Enable job alerts via email!

Senior Cyber Security Analyst

Locke & Mccloud

Bristol

Hybrid

GBP 55,000 - 65,000

Full time

8 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An innovative Cyber Services company is seeking a Senior Cyber Security Analyst to enhance their SOC team. This role offers the opportunity to lead threat investigations, design detection logic, and contribute to high-quality managed security services. The ideal candidate will have over three years of experience in security operations, with hands-on expertise in SIEM and EDR tools. Join a dynamic team that values collaboration and attention to detail, while enjoying a competitive salary and hybrid working flexibility. This is a chance to make a significant impact in a growing field and advance your career in cybersecurity.

Qualifications

  • 3+ years in a SOC or security operations role with hands-on experience.
  • Strong communication skills and experience mentoring junior analysts.

Responsibilities

  • Lead threat investigations and improve detection logic.
  • Design tailored security monitoring workflows and support operations.

Skills

Analytical Skills
Threat Investigation
Communication Skills
Attention to Detail
Mentoring

Education

Security Certifications (e.g., Security+, CySA+, SC-200)

Tools

SIEM Tools (e.g., QRadar)
EDR Tools (e.g., SentinelOne, Defender for Endpoint)

Job description

Senior Cyber Security Analyst - Bristol - £55,000-£65,000 per annum

We’re pleased to be working with a specialist Cyber Services company that delivers security operations support to a diverse range of clients. They’re expanding their SOC team and are in search of a confident Senior Cyber Security Analyst to lead threat investigations, tune detection logic, and contribute to high-quality managed security services. The role includes a salary of £55,000-£65,000, a competitive benefits package, and hybrid working flexibility.

Your Responsibilities Will Include:
  • Analysing security incidents and SOAR alerts with a methodical, threat-led approach
  • Designing and fine-tuning rules and playbooks to improve threat detection and response
  • Working with customers to shape and implement tailored security monitoring workflows
  • Supporting both live operations and onboarding of new services
  • Researching threat intelligence to enhance SOC processes
  • Reviewing junior analyst cases and helping develop their capabilities
  • Owning ticket queues, meeting SLAs, and ensuring high-quality case records
  • Participating in projects across departments and improving internal procedures
  • Taking part in the on-call incident escalation rota
You’ll Need:
  • 3+ years in a SOC or security operations function
  • Hands-on experience with SIEM/EDR tools like SentinelOne, Defender for Endpoint, QRadar
  • Security certifications (e.g., Security+, CySA+, SC-200, SBT L1)
  • Strong written communication and organisation skills
  • Experience leading or mentoring junior team members
  • High attention to detail and a collaborative mindset
Good to Have:
  • Prior work in incident response teams
  • Familiarity with cloud security tools and services
  • Knowledge of SOAR toolsets and automation
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.