Cyber Security Analyst L1 at Aspire Technology Solutions
Gateshead NE8 2BJ, , United Kingdom -
Full Time


Start Date

Immediate

Expiry Date

25 Aug, 25

Salary

36000.0

Posted On

26 May, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Good communication skills

Industry

Information Technology/IT

Description

ABOUT ASPIRE

At Aspire Technology Solutions, we look for dynamic individuals who want to work for one of the fastest growing IT and Cyber Security providers in the UK. It is an exciting time to join us on our journey as we grow and expand!
Our mission: To deliver technology like no other!

INTERVIEW PROCESS

We generally conduct interviews in three stages, lasting approximately 2-3 weeks, depending on everyone’s calendars.

  • Shortlisted candidates will be invited to a pre-screening call via Teams to discuss your experience and what you’re looking for in your next role.
  • Successful candidates will be invited to an interview with the Hiring Manager.
  • If successful in an interview, candidates will be invited to an informal interview with key stakeholders at Aspire to meet the wider team(s).
Responsibilities

ABOUT THE ROLE

We are looking for two Cyber Security Analyst’s L1 to join our growing SOC team based at our Head Office on the Gateshead Quayside.
As a Cyber Security Analyst L1, you will work within our 24/7 Security Operations Centre (SOC) team, where you will have access to a wide array of tooling and services at your disposal.
Your primary responsibility will be performing alert triage, conducting in-depth investigations, and improving detection fidelity through tuning. You will serve as the first line of escalation for Associate Analysts, ensuring complex and malicious alerts are promptly reviewed.
Efficiency is also important to succeed, as you will be managing a diverse workload.
Customer service is key to success in the role – living our values are woven through everything we do to guarantee that our service delivery is second to none.

WHAT YOU WILL BE DOING

  • Monitor security queues, triage alerts, and determine incident severity.
  • Conduct in-depth investigations which can involve correlating.
  • Act as a first stage of escalation for associate security analyst queries and complex tickets.
  • Assist in incident response and post-incident reviews.
  • Continually identifying opportunities to improve the fidelity of detections, implementing the necessary tuning by following the SOCs tuning processes.
  • Stay updated on threat intelligence and integrate it into operations.
  • Answer customer calls in a professional and friendly manner, acting as a first point of contact for RealProtect customers and IR engagements.
  • Engage in ongoing learning and professional development.
  • Collaborate with team members and participate in meetings.
  • Support vulnerability scans and report generation.

YOU WILL SUIT THE ROLE IF YOU HAVE

  • Experience with monitoring security tools such as CrowdStrike, Microsoft Sentinel, and Microsoft XDR.
  • Prior experience in an IT-related background.
  • Experience working shifts.
  • Awareness of security technologies.
  • A willingness to learn and good attention to detail.
  • Experience in conducting security investigations and triaging alerts.
  • Familiarity with incident response and post-incident reviews.
  • Understanding of threat intelligence and its integration into operations.
  • Strong communication skills for handling customer calls and emails.
  • Collaborative mindset and ability to work effectively in a team.
  • It is advantageous but not essential to have the following certificates: BTL1, TryHackMe Level 1, SANS / GIACs, SC-200, CCFR.
Loading...