Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

Senior Threat Detection Analyst

KPMG
London
10 months ago
Applications closed

Related Jobs

View all jobs

Senior Business Analyst, Threat Intelligence Analyst

Senior SOC Analyst

Senior Cyber Security Analyst (Hybrid / Birmingham)

Penetration Tester

Penetration Tester

Penetration Tester

Job description

Senior Threat Detection Analyst

Base Location:Hybrid/UK based (core office in London) plus network of 20 offices nationally:

 

The KPMG EWT function is a cornerstone of our business. We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in enterprise technology this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time.

 

KPMG is one of the world's largest and most respected consultancy businesses, we've supported the UK through times of war and peace, prosperity and recession, political and regulatory upheaval. We've proudly stood beside the institutions and businesses which make the UK what it is.

 

Why join KPMG EWT as a Senior Threat Detection Analyst?

The Team is an important function within Security Operations in KPMG. The team play a key role in ensuring that the business IT systems are protected and monitored from cyber threats. The team works with external MSSPs to monitor, analyse, report cyber security threats and respond accordingly. The team works with the different internal business capabilities to ensure that security monitoring service is embedded into their solutions. The team is also responsible for making sure that security monitoring is aligned with cyber threat landscape and business risks on an ongoing basis.

 

The person will be playing a key role in ensuring that the business IT systems are protected and monitored from threats, participate in the active monitoring of the security sensors and ensure that appropriate actions are taken as part of the Incident Response process, work with the different KPMG business capabilities to ensure that security monitoring service is embedded into their solutions.

 

You will be part of on-call rota for SOC and required to be on-call for one week at a time typically, during a month.

 

What will you be doing?

Act as an escalation point for other security analysts in the SOC, including 3rd party MSSP Co-ordinate SOC team response and work with Threat Detection manager to improve triage processes Deputise Threat Detection Manager with full delegated responsibilities, when required Proactively monitor the network security sensors ensuring timely detection, investigation and remediation of potential threats in line with the incident management lifecycle Use the advanced security analytics toolsets to monitor for emerging threat patterns and vulnerabilities, attempted or successful breaches Work closely with other KPMG teams to ensure that all technologies are activity monitored including troubleshooting where necessary Interact with the Global Security Operations Centre (GSOC) & MSSP, including Incident response and intelligence sharing, escalating to management where required Triage and manage incidents, events and queries from the business to the relevant resolver group Contribute to the Continual Service Improvement of the teams' operations through proactive analysis, engagement and collaboration Detect, respond and coordinate response for security events while capturing essential details and artefacts Operationalise actionable intelligence reports from Threat Intelligence team and external sources Maintain event response documentation, participate in post-mortems, and write event reports Contribute to projects that enhance the security posture of KPMG Identify trends, potential new technologies, and emerging threats, which may impact KPMG Review and prioritise alerts based on Standard Operating Procedures Review and triage suspected security events reported by staff members or Security Monitoring platforms Accurately document work in Incident case management system as per defined standards Leverage multiple data sources to analyse detection alerts and staff reported cyber-attacks to identify which events require response activities based on Standard Operating Procedures Declare an incident and escalate it to Incident Response team, ensuring findings have been accurately captured in the Incident case management system as per defined standards Ensure that cases are accurately categorised to ensure the appropriate feedback is provided to the Detection and Response Engineering team and to facilitate reporting Identify and record gaps in visibility and security posture through the course of investigations as per defined Standard Operating Procedures Identify potential new detection logic and escalate to the Detection and Response Engineering team Hunt for threat indicators from log data and other available endpoint/network artefacts

 

What will you need to do it?

