Security Analyst - Cyber

Manchester, England, United Kingdom

Applications have closed

The world of cybercrime and cyber security is constantly evolving. Staying ahead of criminals is a significant part of your job. You can feel good about your work knowing that you're helping protect peoples' livelihoods and privacy.

Your role will involve monitoring and management of security events from Microsoft Defender for Endpoint, vulnerability intelligence, dark web monitoring and user education to mitigate the risk of our clients being exposed to malicious security activity. Customer engagement is equally part of the role and requirement.



Working within our Security & Networks team you will deliver security-focused role encompassing a variety of security related services including detection and response services, vulnerability scanning, dark web monitoring, social engineering testing and user security awareness training combined with reporting and analysis across a wide range of customers who have outsourced a number of their security function to Content+Cloud.

Requirements

General responsibilities

  • Work within a multi-disciplined Security team delivering a range of proactive and reactive security tasks
  • Perform the prompt and effective triage and investigation of security events and incidents applying sound problem solving methods to determine scope, urgency, and potential impact.
  • Delivery of a range of security services making up our Managed Assurance Service
    • Vulnerability scanning and analysis
    • User Security Awareness Training delivery
    • Dark web monitoring
    • Social engineering testing
  • Delivery of the Vulnerability Scanning Service to customers.
  • Creation and delivery of regular reports to customers from the services delivered.
  • Work with internal and external stakeholders to resolve computer security incidents and vulnerability compliance.
  • Drive customer satisfaction and continuously seek to improve operational performance
  • Maintain a continuous understanding of the threat landscape with in-depth knowledge around threat actors, TTPs and vulnerabilities

Essential

  • Excellent soft skills in the form of team working, problem solving and written and verbal communication.
  • A keen self-starter who can evidence excellent customer service, collaborate effectively and work independently without supervision.
  • Knowledge of new security exploits in the news, ie major security breaches or attacks against organisations
  • Working knowledge and experience of basic security, network and infrastructure technologies (e.g. TCP/IP, LAN | WAN)
  • Awareness of vulnerability scanning toolsets (eg Nessus, Qualys)
  • Understanding of Social Engineering, Phishing and Physical Security
  • Good knowledge and exposure to one or more Microsoft endpoint operating systems

Desired but not essential

  • Understanding of Microsoft Windows server operating systems
  • Experience in Microsoft Defender for Endpoint
  • Experience working with security toolsets and one or more vulnerability scanning toolsets
  • Attainment of one or more Microsoft security focused accreditations, SC-200 or AZ-900
  • Experience in secured cloud architectures (Azure, AWS)
  • An awareness of cyber security related standards and regulations, for example, NIST, CIS, ISO 27001 and PCI DSS

Benefits

Click here for the list of benefits.

This is a remote-first hybrid role. See here for details about our C+C hybrid workstyle. #LI-Hybrid

Hit the apply button to easily share your details with us and we promise to respond quickly.




* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: AWS Azure C Cloud Compliance Cyber crime Exploits ISO 27001 Monitoring Nessus NIST PCI DSS Privacy Qualys TCP/IP TTPs Vulnerabilities Windows

Perks/benefits: Team events

Region: Europe
Country: United Kingdom
Job stats:  15  3  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.