Cyber Security Analyst - Incident Response
London - Hybrid | Up to £65,000 + benefits
A global specialist insurer is building out its internal cyber defence capability & is seeking an experienced analyst to strengthen its Security Operations Centre.
You'll join a collaborative team focused on both proactive threat hunting & live incident response, protecting a complex international estate. This position suits someone who has started their career in a SOC environment & now works primarily in incident & threat response.
The role
- Lead investigations into live security incidents including malware, phishing, & endpoint compromise
- Perform root cause analysis, containment, & recovery actions
- Tune detection rules & develop new use cases to improve response times
- Utilise Microsoft Defender, Sentinel, & Azure Security tools to detect & respond to threats
- Conduct post-incident reviews & recommend long-term prevention strategies
- Collaborate with infrastructure & security teams to harden systems & processes
Experience required
- Minimum 2 years in a SOC environment followed by recent hands-on incident response experience
- Strong working knowledge of SIEM & EDR tools (Sentinel, Defender, CrowdStrike, etc.)
- Solid understanding of Windows, Linux, & network security principles
- Experience with forensic or threat analysis techniques
- Familiarity with MITRE ATT&CK, NIST, or similar frameworks
Desirable
- Exposure to automation or SOAR tooling
- PowerShell or Python scripting skills
- GIAC or Microsoft security certifications
This is an opportunity to join a highly respected security function within the London Market, working closely with senior engineers & threat specialists in an environment that prioritises both learning & impact.
We are looking to schedule interviews immediately so contact Brushoth: brushoth@pioneer-search.com or apply following the link