Enable job alerts via email!

Senior Cyber Security Analyst

Locke & Mccloud

England

Hybrid

GBP 50,000 - 60,000

Full time

8 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a dedicated Senior Cyber Security Analyst to enhance their cyber resilience. This role involves critical incident detection, response efforts, and security automation within a respected non-profit organization. You will analyze security incidents, design tailored monitoring workflows, and mentor junior analysts while participating in a hybrid working model that offers flexibility. Join a team committed to social impact and make a significant contribution to the organization's cyber maturity. If you have a passion for security and a collaborative mindset, this opportunity is perfect for you.

Qualifications

  • 3+ years in a SOC or security operations function.
  • Hands-on experience with SIEM/EDR tools.

Responsibilities

  • Analyse security incidents and SOAR alerts methodically.
  • Design and fine-tune rules for threat detection.

Skills

Analytical Skills
Incident Response
Communication Skills
Collaboration
Attention to Detail

Education

Security Certifications (e.g., Security+, CySA+, SC-200)

Tools

SIEM Tools
EDR Tools
SentinelOne
Defender for Endpoint
QRadar

Job description

Senior Cyber Security Analyst - Kent - £50,000-£60,000 per annum

We’re proud to be partnering with a respected non-profit organisation dedicated to social impact and digital resilience. As they continue to grow and enhance their cyber maturity, they’re seeking a passionate Senior Cyber Security Analyst to support critical incident detection, response efforts, and security automation. The position offers a salary of £50,000 – £60,000, a strong benefits package tailored for UK employees, and a hybrid working model with remote flexibility.

Your Responsibilities Will Include:

  1. Analysing security incidents and SOAR alerts with a methodical, threat-led approach
  2. Designing and fine-tuning rules and playbooks to improve threat detection and response
  3. Working with customers to shape and implement tailored security monitoring workflows
  4. Supporting both live operations and onboarding of new services
  5. Researching threat intelligence to enhance SOC processes
  6. Reviewing junior analyst cases and helping develop their capabilities
  7. Owning ticket queues, meeting SLAs, and ensuring high-quality case records
  8. Participating in projects across departments and improving internal procedures
  9. Taking part in the on-call incident escalation rota

You’ll Need:

  1. 3+ years in a SOC or security operations function
  2. Hands-on experience with SIEM/EDR tools like SentinelOne, Defender for Endpoint, QRadar
  3. Security certifications (e.g., Security+, CySA+, SC-200, SBT L1)
  4. Strong written communication and organisation skills
  5. Experience leading or mentoring junior team members
  6. High attention to detail and a collaborative mindset

Good to Have:

  1. Prior work in incident response teams
  2. Familiarity with cloud security tools and services
  3. Knowledge of SOAR toolsets and automation
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.