Security of Operations Threat Detection Analyst

Stevenage
2 weeks ago
Create job alert

Our client has an opportunity for a SOC Threat Detection Analyst to join them on a contract basis for 12 months, with potential for extension/moving to a permanent position.

The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat hunting, detection and analysis within the 24x7 SOC.

Role: SOC Threat Detection Analyst
Location: Stevenage - fully onsite
Hours: Shifts of 6am-2pm & 2pm-10pm
Hourly Rate: £81.35 per hour
Clearance: DV clearance required - can start on SC

What you'll be doing:

Conduct proactive Threat Hunting in collaboration with the CTI function
Lead Optimisation of the Threat Detection rulesets working with the ISR function
Assist with the maintenance of Security technologies
Assisting the SOC Team with project activity
Supporting the Incident responder with HR and InfoSec related investigations
Attend routine security meetingsRequirements:

A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications.
Demonstrable experience with YARA and Sigma rulesets
Knowledge of IT Security standard methodologies.
Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools.
Hands on experience with IDS/IPS technologies and threat hunting activities.
Strong analytical experience and mind-set.
Experience within Defensive Cyber-attack methodologies and frameworks.
Understanding of Malware capabilities, attack vectors, propagation and impact.
Good communication skills liaising with the business and suppliers.
If you are interested in applying for this position and you meet the requirements, please apply!

Line Up Aviation has carved its own place in the recruitment of Aviation and Aerospace personnel all over the world for more than 30 years. We work with some of the industry's best known companies who demand the highest standard of applicants.

"Follow @LineUpAviation on Twitter for all of our latest vacancies, news and pictures from our busy UK Head Office. Interact with us using the #LineUpAviation tag at anytime! Thank you for your follow

Related Jobs

View all jobs

IT Infrastructure Analyst

Junior SOC Analyst 24 x 7 Desk

Security Automation and Detection Engineer

Threat Detection Engineer

L3 SOC Analyst

Lead SOC Analyst

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.