Cyber Investigation and Response Analyst | Cyber Security Jobs London, United Kingdom

Full time in Cyber Security Analyst Email Job
  • Share:

Job Detail

  • Offered Salary 1000
  • Experience 5 Years
  • Gender Male
  • Qualifications network-engineering

Job Description

G-Research is Europe’s leading quantitative finance research firm. We hire the brightest minds in the world to tackle some of the biggest questions in finance. We pair this expertise with machine learning, big data, and some of the most advanced technology available to predict movements in financial markets.


The role


We are looking for a Cyber Investigation and Response Analyst to work as part of our CSIRT (Cyber Security Investigation and Response Team). This is a fantastic opportunity to work on multiple different aspects of security, with responsibilities ranging from alert triage to threat intelligence.


The successful candidate will be working with a whole host of different technologies across a combination of on-premise, hybrid cloud, and cloud native environments. This is a unique opportunity for someone with a strong grounding in a Security Operations Centre (SOC) environment to move into a new phase of their career, with growth and diversification opportunities into Incident Response, Threat Intelligence or even Security Engineering.


Key responsibilities of the role include:

  • Investigating and responding to malicious and suspicious activity in the G-Research network
  • Monitoring, triaging, and responding to security alerts
  • Developing, deploying, and documenting new detection techniques
  • Configuring security monitoring tools
  • Assessing threats and providing data collection and monitoring recommendations for new systems and applications within the environment
  • Advancing CSIRT capabilities by providing input and feedback to Security Engineering, Security Data Engineering, and Security Data Science teams


Who are we looking for?


This role will suit someone with drive, energy and a passion for Cyber Security. A part of this role will also include mentoring and coaching across the team.


The ideal candidate will have:

  • Previous SOC experience and mature understanding of security incident response and investigation
  • Azure Sentinel stack experience
  • Strong alert triage and detection engineering experience
  • Experience with threat intelligence
  • Experience monitoring for insider threats and working in a Cloud computing environment
  • The ability to document and articulate impact, timeline, and outcome of an incident to both technical and non-technical audiences
  • Strong attention to detail and an inquisitive mind-set


The following skills/experience would also be beneficial:

  • Hybrid cloud experience
  • Python knowledge
  • Knowledge of cutting-edge big data technologies and how to work with them (HDFS, Spark, Jupyter notebooks, Kibana) would be beneficial.


Why should you apply?

  • Highly competitive compensation plus annual discretionary bonus
  • Lunch provided (via Just Eat for Business ) and dedicated barista bar
  • 30 days’ annual leave
  • 9% contributory pension scheme
  • Informal dress code and excellent work/life balance
  • Comprehensive healthcare and life assurance
  • Cycle-to-work scheme
  • Monthly company events


G-Research is committed to cultivating and preserving an inclusive work environment. We are an ideas-driven business and we place great value on diversity of experience and opinions.


We want to ensure that applicants receive a recruitment experience that enables them to perform at their best. If you have a disability or special need that requires accommodation please let us know in the relevant section

Other jobs you may like