Senior Security Operations Analyst (Threat)
Skipton Building Society
We've been helping people find a good place for their money since 1853. And today, we help over a million customers save for the future and secure their own homes.
Hours:
Full time permanent role - 35 hours per week - Mon to Fri - 9am to 5pm
Hybrid working from Skipton Head Office (around 1 day per week)
Salary:
£49,350 Per Annum
Closing Date:
Sun, 16 Feb 2025
We are recruiting for a Senior Security Operations Analyst, to join our Security team. If you enjoy working in a fast paced and agile environment, helping inform key decisions on our security posture, analysing assessing and hunting threats, and have curious and analytical minds set this may be the job for you.
You will be joining the Security function with over 20 people dedicated to securing our organisation, split over various security disciplines. Working specifically within the Operational Security Team, you will be working closely with our Managed Security Service Provider, whilst supplementing this service with your own capabilities such as threat analysis and hunting, supporting incident management processes and maintaining our threat landscape.
What Will You Be Doing?
* Monitor escalated security alerts from our MSSP, assessing and managing their progress internally, whilst working closely with our MSSP to ensure we are effectively utilising the SIEM service appropriately and driving process and best practice improvements.
* Conduct in-depth analysis of security events to determine their impact and severity.
* Correlate data from multiple sources to identify patterns and indicators of compromise (IOCs) and use EDR and SIEM tools to conduct proactive threat hunting.
* Support our incident management process, providing subject matter expertise.
* Maintain, implement processes, and supporting documentation. Input into the creation and maintenance of appropriate standards and policies aligned with our current policy framework.
* Maintain and update our threat landscape.
What Do We Need From You?
Knowledge:
* Proficiency in incident handling, threat analysis, and security tools.
* Familiarity with network protocols, malware analysis, and log analysis.
* Good knowledge of both the NIST and Mitre Att&ck frameworks.
Experience:
* Minimum of 2 years in a SOC environment.
* Using EDR tooling (preferably Sophos).
* Using a Threat Intelligence Platform.
* Interpreting threat intelligence feeds, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
* Threat hunting across both on-premise and cloud environments.
Qualifications:
* Relevant certifications such as CompTIA Security+, CEH, or GIAC (GCIH, GCIA, etc.).
Behaviours:
* Strong communication, analytical and teamworking skills.
#J-18808-Ljbffr