Security Operations Analyst

London, United Kingdom

Applications have closed

Company Description

At Octopus, we’re entrepreneurs and we’re investors, on a mission to back the people, ideas and industries that will change the world. 

We think working here is great, but we’re understandably bias. Click here to explore Life at Octopus.

Job Description

Security Operations work tirelessly with everyone to protect Octopus from cyber security disruptions, provide clear leadership and direction when responding to cyber security incidents, and we build relationships and processes that make Octopus a leader in responsible cyber security.

  • Use cyber security tools and techniques to identify and respond to real-time incidents and threats.
  • Identify security enhancements, including alert creation and automation of tasks.
  • Work collaboratively with Octopus Labs teams to ensure end-point security controls are operating efficiently and effectively.
  • Activities include Incident Response, Phishing campaigns, Vulnerability Management, Automation and Data Loss Prevention

Qualifications

You are a SecOps Analyst with hands on experience of Incident response and applying security principles within technology companies.

You have experience in monitoring network and system security logs, and assisting infrastructure and development teams to identify, analyse, and resolve issues.

You perform awareness campaigns to increase Security knowledge company wide

You will be leaning on the experience of the team to help and support you – not being afraid to ask for help. You work well on your own and in a team.

You thrive on a challenge and solving problems.

You love technology and figuring out how things work.

You have knowledge experience of some of the following security technologies and principles:

  • Incident Response and Digital Forensics - identification, investigation, and remediation of cyberattacks
  • Vulnerability Management
  • EDR, AV, NTA, EUBA, SIEM Experience
  • Cloud Security
  • DNS and Networking
  • DLP Controls
  • Threat Hunting/Modelling
  • You have a Security related qualification (i.e. CCSP/CCSK/GSEC) and coding skills (i.e. Python, Bash) 

Additional Information

What we offer

💰 A competitive salary, bonus, pension and share incentive plan
✈️ Untracked holiday
🏡 Hybrid working – three days in the office, two days from home
⚓ Anchor (our wellness hub) which includes Headspace, one to one coaching through Wellness Cloud, Digital GP, employee assistance program & more
👪 Up to 6 months paid parental leave regardless of gender
❤️ Life insurance, critical illness cover and income protection
🏥 Private medical insurance for you and your family
🚗 Electric vehicle leasing
🌍 The option to work overseas up to a month per year

Our Values 
At our core, we believe that how a company behaves is just as important as what it does. That’s why we chose to become an accredited B Corp (the equivalent of a Fairtrade coffee stamp but for companies) and to change our Articles of Association so that the interests all our stakeholders – employees, customers, communities, environment and shareholders – are considered in every decision we make.   

We’re committed to creating a diverse and inclusive employee experience for all. We promote equal opportunities for growth and development regardless of race, gender, religion, sexual orientation, age, disability, or socio-economic background. We believe strongly that teams are at their best when every member of the team feels safe to bring their whole self to work.  

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Automation Bash CCSP Cloud DNS EDR Forensics GSEC Incident response Monitoring Python SecOps SIEM Vulnerability management

Perks/benefits: Career development Competitive pay Health care Insurance Medical leave Parental leave Salary bonus

Region: Europe
Country: United Kingdom
Job stats:  79  14  1

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.