Security Analyst (Reading)

KYOCERA Document Solutions UK
Reading
1 week ago
Create job alert

Security Analyst – 2nd Line SDA

Division:ICT Services

Department:ICT Service Desk Operations

Reports to:Service Desk Team Leader


Main Goal

The Service Desk Analyst - Security Analyst (2nd line) role is to support the stable operation of clients Infrastructure and Applications with a specific focus on IT Security. Providing 2nd line support to all employees and companies that fall under a Managed Service Contract.


Responsibilities/Tasks

  • Interrogation of the Service Desk ticketing system throughout the day to provide effective responses and resolutions to queries or incidents. Ensuring that raised tickets are responded to within SLA timescales.
  • Responding to calls or e-mails on the service desk, adhering to strict Service Level Agreements for fault resolutions and service requests completions. Provide customer service to internal and external customers to ensure a consistent experience. Adopt a proactive approach towards all client activities.
  • Day to day incident management and proactive monitoring of IT Security Systems and associated platforms and components
  • Coordinate small teams delivering security related work packages in line with the company process to meet customer and business requirements.
  • Document and report on work completed to ensure security compliance with customer and company procedures.
  • Escalate issues in line with company processes to ensure customer demands are met. Evaluate escalations and action appropriately to ensure customer demands are met.
  • Able to adapt quickly to dynamic team environments to maintain consistent effective contribution.
  • Act in accordance with our information security policies and report any potential or actual Security events or other Security risks to the operation.
  • Support Service Desk team to ensure IT Platforms are security hardened to latest best practice and review planned changes that impact security.
  • Carry out installations and configurations of end user workstation hardware, software, networked peripheral devices, cabling, and networking hardware and software products.
  • Support end user workstation hardware, software, networked peripheral devices, cabling, and networking hardware and software products by testing, maintaining, monitoring, and troubleshooting in order to determine source of computer problems (hardware, software, user access, etc.)
  • Conduct updates of technical documents and knowledge base to ensure that any changes to set up, location or configuration of kit is logged in a timely and appropriate manner, where any additional hardware or software is included within the network component inventory.
  • Prepare, maintain, and adhere to procedures for logging, reporting, and statistically monitoring network data as directed.
  • Adhere to business continuity and disaster recovery plans, and maintain current knowledge of plan executables.
  • Respond to emergency network outages in accordance with business continuity and disaster recovery plans.
  • Perform system backups and recovery with all systems in line with the backup policy as directed.
  • Administer and maintain end user accounts, permissions, and access rights as directed by change requests from the Service Desk and in line with the Network Security Policy.
  • Manage and support ISO, Cyber Security Essentials and other accreditations aligned with security objectives.
  • Manage and support security patching consider both internal and external requirements.
  • Creating and reviewing security related service desk processes and procedures.
  • Identify own development needs in line with business objectives and direction of security requirements
  • Act as a role model for colleagues regarding technical and behavioral competencies.
  • Carries out other tasks as directed by line manager.


Knowledge, Experience & Skills

  • Previously worked on an IT technical environment.
  • Understanding of ITIL Practices
  • 5+ Desktop, Networking, Server or application support experience.
  • Excellent oral and written communication skills.
  • Good numeracy skills.
  • Ability to prioritize work under pressure and strict deadlines.
  • Ability to communicate and advise technical/service information to different levels.
  • Good general overall technical understanding of all new security technologies.
  • General Support and Operations and how security decisions impact the business
  • WAN/LAN/Networking skill sets
  • Microsoft/VMWare/Cloud technologies
  • Good understanding of PC hardware, Microsoft operating systems and networking.
  • Proven experience in IT desktop, application and server support environment
  • Uses information systems, technology functions and applications in line with IT industry standards.
  • Demonstrates awareness of health and safety at work.
  • Firewall and network security configuration
  • AV, Patch Management, Endpoint Protection and EDR technologies, Crowd strike preferred.


Competencies & Key Success Factors

  • Proactively managing the security landscape for our customers both internally and externally
  • Familiarity with ISO 27001, Cyber Essentials, Azure Cloud Platform, Mimecast,Microsoft defender,Fortinet Platforms (FortiAnalyzer).
  • EDR: CrowdStrike, Microsoft Defender for Endpoint
  • SIEM: Microsoft Sentinel, CrowdStrike Next-Gen SIEM
  • Ensure Department/Contract meets SLA performance targets.
  • Improve and maintain customer experience, satisfaction and retention.
  • Ensure compliance of recommended customer and company policies.
  • Ability to support delivery of projects with chosen technologies.
  • Keep skills up to date with the IT Industry and security landscape and cascade to others on the desk as required.
  • Requirement to pass security vetting BS7858


Certifications

  • Has attained or currently working towards any 3 of these:SC-200,CCFA, AZ-500, CEH, CISA,CompTIA Security+


What we can offer you

  • Salary (Competitive)
  • 25 days holiday (All statutory bank holidays relevant to regional country) - 1 extra day after 5 years. Part time employees is a pro rata equivalent.
  • The ability to Buy and Sell holiday (up to 5 days per year)
  • A Volunteer Day
  • Life Assurance (4 x base salary)
  • Pension Scheme - A total contribution of 8% - 5% Employer and 3% Employee.
  • Company sick pay (1 week after 6-month probationary period in first year, 4 weeks in years 2-3, 8 weeks in years 4-5 and 13 weeks from year 6 onwards)
  • Employee Assistance Programme
  • Coaching and Mentoring
  • Cycle2Work Scheme - salary sacrifice scheme to purchase bikes at a discount
  • Access to additional discounts / perks
  • EyeCare - Access to money off for glasses and sight test
  • Electric Car Scheme - Open to all eligible employees to benefit from getting an Electric Vehicle Via Salary Sacrifice
  • Flu Jab
  • Eligibility for Costco Membership


Values:

The values that underpin the Kyocera Group are the 5 C’s- Communication, Courage, Commitment, Cooperation and Consciousness. It is our firm belief that employees should live by these values and we would expect that you should show your commitment to these values by carrying out your work fairly and honourably, respecting people, our work as a business, and both our local and global community.

Related Jobs

View all jobs

Security Analyst

Security Analyst

Security Analyst (City Of London)

Security Analyst (Reading)

Security Analyst (London Area)

Security Analyst

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.

Cyber Security Jobs at Newly Funded UK Start-ups: Q3 2025 Investment Tracker

Cyber security is no longer just a topic for tech-savvy professionals—it’s an essential pillar of every modern organisation. From protecting sensitive customer data to thwarting state-sponsored attacks, cyber security teams play a crucial role in safeguarding digital infrastructures across all sectors. In the UK, cyber security innovation is thriving, fuelled by a fertile mix of venture capital, government backing, and an ever-growing pool of talented specialists. Now, in the third quarter of 2025, we’ve seen a fresh influx of funding for cyber security start-ups that are poised to shape the industry’s future. This Q3 2025 Investment Tracker highlights newly funded UK-based cyber security start-ups, their core offerings, and—most importantly—the wide range of job opportunities they’re creating. Whether you’re a veteran security analyst, a pen tester, or a newcomer eager to explore the defensive side of tech, these start-ups are actively seeking professionals to help drive their next phase of growth. We’ll also guide you through the essential skills in demand, strategies to secure a role, and how to leverage CyberSecurityJobs.tech to fast-track your job search.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.