Senior Security Analyst triaging and investigating security alerts for award-winning IT provider. Collaborating to improve detection capabilities and mentor junior analysts in SOC environment.
Responsibilities
Monitor, triage and investigate security alerts from leading MDR technologies, with a focus on EDR and SIEM platforms
Lead and contribute to complex incident response activities, from detection through to remediation and post‑incident review
Perform advanced log analysis, malware analysis, OSINT research and investigation of emerging and zero‑day threats
Collaborate with SOC Engineers, Red Team and clients to develop, test and tune detection use cases through purple‑team activities
Apply frameworks such as MITRE ATT&CK and TDIR methodologies to improve detection and response effectiveness
Produce high‑quality incident reports and briefings for technical teams and senior stakeholders
Mentor junior analysts and contribute to continuous improvement across SOC processes and capabilities
Requirements
5+ years’ experience in cyber security, with strong experience in a SOC or similar environment
Advanced hands‑on experience with Windows, Linux, SIEM, EDR/XDR and security integrations
Strong working knowledge of MITRE ATT&CK, threat intelligence platforms and incident response methodologies
Deep understanding of IT security controls, networking concepts (OSI model, TCP/IP) and secure network design
Proven experience leading complex security incidents end‑to‑end
Exceptional analytical, problem‑solving and troubleshooting skills
High attention to detail when analysing logs, alerts and security telemetry
Strong written and verbal communication skills, including stakeholder and executive engagement
Ability to mentor others and contribute positively to a collaborative SOC culture
**Desirable**
Scripting and automation skills (PowerShell, Python or similar)
Industry certifications such as CISSP, CASP+, GIAC (GCIH/GCFA) or relevant vendor certifications (Microsoft, CrowdStrike, AWS)
Experience leading SOC initiatives or internal improvement projects
Active involvement in the cyber security community (research, speaking, publishing, open source)
Benefits
A structured training and development plan tailored to your experience
Ongoing investment in industry and vendor certifications
Opportunities to work with leading security technologies and enterprise clients
A collaborative, high‑performing SOC environment with strong career progression
Competitive salary package and comprehensive employee benefits
Flexible working arrangements and a strong focus on wellbeing and culture
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.