FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers. A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable.
You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within. Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time. If you do have SC Cleared status, or higher, i.e. DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.
The Tier 2 Cyber Security Analyst role will involve you being responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. As a Tier 2 Analyst you will works closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions.
Responsibilities:
* Conducting escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions.
* Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents.
* Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs).
* Investigating potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity.
* Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
* Monitoring the threat landscape and documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
* Following established incident response playbooks, providing feedback for enhancements and suggesting updates to streamline internal Cyber processes and improving threat response times.
.* Coordinating with Tier 3 Analysts and management to refine detection and response workflows, contributing to continuous SOC maturity.
* Collaborating with Tier 3 Analysts on tuning SIEM and detection tools to reduce false positives and improve alert fidelity, submitting tuning requests and testing configurations when necessary.
* Identifying gaps in current detection content and working with Senior Analysts to develop and validate new detection rules and use cases tailored to the organization''s threat profile.
* Acting as a mentor to Tier 1 Analysts, offering guidance on triage and analysis techniques and facilitating on-the-job training to elevate their technical skills and operational efficiency
.* Assisting in training sessions and knowledge-sharing activities, providing feedback on areas for growth and contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst: Apply
Other jobs of interest...


Perform a fresh search...
-
Create your ideal job search criteria by
completing our quick and simple form and
receive daily job alerts tailored to you!