
Security Analyst – Splunk
Bridewell
full-time
Posted on:
Location Type: Hybrid
Location: Cardiff • United Kingdom
Visit company websiteExplore more
Tech Stack
About the role
- Manage Incident Triage, Investigation, Containment and Eradication activities as a Security Analyst within our MDR service.
- Perform containment and eradication response actions during an incident utilising your knowledge and experience to take appropriate actions given the situation.
- Support Senior Analysts in threat hunts within client environments.
- Review and approve playbooks and alert guides prior.
- Manage day-to-day analyst duties including Incident Response, Tuning, Process Improvement and Threat Hunting
- Mentor and Develop Junior Analysts
- Support Seniors Analysts in internal and client side escalations.
- Continue your own personal development across Cyber and technology with the support of Bridewell.
Requirements
- Must have at least two years’ experience as a SOC Analyst.
- Must have one of the following active certifications: SC-200, SANS GIAC, Blue Team Level 1
- Must have demonstrable experience with customer and stakeholder management.
- Must have demonstrable experience working in a Service Provider environment.
- Strong experience within Splunk SIEM.
Benefits
- Competitive Salary
- 25 Days Holiday - Plus buy and sell options
- Flexible Working (around core office hours)
- Profit Share Scheme
- Company Pension
- Employee Shareholder Scheme
- Dedicated Training Budget
- Life Assurance
- Cycle to Work Scheme
- Electric Vehicle Scheme
- Private Healthcare (incl. Gym discounts)
- Vision Care
- Birthday off (After 1 year)
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
Incident TriageIncident InvestigationContainmentEradicationThreat HuntingProcess ImprovementIncident ResponseSIEMSplunk
Soft Skills
MentoringStakeholder ManagementCommunication
Certifications
SC-200SANS GIACBlue Team Level 1