Jobs

Senior Threat Detection Analyst


Job details
  • KPMG
  • London
  • 2 weeks ago

Job description

Senior Threat Detection Analyst

Base Location:Hybrid/UK based (core office in London) plus network of 20 offices nationally:

 

The KPMG EWT function is a cornerstone of our business. We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in enterprise technology this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time.

 

KPMG is one of the world's largest and most respected consultancy businesses, we've supported the UK through times of war and peace, prosperity and recession, political and regulatory upheaval. We've proudly stood beside the institutions and businesses which make the UK what it is.

 

Why join KPMG EWT as a Senior Threat Detection Analyst?

The Team is an important function within Security Operations in KPMG. The team play a key role in ensuring that the business IT systems are protected and monitored from cyber threats. The team works with external MSSPs to monitor, analyse, report cyber security threats and respond accordingly. The team works with the different internal business capabilities to ensure that security monitoring service is embedded into their solutions. The team is also responsible for making sure that security monitoring is aligned with cyber threat landscape and business risks on an ongoing basis.

 

The person will be playing a key role in ensuring that the business IT systems are protected and monitored from threats, participate in the active monitoring of the security sensors and ensure that appropriate actions are taken as part of the Incident Response process, work with the different KPMG business capabilities to ensure that security monitoring service is embedded into their solutions.

 

You will be part of on-call rota for SOC and required to be on-call for one week at a time typically, during a month.

 

What will you be doing?

Act as an escalation point for other security analysts in the SOC, including 3rd party MSSP Co-ordinate SOC team response and work with Threat Detection manager to improve triage processes Deputise Threat Detection Manager with full delegated responsibilities, when required Proactively monitor the network security sensors ensuring timely detection, investigation and remediation of potential threats in line with the incident management lifecycle Use the advanced security analytics toolsets to monitor for emerging threat patterns and vulnerabilities, attempted or successful breaches Work closely with other KPMG teams to ensure that all technologies are activity monitored including troubleshooting where necessary Interact with the Global Security Operations Centre (GSOC) & MSSP, including Incident response and intelligence sharing, escalating to management where required Triage and manage incidents, events and queries from the business to the relevant resolver group Contribute to the Continual Service Improvement of the teams' operations through proactive analysis, engagement and collaboration Detect, respond and coordinate response for security events while capturing essential details and artefacts Operationalise actionable intelligence reports from Threat Intelligence team and external sources Maintain event response documentation, participate in post-mortems, and write event reports Contribute to projects that enhance the security posture of KPMG Identify trends, potential new technologies, and emerging threats, which may impact KPMG Review and prioritise alerts based on Standard Operating Procedures Review and triage suspected security events reported by staff members or Security Monitoring platforms Accurately document work in Incident case management system as per defined standards Leverage multiple data sources to analyse detection alerts and staff reported cyber-attacks to identify which events require response activities based on Standard Operating Procedures Declare an incident and escalate it to Incident Response team, ensuring findings have been accurately captured in the Incident case management system as per defined standards Ensure that cases are accurately categorised to ensure the appropriate feedback is provided to the Detection and Response Engineering team and to facilitate reporting Identify and record gaps in visibility and security posture through the course of investigations as per defined Standard Operating Procedures Identify potential new detection logic and escalate to the Detection and Response Engineering team Hunt for threat indicators from log data and other available endpoint/network artefacts

 

What will you need to do it?

Prior experience in Cyber Security Experience of working in a Security Operations Centre or Security Monitoring Team. Experience with managed security services and security consulting would be a plus Hands on SIEM and EDR tooling knowledge and experience including technologies such as Microsoft Sentinel, Microsoft Defender Suite etc. Experience in end-to-end information security incident management and mitigating and addressing threat vectors including Advanced Persistent Threat (APTs), Distributed Denial of Service (DDoS), Phishing, Malicious Payloads, Malware, etc Experience with Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Web Application, Firewalls, Firewall logs, systems logs, web logs, application logs and Security Information and Event Management (SIEM) systems Experience with technologies, tools, and process controls to minimise risk and data exposure. Experience in search query languages such as KQL, OSquery or SPL Solid experience of working in Cloud environments such as AWS, Azure, & GCP Experience with building threat-based Use Cases using frameworks such as MITRE ATT&CK Solid understanding of ISO 27001, Cyber Essentials/Essentials Plus, GDPR and other information security-related regulatory and compliance standards Understanding of security threats, attack scenarios, intrusion detection and incident management Ability to function effectively in a matrix structure Ability to deal with ambiguity and to keep a cool head when dealing with crisis or stressful situations Strong analytical skills Apply analytical rigor and demonstrate business acumen to understand complex business scenarios Fluent in English

 

Skills we’d love to see/Amazing Extras:

Already holds, or can be SC cleared Bachelor’s degree in Computer Science or related field Information Security and/or Information Technology industry certification (CISSP, SANS GIAC, SC-200, AZ-500 or equivalent)  

Our Locations:

With 20 sites across the UK, we can potentially facilitate office work, working from home, flexible hours, and part-time options. If you have a need for flexibility, please register and discuss this with our team.

 

Find out more:

Within Consulting we have a range of divisions and specialisms. Click the links to find out more below:

Consulting at KPMG:ITs Her Future Women in Tech programme:KPMG Workability and Disability confidence:

 

For any additional support in applying, please click the links to find out more:

Applying to KPMG:Tips for interview:KPMG values:KPMG Competencies:

KPMG Locations and FAQ:

Sign up for our newsletter

The latest news, articles, and resources, sent to your inbox weekly.

Similar Jobs

Senior Threat Detection Analyst

Job descriptionSenior Threat Detection AnalystBase Location:Hybrid/UK based (core office in London) plus network of 20 offices nationally: The KPMG EWT function is a cornerstone of our business. We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK....

KPMG London

SOC Threat Detection Analyst (Cyber)

An SOC Cyber Threat Detection Analyst is required for a long term contract assignment on site in Stevenage.Two shift system operates 6am - 2pm and 2pm - 10pm.Candidates will need to have worked in the UK defence environment within the last 12 months and be prepared to undergo DV clearance.Overview...

Stevenage

SOC Threat Detection Analyst (2x positions)

World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 2x SOC Threat Detection Analyst subcontractors on an initial 12 month contract.This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line.This role would suit someone from a Cyber...

Stevenage

SOC Threat Detection Analyst (2x positions)

World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 2x SOC Threat Detection Analyst subcontractors on an initial 12 month contract.This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line.This role would suit someone from a Cyber...

Certain Advantage Stevenage

Senior Software Engineer - Threat Detection

It's fun to work in a company where people truly BELIEVE in what they're doing!We're committed to bringing passion and customer focus to the business.Corporate OverviewProofpoint is a leading cybersecurity company protecting organisations’ greatest assets and biggest risks: vulnerabilities in people. With an integrated suite of cloud-based solutions, Proofpoint helps...

Proofpoint London

Senior Data Engineer - Cyber Threat Intelligence (Forward Deployed)

DescriptionAbout Rowden We’re building the next UK-headquartered engineering powerhouse.  There is a gulf between the needs of mission-focused organisations and the development and delivery of the critical technology they rely on. The consequences of this are felt acutely by underserved frontline operators, demanding a new breed of engineering enterprise to...

Rowden Hereford