Cyber Security Analyst L3 at Aspire Technology Solutions
Gateshead NE8 2BJ, England, United Kingdom -
Full Time


Start Date

Immediate

Expiry Date

22 May, 25

Salary

0.0

Posted On

22 Feb, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Good communication skills

Industry

Information Technology/IT

Description

ABOUT ASPIRE

At Aspire Technology Solutions, we look for dynamic individuals who want to work for one of the fastest growing IT and Cyber Security providers in the UK.
Our mission is to deliver technology like no other.
It is such an exciting time to join us on our journey as we continue to grow and expand!

INTERVIEW PROCESS

We generally conduct interviews in three stages, lasting approximately 2-3 weeks depending on everyone’s calendars.

  • Shortlisted candidates will be invited to a pre-screening call via teams to discuss your experience and what you’re looking for in your next role.
  • Successful candidates will be invited to an interview with the Hiring Manager.
  • If successful in interview, candidates will be invited to an informal interview with key stakeholders at Aspire to meet the wider team(s).
Responsibilities

ABOUT THE ROLE

We are looking for a Cyber Security Analyst L3 to join our Security Operation Centre (SOC).
You will be responsible for advanced threat detection, incident response, and continuous improvement of security posture. This role requires a deep understanding of security principles, threat landscape, and incident handling procedures, coupled with strong analytical, communication, and technical skills.
Customer service is key to success in the role – living our values are woven through everything we do to guarantee that our service delivery is second to none.

WHAT YOU WILL BE DOING:

  • Threat Hunting: Identify hidden threats using advanced techniques. Document findings and improve detection strategies.
  • Incident Response: Triage and investigate security incidents. Support high-severity incidents and conduct basic memory and malware analysis.
  • Knowledgebase: Update SOC wiki with accurate use cases, playbooks, and guides.
  • Continuous Learning: Stay current with cybersecurity trends and best practices.
  • Collaboration: Work closely with team members, sharing knowledge and insights.
  • Improvement: Identify and implement opportunities for enhancing SOC processes.
  • Threat Analysis: Stay updated on threat intelligence and integrate it into operations.
  • Tool Maintenance: Maintain and troubleshoot security tools. Develop detection rules, automation scripts, and playbooks.
  • Escalation Point: Act as a point of escalation for complex issues and incidents.

You will suit the role if you have:

  • Experience with monitoring security tools such as CrowdStrike, Microsoft Sentinel, and Microsoft XDR.
  • Experience dealing with a range of security incidents.
  • Experience in conducting security investigations and triaging alerts.
  • Familiarity with incident response and post-incident reviews.
  • Understanding of threat intelligence and its integration into operations.
  • Strong communication skills for handling customer calls and emails.
  • Collaborative mindset and ability to work effectively in a team.
  • Prior experience in an IT-related background.
  • A willingness to learn and good attention to detail.
  • The following certifications are advantageous but not essential:
  • AZ-500
  • SC-200, SC-100
  • MD-102
Loading...