Senior Security Operations Analyst (Threat)
Skipton - The Bailey, United Kingdom
Skipton Building Society
Hours:
Full time permanent role - 35 hours per week - Mon to Fri - 9am to 5pmHybrid working from Skipton Head Office (around 1 day per week)
Salary:
£49,350 Per AnnumClosing Date:
Sun, 16 Feb 2025We are recruiting for a Senior Security Operations Analyst, to join our Security team. If you enjoy working in a fast paced and agile environment, helping inform key decisions on our security posture, analysing assessing and hunting threats, and have curios and analytical minds set this may be the job for you.
Who Are We?
Not just another building society. Not just another job.
We're the fourth biggest building society in the UK and what makes us a bit different is that we're a mutual organisation. We don't have shareholders; we're owned by our members.
Our colleagues say Skipton's a great place to work, and you could be one of them, bringing with you new ideas on how we can keep customers at the heart of what we do.
Whatever your background, and whatever your goals, we'll help you take the next step towards a better future.
You will be joining the Security function with over 20 people dedicated to securing our organisation, split over various security disciplines. Working specifically within the Operational Security Team, you will be working closely with our Managed Security Service Provider, whilst supplementing this service with your own capabilities such as threat analysis and hunting, supporting incident management processes and maintaining our threat landscape.
What’s In It For You?
Skipton values work/life balance and we are proud to support hybrid and flexible working, where possible. We have a newly refurbished head office which offers a vibrant and collaborative working space.
We have a range of other benefits available to you including;
Annual discretionary bonus scheme
25 days standard annual leave + bank holidays + rising 1 day per year of service to a maximum of 30 days
Holiday trading scheme allowing the ability to buy and sell additional annual leave days
Matching employer pension contribution (up to 10% per annum)
Colleague mortgage (conditions apply)
Salary sacrifice scheme for hybrid & electric car
A commitment to training and development
Private medical insurance for all our colleagues
3 paid volunteering days per annum
Diverse and inclusive colleague networks available for you to join including our Carers and Pride Alliance groups
We care about your health and wellbeing – we provide a range of benefits that support this including cycle to work initiative and discounted gym membership
What Will You Be Doing?
Monitor escalated security alerts from our MSSP, assessing and managing their progress internally, whilst work closely with our MSSP to ensure we are effectively utilising the SIEM service appropriately and driving process and best practise improvements.
Conduct in-depth analysis of security events to determine their impact and severity.
Correlate data from multiple sources to identify patterns and indicators of compromise (IOCs) and use EDR and SIEM tools to conduct proactive threat hunting.
Support our incident management process, providing subject matter expertise.
Maintain, implement processes, and supporting documentation. Input into the creation and maintenance of appropriate standards and policies aligned with our current policy framework.
Maintain and update our threat landscape.
What Do We Need From You?
Knowledge:
Proficiency in incident handling, threat analysis, and security tools.
Familiarity with network protocols, malware analysis, and log analysis.
Good knowledge of both the NIST and Mitre Att&ck frameworks
Experience:
Minimum of 2 years in a SOC environment.
Using EDR tooling (preferably Sophos).
Using a Threat Intelligence Platform.
Interpreting threat intelligence feeds, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
Threat hunting across both on-premise and cloud environments.
Qualifications:
Relevant certifications such as CompTIA Security+, CEH, or GIAC (GCIH, GCIA, etc.).
Behaviours:
Strong communication, analytical and teamworking skills.
Tags: Agile CEH Cloud CompTIA EDR GCIA GCIH GIAC Log analysis Malware MITRE ATT&CK NIST SIEM SOC Threat intelligence TTPs
Perks/benefits: Fitness / gym Flex hours Health care Medical leave Salary bonus Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.