Security Analyst - CISSP, CISM, CEH, EDR, SIEM, SOAR, IDS/IPS, TCP/IP, Defender
Our leading global law firm client are currently looking to take on a new Security Analyst (CISSP, CISM, CEH, EDR, SIEM, SOAR, IDS/IPS, TCP/IP, Defender) to join their team on a permanent basis. The firm are an extremely modern law firm which offer a healthy hybrid working solution 2-3 days per week in London and offer a great deal of autonomy and technical exposure.
This Security Analyst (CISSP, CISM, CEH, EDR, SIEM, SOAR, IDS/IPS, TCP/IP, Defender) role, will be responsible for the day to day operations of existing security solutions and uses tools to identify, investigate and resolve any security events detected.
To be considered for this Security Analyst (CISSP, CISM, CEH, EDR, SIEM, SOAR, IDS/IPS, TCP/IP, Defender) role, it's ideal you have:
- 3 + years within a similar role
- Ideal but not required law firm experience
- Security qualifications such as CISSP, CISM, CEH, CompTIA Sec+ or others
Duties, Responsibilities & Person Specification
- Assist with the management and operation of security controls.
- Help in streamlining and automating of security controls in order to improve overall security posture of the organisation.
- To take the lead on security incidents, identification, and remediation.
- Support operational transition for the deployment, integration and configuration of new security solutions and of any enhancements to existing security solutions.
- Monitor all in-place security solutions for efficient and appropriate operations.
- Conduct security focused reviews and analysis of log files and reports of devices, systems and network traffic (ie, workstations, Servers, network devices). Interpret results and resolve issues identified.
- Investigate security alerts and provide incident response if and when required, working with global team to help mitigate and resolve incidents.
- Support and contribute to red/blue team testing and cyber threat based table top exercises.
- Develop maintain and implement system hardening procedures.
- Maintain up-to-date detailed knowledge of the IT Security industry, including the development of new attacks and threat vectors.
- Provide a point of escalation for the Service Desk, IT and Business support teams with respect to security-related events.