Enable job alerts via email!

Senior Cyber Security Analyst

Locke & Mccloud

Royal Tunbridge Wells

Hybrid

GBP 50,000 - 60,000

Full time

8 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a dedicated Senior Cyber Security Analyst to enhance their cyber maturity and support critical incident detection. This role involves analyzing security incidents, designing detection rules, and mentoring junior analysts. With a strong focus on social impact, this position offers a competitive salary and a hybrid working model, allowing flexibility in your work environment. Join a passionate team committed to digital resilience and make a significant impact in the realm of cyber security.

Qualifications

  • 3+ years in a SOC or security operations function.
  • Hands-on experience with SIEM/EDR tools and security certifications.

Responsibilities

  • Analyze security incidents and improve threat detection and response.
  • Support live operations and onboarding of new services.

Skills

Analytical Skills
Incident Response
Communication Skills
Mentoring
Attention to Detail

Education

Security Certifications (e.g., Security+, CySA+, SC-200)

Tools

SIEM Tools
EDR Tools
SentinelOne
Defender for Endpoint
QRadar

Job description

Senior Cyber Security Analyst - Kent - £50,000-£60,000 per annum

We’re proud to be partnering with a respected non-profit organisation dedicated to social impact and digital resilience. As they continue to grow and enhance their cyber maturity, they’re seeking a passionate Senior Cyber Security Analyst to support critical incident detection, response efforts, and security automation. The position offers a salary of £50,000 – £60,000, a strong benefits package tailored for UK employees, and a hybrid working model with remote flexibility.

Your Responsibilities Will Include:

  • Analysing security incidents and SOAR alerts with a methodical, threat-led approach
  • Designing and fine-tuning rules and playbooks to improve threat detection and response
  • Working with customers to shape and implement tailored security monitoring workflows
  • Supporting both live operations and onboarding of new services
  • Researching threat intelligence to enhance SOC processes
  • Reviewing junior analyst cases and helping develop their capabilities
  • Owning ticket queues, meeting SLAs, and ensuring high-quality case records
  • Participating in projects across departments and improving internal procedures
  • Taking part in the on-call incident escalation rota

You’ll Need:

  • 3+ years in a SOC or security operations function
  • Hands-on experience with SIEM/EDR tools like SentinelOne, Defender for Endpoint, QRadar
  • Security certifications (e.g., Security+, CySA+, SC-200, SBT L1)
  • Strong written communication and organisation skills
  • Experience leading or mentoring junior team members
  • High attention to detail and a collaborative mindset

Good to Have:

  • Prior work in incident response teams
  • Familiarity with cloud security tools and services
  • Knowledge of SOAR toolsets and automation
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.