SOC Analyst (3237)

Chester, England, United Kingdom

Applications have closed
GBG logo


We offer a range of solutions that help organisations quickly validate and verify the identity and location of their customers.

About GBG

GBG offers a range of solutions that help organisations quickly validate and verify the identity and location of their customers. Our market-leading technology, data and expertise help our customers improve digital access, deliver a seamless experience and establish trust, so that they can transact quickly, safely and securely with their customers online. We have over 1,000 team members across 15 countries and work with over 20,000 customers in over 70 countries. Some of the world's best-known businesses rely on GBG to provide digital services and keep the economy moving.

The role

You will be responsible for supporting the SOC Manager and overseeing GBG Security Operations activity. Improve and challenge existing processes and procedures in a very agile and fast-moving information security environment.

What you will do

  • As a Security Analyst you will operate within a global team that takes responsibility for the security monitoring of key technologies and tools across the estate.
  • You will provide effective analysis and triage and handing of security information and events including the review and analysis of logs and prepare regular detailed reports with recommendations for improvement.
  • Identify security risks, threats and vulnerabilities of the company’s network, systems, applications, and new technology initiatives.
  • Assist in updating/developing, implementing, and operating run books, operating processes and procedures
  • Review and analyze ACLs, IDS rules, and network device configuration and propose pragmatic best practice solutions
  • Help to develop and configure use cases, and alerting rules within SIEM technologies.
  • Support day to day threat monitoring, data loss and leakage prevention, security event monitoring, incident management, security forensics, crisis simulation exercises and security research.

To help you be successful, we’re looking for…

  • Demonstrable experience in security management/monitoring, knowledge of SIEM technologies and operation is an advantage
  • At least one professional security certification e.g., CISSP, CEH, GCIH, GCFA or working towards
  • Knowledge of the incident handling procedures and intrusion analysis models is preferable
  • Strong foundation in network security and common attack methodologies
  • Exposure to user behavior analytics is preferable but not essential
  • Good understanding of common protocols such as HTTP, SMTP, SSL/TLS, SSH, DNS
  • Must have strong analytical and problem-solving skills to enable effective security incident and problem resolution
  • Experience reviewing and analysing large amounts of raw log data (firewall, network flows, IDS, system logs) Knowledge of latest threat trends and security landscape
  • Experience with well-known information security related tools such as Burp, Wireshark, Kali, Netcat, TCPDump and NMAP

What’s in it for you?

We have a vision to have the best and most engaged team members in the industry. People matter at GBG, they make us who we are. Every team member across all our locations makes a difference, everyone has something to contribute. Maybe you too could make a difference.

As part of our commitment to our team and flexible working approach, we have created a Work When and Where You Want Policy to give our team members choice and empowerment, and to support a balance in work and home life. Please ask your Talent Attraction Specialist for more information on this and our Family Friendly policy if you want to find out more!

Next steps

If you’re interested, please apply! We’re looking to hire the best and most engaged people into our business and we’ll make an offer once we’ve found that person.

As an equal opportunity employer, we are committed to providing fair opportunities for everyone regardless of age, gender, race, religion, sexual orientation, parental status or disability. Everybody is welcome and our inclusion and diversity programme, be/yourself, is designed to ensure that you can thrive. Please inform your GBG Talent Attraction Specialist if you require any reasonable adjustments to the interview process.

* Salary range is an estimate based on our salary survey 💰

Tags: Agile Analytics CEH CISSP DNS Firewalls Forensics GCFA GCIH IDS Kali Monitoring Network security Nmap SIEM SMTP SSH TLS Vulnerabilities

Perks/benefits: Flex hours Team events

Region: Europe
Country: United Kingdom
Job stats:  39  6  0

Other jobs like this

Explore more Cybersecurity career opportunities

Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cyber Security in general, filtered by job title or popular skill, toolset and products used.