IT Security Analyst

Interface Recruitment UK
Leeds
6 months ago
Applications closed

Related Jobs

View all jobs

IT SECURITY ANALYST

SOC Threat Detection Analyst

CyberSecurity – Operations Engineer

Cyber Security Analyst - Training Course

Security and Governance Analyst

Trainee Cyber Security Analyst - No experience needed

Industry: Professional Services

Job Title: IT Security Analyst

Location: 2 Tower Works, Globe Road, Leeds, LS11 9QG

Shaping the overall Security focus of this large Professional Services firm will see the successful applicant open many more career opportunities throughout the organisation and work with autonomy that rarely exists in the market. The role is responsible for ensuring an appropriate focus is maintained on confidentiality, integrity and availability in the IT Security, Disaster Recovery and Business Continuity programs with a view to protecting the firm from risks inherent in operating a modern IT environment.

Responsibilities:

  • Implement, monitor and develop security controls to safeguard information assets.
  • Co-ordinate with Management and other IT personnel to identify and plan security controls in all aspects of data, applications, hardware, telecommunications and computer installations.
  • To continually improve the quality of the IT service delivered through proactivity and good communication.

Operational Security Coordination:

  • Monitor and coordinate with other team members to ensure that all security patches and anti-virus software is maintained to current levels on a timely basis.
  • Actively contribute to educating and raising awareness across the firm in relation to information security and cyber threats.
  • Assist with the investigation of information security incidents.
  • Maintain awareness of the threat landscape and take steps to minimise the impact this has on the IT environment.
  • Suggest and manage the implementation of controls to reduce the risks to the IT environment.
  • Coordinate the IT security testing cycle including the Penetration Testing, Cyber Essentials Plus and Phishing Susceptibility Testing.
  • Contribute to the completion of security questionnaires in accordance with requirements.
  • Create remediation plans and coordinate appropriate resources to close issues raised during security testing and audits.
  • Ensure all security updates detailed below have been applied and verified by the appropriate delivery team within the required timescales:
  1. a) all security software (e.g. operating systems and applications).
  2. b) all security hardware (e.g. firewalls, etc).
  3. c) all server applications (e.g. Exchange, SQL etc).
  4. d) all network devices such as switches and routers.
  5. e) ensure daily backups for storage and servers are taken and verified.
  • Assist the Head of IT with the management of the IT Risk Register.
  • Identify technical vulnerabilities and manage the remediation process.

Disaster recovery:

  • Ensure confidentiality, integrity and availability of IT systems during a business interruption event.

Security Support for Projects:

  • Working alongside the Information Security Manager, provide advice and guidance pertaining to the IT security and information security risk aspects of projects.
  • Identify security initiatives and work with the Information Security Manager to ensure that projects to mitigate security risks are defined and deployed.

Documentation:

  • Contribute and update documentation relating to the confidentiality, integrity and availability of the IT environment.

Education Requirements & Qualifications (preferable but not essential):

  • Educated to a degree level.
  • Qualification in CompTIA Security+ or equivalent.

Experience Requirements:

  • IT - minimum 5 years – experienced probably gained through working in an infrastructure, system administration or security role.
  • Working with security standards such as ISO 27001, PCI-DSS, Cyber Essentials Plus.
  • Encryption Key Management.
  • Writing technical documentation.
  • Drafting policy documents.
  • Presenting to Teams and Senior Management.
  • Experience of creating, adapting and following Best Practice procedures (such as ITIL) would be advantageous.

Work Hours:

  • 9:00 am until 5:30 pm.


#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.