Cyber Security Analyst (6 Months)

Location:
Weymouth
Job Type:
Contract
Industry:
Cyber Security
Job reference:
BBBH380203_1726833071
Posted:
3 months ago

Providing coving for staff sabbatical. You will proactively be protecting New Look's systems, networks, and information, from cyber-threats and unauthorised access. Leveraging your passion and commitment to cyber security, operating closely with other senior security professionals, project managers and stakeholders you will be implementing your skills and experience, responding to incidents, working on security projects and BAU Activities to ensure the security and integrity of our digital assets.
Accountabilities & Responsibilities



Functional Knowledge -
  • Experience of working in an IT Security role for 2+ years is essential.
  • A degree in IT or related business topic (desirable)
  • Relevant industry certifications such as CISSP, CISM, or CompTIA Security+.
  • Experience of systems security and development of best practice solutions and approaches
  • Experience of working with regulatory bodies
  • Proven history in managing multiple projects/investigations.
  • Ability to work effectively both independently and in cross-functional teams.
  • High ethical standards and a commitment to protecting sensitive information.
  • Knowledge of security tooling such as
    • Network monitoring
    • Endpoint Detection and Response (EDR)
    • Security Incident and Event Monitoring (SIEM)
    • Identity and Access Management (IAM) and
    • Cloud Access Security Broker (CASB)
    • Microsoft Defender for Endpoint
    • Knowledge of Darktrace
    • Sentinel One, Microsoft Defender Suite, AD Manager Plus, MS Sentinel


Values & Behaviours



Key behavioural skills include:
  • Decision Making: The ability to work independently with confidence to make decisions based on the presented evidence is key to this role.
  • Problem Solving: The ability to evaluate an issue and produce solutions.
  • Communication: Ability to communicate to all areas of the business at an appropriate level over various channels.
  • Attention to Detail: Being able to spot key events and alerts in substantial amounts of potentially noisy data sets to identify and resolve security issues.
  • Empathy: A security breach can be a distressing event for a colleague so the ability to put others at ease during or following an incident is important to the role.
Technical Knowledge & Experience
You will have.
  • A degree in IT or related business topic (desirable).
  • Relevant industry certifications such as CISSP, CISM, or CompTIA Security+.
  • Strong knowledge of cybersecurity principles, frameworks, and standards.
  • Experience of systems security and development of best practice solutions and approaches.
  • Experience of working with regulatory bodies.
  • Experience in IT risk management.
  • Proven record in managing multiple projects/investigations.
Measures / Key Performance Indicators
KPI's include:
  • Mean Time to Resolve (MTTR): Measure the average time it takes for the analyst to detect and respond to security incidents. Lower response times indicate a more efficient security team.
  • Mean Time to Detect (MTTD): Calculate the average time it takes to detect a security incident. A shorter MTTD suggests a faster detection process.
  • Mean Time to Respond (MTTR): Measure the average time it takes to respond to and mitigate a security incident. A shorter MTTR indicates a more efficient response process.
  • User Training Completion Rate: Track the percentage of employees who complete cybersecurity training. Higher completion rates suggest better user awareness.
  • Security Audit Results: Review the outcomes of security audits and assessments. A higher rate of compliance with security standards and best practices is favourable.
Cost-effectiveness: Analysis the cost of cybersecurity operations relative to the level of protection and risk reduction achieved.
Key Relationships

Internally:[Jo1] [Jo2]
    • Infrastructure Team
    • EUC
    • End user & Compute Team
    • IT Service Desk
    • Network Support Team
    • DPO and Legal Team
    • Operational Compliance
    • Engineering teams

Externally:
  • Kroll
  • Accenture
  • CybelAngel
  • Darktrace
  • Microsoft





Back job search
Back to Search Results