L3 Security Analyst

Charterhouse
Peterborough
1 month ago
Applications closed

Related Jobs

View all jobs

SOC Manager

L2 & L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel

Charterhouse Group is a UK based, PE backed, value-added reseller providing a wide range of technology solutions across the Unified Communications, Cyber Security, LAN and Microsoft Teams spaces. The Group operates under two brands, Charterhouse Integrated Solutions and Symity Pentesec.


Symity Pentesec is a market leader in delivering innovative network and cyber security solutions. We pride ourselves on creating secure, scalable, and robust systems that empower businesses to thrive in an increasingly digital world. Our people-focused approach and industry expertise have made us a trusted partner for organisations of all sizes.


Our depth of expertise and customer focus across both our professional and managed services have won us industry recognition. We have been honoured as Checkpoint Partner of the Year for a record three times, a testament to our unparalleled dedication and proficiency in the field. Additionally, our commitment to excellence has earned us the coveted status of 'Elite Partner', further cementing our reputation as leaders in network security.


Our managed security services, particularly the Security Operations Center (SOC), are pivotal to our business operations. The SOC, while currently a small team, is a strategic element poised for growth, reinforcing our commitment to delivering unparalleled security solutions. We pride ourselves on our technical excellence and innovation, ensuring that our clients receive the highest levels of protection and value. As we continue to expand our SOC capabilities, we remain dedicated to providing cutting-edge security measures that safeguard our clients' digital assets in an ever-evolving threat landscape.


Role Purpose

The purpose of the Level 3 Security Analyst role within Symity Pentesec's SOC is to elevate our commitment to technical excellence and innovation in network and cyber security to new heights. This role is fundamental in not only maintaining but also advancing the high standards of service that our clients expect and rely on. The Level 3 Security Analyst is entrusted with leading complex security analyses, overseeing critical security incidents, and providing strategic insights to pre-empt potential threats, all while aligning with our stringent service level agreements (SLAs).


Requirements

The Level 3 Security Analyst's leadership and expertise are crucial for both enhancing the internal efficacy of our operations and bolstering the confidence our customers have in our capabilities. By conducting advanced threat analyses and spearheading comprehensive vulnerability assessments, the Level 3 Security Analyst ensures robust protection of our clients' digital assets. This position demands an exceptional level of technical proficiency, strategic foresight in addressing security challenges, and an unwavering commitment to excellence. The analyst's role in refining incident response protocols, engaging in high-level continuous professional development, and driving forward-thinking service enhancements is vital in strengthening our status as an industry beacon.


The Level 3 Security Analyst is also responsible for mentoring and transferring knowledge to the SOC Level 2 and Level 1 team members. This involves guiding them in best practices, enhancing their technical skills, and ensuring they are equipped to handle security incidents effectively. By fostering a culture of continuous learning and professional growth, the Level 3 Security Analyst helps build a stronger, more capable team.


Excellence in this role involves setting the standard for addressing immediate security concerns while fostering long-term advancements and innovations that benefit both Symity Pentesec and our extensive client base. The Level 3 Security Analyst epitomizes our core values of responsibility, passion, and integrity, ensuring that every action undertaken is executed with the highest degree of accuracy and dedication. Their contributions are instrumental in shaping the future trajectory of our SOC services, creating a synergy between cutting-edge security measures and unparalleled customer support.


Technical Skills

  1. Network Security - Understanding of network architecture, firewalls, VPNs, IDS/IPS, and other network security measures.
  2. Incident Response - Proficiency in detecting, analysing, and responding to security incidents.
  3. Threat Analysis - Ability to identify and assess cyber threats and vulnerabilities.
  4. In-depth Experience building analytic queries using Kusto Query Language (KQL) or similar.
  5. Vulnerability Management - Experience with vulnerability management and reporting solutions, assessing customer vulnerabilities, creating regular reporting packs, devising mitigation strategies and working with customers to support their implementation of these plans.
  6. Security Information and Event Management (SIEM) - In-depth experience with SIEM tools for monitoring and analysing security events.
  7. Security Orchestration, Automation & Response (SOAR) - Experience using SOAR platforms to integrate automated processes across a SOC service. Ability to work alongside engineering to test and implement such automations.
  8. Malware Analysis - Skills in identifying, dissecting and mitigating malware threats.
  9. Forensic Analysis - Knowledge of digital forensics to investigate and remediate security breaches.
  10. Threat Hunting - Experience running threat hunts across large datasets, identifying behavioural anomalies and other indicators of compromise (IOCs).
  11. Threat intelligence - Experience integrating threat intelligence data into SOC services and processes, enriching alert data with relevant intelligence.
  12. User and Entity Behaviour Analytics (UEBA) - Experience using and integrating UEBA tools within a SOC setting.
  13. Encryption Techniques - Familiarity with encryption standards and methods to protect sensitive data.
  14. Endpoint Security - Expertise in securing endpoints such as computers, mobile devices, and servers.


Analytical Skills

  1. Problem-Solving - Strong ability to diagnose and resolve security issues efficiently.
  2. Attention to Detail - Keen eye for identifying subtle anomalies and potential security threats.
  3. Data Analysis - Proficiency in interpreting and correlating data from various sources to identify patterns and trends.
  4. Risk Assessment - Ability to evaluate and prioritise risks to develop effective mitigation strategies.


Communication Skills

  1. Report Writing - Capability to document security incidents, analyse results, and make recommendations clearly and concisely.
  2. Team Collaboration - Strong interpersonal skills to work effectively with internal teams and third-party vendors.
  3. Team Mentoring - Ability to mentor junior team members, providing technical guidance as needed to support them in their duties as well as creating and delivering training content.
  4. Client Communication - Ability to explain technical concepts and security measures to non-technical clients.
  5. Presentation Skills - Experience in delivering findings and recommendations to stakeholders in an engaging manner.


Soft Skills

  1. Adaptability - Willingness to stay updated with the latest security trends and technologies.
  2. Diligence - Excellent attention to detail including ensuring high quality notes and updates on incidents, and clear suitable language to clients.
  3. Time Management - Efficiently managing time and prioritising tasks in a fast-paced environment, delivering against client SLAs and internal deadlines.
  4. Integrity - Upholding ethical standards and maintaining confidentiality of sensitive information.
  5. Continuous Learning - Commitment to ongoing education and certification in the field of cybersecurity.


Desired Knowledge, Skills and Experience

Candidates who can demonstrate the following desired knowledge, skills, and experience, in addition to the required skills listed above, will be considered favourably.


Technical Skills

  1. Microsoft Defender XDR / Purview
  2. Microsoft Sentinel SIEM
  3. Rapid 7 SIEM (IDR) and vulnerability management (IVM) tooling
  4. SentinelOne EDR experience
  5. Exposure to Azure / AWS / GCP


Certifications (Preferred)

  1. Certified Information Systems Security Professional (CISSP)
  2. Certified Ethical Hacker (CEH)
  3. CompTIA Security+
  4. Certified Incident Handler (GCIH)
  5. Certified Information Security Manager (CISM)
  6. SC-200 - Microsoft Certified: Security Operations Analyst Associate


Benefits

Join us, and your benefits and perks will include private healthcare, Medicash cashback, life assurance, workplace pension, cycle to work scheme, access to our employee assistance programme, a volunteering day, 20% EE discount that extends to your family and friends, a birthday gift voucher and day off, plus more.


Charterhouse is where careers happen. We offer a supportive, innovative, stimulating and fast-paced environment where development, reward and recognition are available to everyone, and anything is possible. As you transform our client's approach to technology, we'll help you transform your career through progression, reward, development and recognition.

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.