Direct message the job poster from Hamilton Barnes
Cyber Security Consultant at Hamilton Barnes
Job Title: Level 3 Security Analyst
Role: As a Level 3 Security Analyst, you will be at the forefront of our Security Operations Center (SOC), monitoring and responding to security incidents, performing threat analysis, and contributing to the continuous improvement of our cybersecurity services. You will work within a dynamic team, ensuring the protection of our clients' digital assets while maintaining service excellence. Level 3 Analysts will take on additional responsibilities, such as mentoring junior team members, leading complex incident investigations, and driving strategic security improvements.
What’s in it for you?
1. Work with cutting-edge security technologies and develop expertise in industry-leading tools.
2. Be part of an award-winning cybersecurity team with a clear path for career progression.
3. Hybrid working environment with opportunities for professional growth and certification support.
Responsibilities:
1. Monitor, analyse, and respond to security events and incidents within the SOC, ensuring timely detection and resolution in line with SLAs.
2. Conduct thorough threat analysis and vulnerability assessments to identify potential security risks and implement mitigation strategies.
3. Develop and refine incident response plans and playbooks to enhance SOC effectiveness.
4. Perform root cause analysis (RCA) for high-priority incidents and contribute to service improvements.
5. Provide expert recommendations on security measures and solutions to clients and colleagues.
6. Engage in knowledge sharing within the SOC and wider teams to enhance security awareness.
7. Participate in on-call rota for critical incident response and escalation.
8. Work within designated shift patterns to ensure 24/7 SOC operations.
9. Contribute to process optimization, knowledge base development, and efficiency improvements.
10. Support the smooth onboarding of new customers into the SOC.
11. Build and maintain strong relationships with internal teams, partners, and clients.
12. Level 3 Analysts: Lead high-complexity investigations, mentor junior analysts, and contribute to SOC strategic development.
Skills & Must-Have:
1. Minimum of 2 years’ experience working in a Managed Security Services/SOC environment for Level 2.
2. Minimum of 4 years’ experience with leadership or advanced incident response experience for Level 3.
3. Strong understanding of network security, firewalls, VPNs, IDS/IPS, and endpoint security.
4. Proficiency in incident response, threat analysis, and vulnerability management.
5. Experience with security monitoring, root cause analysis, and risk assessments.
6. Excellent analytical and problem-solving skills with attention to detail.
7. Strong communication skills, including report writing and client interaction.
8. Ability to work within a fast-paced environment, managing multiple tasks effectively.
9. Willingness to participate in continuous learning and professional development.
10. Flexibility to work on-site in Peterborough two days per week (negotiable).
Preferred Skills & Certifications:
1. Experience with KQL, Rapid7 SIEM, SentinelOne EDR, Microsoft Defender XDR, or Microsoft Sentinel.
2. Level 3 Analysts: Additional expertise in threat hunting, digital forensics, and leadership experience.
Seniority level
Mid-Senior level
Employment type
Full-time
Job function
Analyst
Industries
Staffing and Recruiting
#J-18808-Ljbffr