Security Analyst - Level 2

Belfast, United Kingdom

Applications have closed

Telefonica Tech

With the technology decisions you make today - Build secure digital resilience. Layer by layer.

View all jobs at Telefonica Tech

Company Description

Telefónica Tech is a leading provider of innovative tech services for the B2B market with a worldwide presence and strategic hubs in Spain, Brazil, UK and Germany. The company helps leading brands and organisations across the UK and Ireland unlock the power of integrated technology for all businesses, bringing together in one place a unique combination of, the best people, with the best tech and the best platforms in a simplified manner, to make a real difference to every business, every day.

We have an end-to-end portfolio of market leading services and develops integrated technology solutions to accelerate tech adoption through its two core divisions of Tech Cyber security & Cloud and Tech Intelligence of Things. The company has a diverse, highly trained and globally located talent pool of over 2000 employees and serves more than 5.5m customers every day with a service reach in 175 countries. Its dynamic partner ecosystem includes over 300 cutting edge businesses, as well as strategic agreements with all market leaders. 

Job Description

This is an ideal role for those with an extensive knowledge within the security field and yield those skills to help or rapidly increasing security business. You’ll be working and protecting well-known customers in their respected field using state of the art tools, whilst having the ability to do research and put the knowledge into our services. To be a successful SOC analyst you will have to have a good understanding of Network Security and an ability to provide relevant and timely analysis. You will also need to be good at report writing and have strong communication skills as you will be dealing with customers.

You will also leverage emerging threat intelligence (IOCs, updated rules, etc.) to identify affected systems and the scope of the attack. Reviews and collects asset data (configs, running processes, etc.) on these systems for further investigation. Determines and directs remediation and recovery efforts.

Key Responsibilities

  • Manage security tools such as intrusion detection and prevention systems • Assist Team Leads with reporting, projects, administrative work as needed • Monthly SOC Reports
  • Provide Incident Response (IR) support from Level 1, escalating to Level 3 when needed.
  • Provide threat and vulnerability analysis as well as security advisory services
  • Analyse and respond to previously undisclosed software and hardware vulnerabilities • Developing security policies and strategy
  • Design and create workflow/playbooks for incidents
  • Analyse and report on anomalous behaviour • Investigate alerts using SIEM, data visualisation, pattern analysis and automation

Skills and Experience

  • Solid cyber security skills including SIEM (Essential – Qradar), Vulnerability Scanning (Nessus & Greenbone), Penetration Testing Toolsets (Metasploit, Nikto, Burpsuite), IPS/IDS, SOAR (Siemplify) and other security solutions.
  • Have the drive to dive deep into issues
  • Ability to identify security threats, trends and anomalies • Open minded to new security technologies and solutions. 
  • Strong Infrastructure and Network experience, both for OnPremise and Cloud environments.
  • Logical thinker and creative problem solver. • Have both a red team and blue team methodology

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  35  8  0
Category: Analyst Jobs

Tags: Automation Blue team Burp Suite Cloud IDS Incident response Intrusion detection IPS Metasploit Nessus Network security Pentesting QRadar Red team SIEM SOAR SOC Strategy Threat intelligence Vulnerabilities

Region: Europe
Country: United Kingdom

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.