Prior experience in Cyber Security Experience of working in a Security Operations Centre or Security Monitoring Team. Experience with managed security services and security consulting would be a plus Hands on SIEM and EDR tooling knowledge and experience including technologies such as Microsoft Sentinel, Microsoft Defender Suite etc. Experience in end-to-end information security incident management and mitigating and addressing threat vectors including Advanced Persistent Threat (APTs), Distributed Denial of Service (DDoS), Phishing, Malicious Payloads, Malware, etc Experience with Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Web Application, Firewalls, Firewall logs, systems logs, web logs, application logs and Security Information and Event Management (SIEM) systems Experience with technologies, tools, and process controls to minimise risk and data exposure. Experience in search query languages such as KQL, OSquery or SPL Solid experience of working in Cloud environments such as AWS, Azure, & GCP Experience with building threat-based Use Cases using frameworks such as MITRE ATT&CK Solid understanding of ISO 27001, Cyber Essentials/Essentials Plus, GDPR and other information security-related regulatory and compliance standards Understanding of security threats, attack scenarios, intrusion detection and incident management Ability to function effectively in a matrix structure Ability to deal with ambiguity and to keep a cool head when dealing with crisis or stressful situations Strong analytical skills Apply analytical rigor and demonstrate business acumen to understand complex business scenarios Fluent in English

 

Skills we’d love to see/Amazing Extras:

Already holds, or can be SC cleared Bachelor’s degree in Computer Science or related field Information Security and/or Information Technology industry certification (CISSP, SANS GIAC, SC-200, AZ-500 or equivalent)  

Our Locations:

With 20 sites across the UK, we can potentially facilitate office work, working from home, flexible hours, and part-time options. If you have a need for flexibility, please register and discuss this with our team.

 

Find out more:

Within Consulting we have a range of divisions and specialisms. Click the links to find out more below:

Consulting at KPMG:ITs Her Future Women in Tech programme:KPMG Workability and Disability confidence:

 

For any additional support in applying, please click the links to find out more:

Applying to KPMG:Tips for interview:KPMG values:KPMG Competencies:

KPMG Locations and FAQ:

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Recruitment Trends 2025 (UK): What Job Seekers Must Know About Today’s Hiring Process

Summary: UK cyber security hiring has shifted from title‑led CV screens to capability‑driven assessments that emphasise incident readiness, cloud & identity security, detection engineering, governance/risk/compliance (GRC), measurable MTTR/coverage gains & secure‑by‑default engineering. This guide explains what’s changed, what to expect in interviews, & how to prepare—especially for SOC analysts, detection engineers, blue/purple teamers, penetration testers, cloud security engineers, DFIR, AppSec, GRC & security architecture. Who this is for: SOC & detection engineers, security operations leads, DFIR analysts, penetration testers/red teamers, purple teamers, AppSec/DevSecOps engineers, security architects, cloud security engineers, identity/IAM engineers, vulnerability managers, GRC/compliance specialists, product security & security programme managers targeting roles in the UK.

Why Cyber Security Careers in the UK Are Becoming More Multidisciplinary

Cyber security used to be viewed primarily as a technical discipline: firewalls, encryption, intrusion detection, penetration testing. In the UK today, it’s far broader. Organisations now face complex legal frameworks, ethical dilemmas, human-behaviour risks, communication challenges & usability hurdles. This shift means cyber security careers are becoming more multidisciplinary. From protecting NHS patient records to defending financial services, securing supply chains & safeguarding national infrastructure, cyber security now touches every sector. Employers increasingly want professionals who understand law, ethics, psychology, linguistics & design alongside traditional technical skills. In this article, we’ll explore why UK cyber security careers are expanding in this way, how these five disciplines shape the profession, and what job-seekers & employers need to know to thrive in this new landscape.

Cyber Security Team Structures Explained: Who Does What in a Modern Cyber Security Department

Cyber security has become a top priority for UK organisations of all sizes. From small businesses to financial institutions, healthcare providers, and government bodies, the risk of cyber attack is now a constant concern. Threats are more sophisticated, regulations more demanding, and customers more aware of data privacy than ever before. But defending against cyber threats isn’t simply about having the right tools — it’s about having the right team. A modern cyber security department relies on clearly defined roles and responsibilities to ensure that defences are proactive, incidents are managed swiftly, and compliance is maintained. This article explains the structure of a modern cyber security team, the roles you’ll typically find within it, how they collaborate, and what skills, qualifications, and salaries are expected in the UK job market.