensure they are effective and up to date.
  • Develop and implement automated processes for monitoring and enforcing insider risk policies.
  • Participation in security root cause analysis and forensics as part of NorthMark Strategies’ Cyber Incident Response Plan.
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences.
  • Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats.


Requirements and Qualifications

  • At least 3 years of experience in a SOC analyst role or similar cybersecurity position.
  • Bachelors of Science in Information/Cyber Security or a related field (or equivalent work experience)
  • Proficiency in Microsoft 365 security tools and collaboration technologies.
  • Proficiency in Cloud Computing Service security (Azure & AWS).
  • Proficiency in security tools and technologies for monitoring insider threats
  • Experience threat hunting in Microsoft 365 environments to identify insider risk threats.
  • Strong understanding of insider threat principles and programs
  • Previous experience in an incident response or DFIR role a strong plus.
  • Interpersonal and collaborative skills and the ability to communicate security and risk-related concepts to technical and nontechnical audiences.
  • Innovative, creative, curious, and passionate about Information Security and Technology.
  • High degree of initiative, dependability, and ability to work with little supervision.
  • Ability to formulate a clear and actionable plan and execute against it.

Related Jobs

View all jobs

Information Security Analyst

Information Security Analyst (City of London)

Information Security Analyst, SOC (Manchester)

Information Security Analyst (Manchester)

Information Security Analyst, SOC (Manchester)

Information Security Analyst

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.