Security Analyst

KYOCERA Document Solutions UK
Reading
5 days ago
Create job alert

Security Analyst – 2nd Line SDA

Division:ICT Services

Department:ICT Service Desk Operations

Reports to:Service Desk Team Leader


Main Goal

The Service Desk Analyst - Security Analyst (2nd line) role is to support the stable operation of clients Infrastructure and Applications with a specific focus on IT Security. Providing 2nd line support to all employees and companies that fall under a Managed Service Contract.


Responsibilities/Tasks

  • Interrogation of the Service Desk ticketing system throughout the day to provide effective responses and resolutions to queries or incidents. Ensuring that raised tickets are responded to within SLA timescales.
  • Responding to calls or e-mails on the service desk, adhering to strict Service Level Agreements for fault resolutions and service requests completions. Provide customer service to internal and external customers to ensure a consistent experience. Adopt a proactive approach towards all client activities.
  • Day to day incident management and proactive monitoring of IT Security Systems and associated platforms and components
  • Coordinate small teams delivering security related work packages in line with the company process to meet customer and business requirements.
  • Document and report on work completed to ensure security compliance with customer and company procedures.
  • Escalate issues in line with company processes to ensure customer demands are met. Evaluate escalations and action appropriately to ensure customer demands are met.
  • Able to adapt quickly to dynamic team environments to maintain consistent effective contribution.
  • Act in accordance with our information security policies and report any potential or actual Security events or other Security risks to the operation.
  • Support Service Desk team to ensure IT Platforms are security hardened to latest best practice and review planned changes that impact security.
  • Carry out installations and configurations of end user workstation hardware, software, networked peripheral devices, cabling, and networking hardware and software products.
  • Support end user workstation hardware, software, networked peripheral devices, cabling, and networking hardware and software products by testing, maintaining, monitoring, and troubleshooting in order to determine source of computer problems (hardware, software, user access, etc.)
  • Conduct updates of technical documents and knowledge base to ensure that any changes to set up, location or configuration of kit is logged in a timely and appropriate manner, where any additional hardware or software is included within the network component inventory.
  • Prepare, maintain, and adhere to procedures for logging, reporting, and statistically monitoring network data as directed.
  • Adhere to business continuity and disaster recovery plans, and maintain current knowledge of plan executables.
  • Respond to emergency network outages in accordance with business continuity and disaster recovery plans.
  • Perform system backups and recovery with all systems in line with the backup policy as directed.
  • Administer and maintain end user accounts, permissions, and access rights as directed by change requests from the Service Desk and in line with the Network Security Policy.
  • Manage and support ISO, Cyber Security Essentials and other accreditations aligned with security objectives.
  • Manage and support security patching consider both internal and external requirements.
  • Creating and reviewing security related service desk processes and procedures.
  • Identify own development needs in line with business objectives and direction of security requirements
  • Act as a role model for colleagues regarding technical and behavioral competencies.
  • Carries out other tasks as directed by line manager.


Knowledge, Experience & Skills

  • Previously worked on an IT technical environment.
  • Understanding of ITIL Practices
  • 5+ Desktop, Networking, Server or application support experience.
  • Excellent oral and written communication skills.
  • Good numeracy skills.
  • Ability to prioritize work under pressure and strict deadlines.
  • Ability to communicate and advise technical/service information to different levels.
  • Good general overall technical understanding of all new security technologies.
  • General Support and Operations and how security decisions impact the business
  • WAN/LAN/Networking skill sets
  • Microsoft/VMWare/Cloud technologies
  • Good understanding of PC hardware, Microsoft operating systems and networking.
  • Proven experience in IT desktop, application and server support environment
  • Uses information systems, technology functions and applications in line with IT industry standards.
  • Demonstrates awareness of health and safety at work.
  • Firewall and network security configuration
  • AV, Patch Management, Endpoint Protection and EDR technologies, Crowd strike preferred.


Competencies & Key Success Factors

  • Proactively managing the security landscape for our customers both internally and externally
  • Familiarity with ISO 27001, Cyber Essentials, Azure Cloud Platform, Mimecast,Microsoft defender,Fortinet Platforms (FortiAnalyzer).
  • EDR: CrowdStrike, Microsoft Defender for Endpoint
  • SIEM: Microsoft Sentinel, CrowdStrike Next-Gen SIEM
  • Ensure Department/Contract meets SLA performance targets.
  • Improve and maintain customer experience, satisfaction and retention.
  • Ensure compliance of recommended customer and company policies.
  • Ability to support delivery of projects with chosen technologies.
  • Keep skills up to date with the IT Industry and security landscape and cascade to others on the desk as required.
  • Requirement to pass security vetting BS7858


Certifications

  • Has attained or currently working towards any 3 of these:SC-200,CCFA, AZ-500, CEH, CISA,CompTIA Security+


What we can offer you

  • Salary (Competitive)
  • 25 days holiday (All statutory bank holidays relevant to regional country) - 1 extra day after 5 years. Part time employees is a pro rata equivalent.
  • The ability to Buy and Sell holiday (up to 5 days per year)
  • A Volunteer Day
  • Life Assurance (4 x base salary)
  • Pension Scheme - A total contribution of 8% - 5% Employer and 3% Employee.
  • Company sick pay (1 week after 6-month probationary period in first year, 4 weeks in years 2-3, 8 weeks in years 4-5 and 13 weeks from year 6 onwards)
  • Employee Assistance Programme
  • Coaching and Mentoring
  • Cycle2Work Scheme - salary sacrifice scheme to purchase bikes at a discount
  • Access to additional discounts / perks
  • EyeCare - Access to money off for glasses and sight test
  • Electric Car Scheme - Open to all eligible employees to benefit from getting an Electric Vehicle Via Salary Sacrifice
  • Flu Jab
  • Eligibility for Costco Membership


Values:

The values that underpin the Kyocera Group are the 5 C’s- Communication, Courage, Commitment, Cooperation and Consciousness. It is our firm belief that employees should live by these values and we would expect that you should show your commitment to these values by carrying out your work fairly and honourably, respecting people, our work as a business, and both our local and global community.

Related Jobs

View all jobs

Security Analyst

Security Analyst

Security Analyst

Security Analyst

Security Analyst

Security Analyst

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs at Newly Funded UK Start-ups: Q3 2025 Investment Tracker

Cyber security is no longer just a topic for tech-savvy professionals—it’s an essential pillar of every modern organisation. From protecting sensitive customer data to thwarting state-sponsored attacks, cyber security teams play a crucial role in safeguarding digital infrastructures across all sectors. In the UK, cyber security innovation is thriving, fuelled by a fertile mix of venture capital, government backing, and an ever-growing pool of talented specialists. Now, in the third quarter of 2025, we’ve seen a fresh influx of funding for cyber security start-ups that are poised to shape the industry’s future. This Q3 2025 Investment Tracker highlights newly funded UK-based cyber security start-ups, their core offerings, and—most importantly—the wide range of job opportunities they’re creating. Whether you’re a veteran security analyst, a pen tester, or a newcomer eager to explore the defensive side of tech, these start-ups are actively seeking professionals to help drive their next phase of growth. We’ll also guide you through the essential skills in demand, strategies to secure a role, and how to leverage CyberSecurityJobs.tech to fast-track your job search.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.