The Role
As Cyber Security Analyst, you will:
- Monitor, analyse, and respond to security alerts across SIEM, NDR, firewall, and endpoint platforms.
- Investigate incidents end‑to‑end, including containment, recovery, and lessons learned.
- Design and refine detection rules, use cases, and playbooks, keeping pace with evolving threats.
- Tune detection mechanisms to enhance accuracy and reduce false positives.
- Collaborate with technical and business stakeholders to continually strengthen security posture.
- Maintain meticulous documentation and contribute to SOC reporting and knowledge base.
- Proven experience (typically 2–4 years) in SOC, incident response, or security operations roles, with demonstrable detection engineering and scripting capability.
- Expertise with SIEM and XSOAR platforms (e.g., Sentinel, Splunk, Cortex XSOAR).
- Strong grasp of network protocols, operating systems, attack methodologies, and threat landscapes.
- Experience scripting or automating workflows with Python, PowerShell, or KQL.
- Excellent analytical and communication skills, with the ability to bridge technical detail and business impact.
- Professional presence and a mindset aligned with the exacting standards of a high‑trust wealth management environment.
- Familiarity with MITRE ATT&CK, threat hunting, and advanced detection techniques.
- Certifications such as CISSP, CEH, or GIAC, and/or a degree in Cyber Security, IT, or related fields.
Why Join?
This is more than just a SOC role — it’s an opportunity to contribute to an organisation where trust, discretion, and excellence define the culture. You’ll work with highly experienced colleagues in a collaborative, professional environment, with ongoing investment in your development and accreditations.
Occasional on‑call responsibilities and minimal travel may apply. If this sounds of interest to you, please 'apply now' and quote #267252