×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Security Analyst - T2 - Enterprise Markets

Job in Bradford, West Yorkshire, NE70, England, UK
Listing for: Gamma Comms
Full Time position
Listed on 2026-02-28
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Network Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 GBP Yearly GBP 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Cyber Security Analyst (Tier
2)

Hybrid working from client site in Bradford

A bit about us

At Gamma, we're more than just a leader in Unified Communications as a Service (UCaaS) - we're a dynamic, forward-thinking team revolutionizing the way businesses connect and communicate. We provide voice, data, and mobile solutions to businesses across the UK, Germany, Spain, and the Benelux region, and we're expanding rapidly to bring digital automation and Gamma-powered services to SMEs through a growing network of channel partners.

We move fast with a start-up mindset, but we have the stability of a leading European business. Our team thrives on collaboration, innovation, and the belief that diverse perspectives make us stronger. Join us, and you'll have the opportunity to make an impact, grow your career, and be part of a company that celebrates inclusivity and fresh ideas.

What will you be doing?

We are seeking a proficient and motivated Cyber Security Analyst - Tier 2 to join our dynamic Security Operations Centre (SOC) team. You will play a crucial role in monitoring and responding to cybersecurity incidents for one of large enterprise customers. Your main responsibilities will include detecting, investigating, and resolving security incidents while leveraging your advanced technical skills and security knowledge.

As a Cyber Security Analyst - Tier 2, you will act as a senior analyst conducting regular threat hunting investigations. Stay updated on the latest cyber security trends, contribute to the SOC team's efficiency and support the proactive detection of new vulnerabilities disclosures. You will report to the Security Operations Manager, support our Managed Detection and Response (MDR) technologies and security incident handling.

The ideal candidate will have a strong understanding of security principles, networking, threat actors, and threat vectors. Exceptional problem‑solving and communication skills are a must to proactively identify areas for customer security improvements. Previous knowledge and experience managing and utilizing technologies such as Rapid 7 IDM, IVM and Cortex EDR.

What will you be doing day‑to‑day?
  • Analysis: Utilize SIEM and other security tools to monitor and analyze security alerts, triage incidents, and investigate breaches and vulnerabilities.
  • Threat Hunts: Responsible for conducting proactive investigations beyond security tool alerts, identify anomalous behaviour, and derive patterns in log data to detect new Tactic Techniques and Procedures (TTPs).
  • Vulnerability Disclosures: Regularly document new vulnerability disclosures and communicate findings to stakeholders at all levels.
  • Documentation: Record incidents, actions taken, and resolutions in accordance with company procedures.
  • Customer Support: Address security and technical queries from customers and elevate issues as necessary.
  • Training: Continuously update your knowledge on cyber security trends through ongoing training.
  • Collaboration: Work closely with team members to enhance security protocols and improve incident response strategies.
  • Incident Handling: Triage security alerts, elevate incidents to customers and senior management when applicable, and ensure timely resolution.
  • Security Measures: Identify and support the management of implementing security measures, such as tuning and use case development.
  • Communication: Collaborate with cross‑functional teams, communicate security requirements to stakeholders, and ensure successful handovers to support teams.
  • Research: Stay informed and lead internal and external customer communications about emerging threats, technologies, and regulatory changes to maintain cutting‑edge security practices.
About you
  • Previous experience working in a SOC leveraging SIEM and EDR technologies; including Rapid 7, Microsoft Sentinel, Cortex EDR and Defender.
  • Experience conducting deep‑dive investigations and compiling post‑analysis reports.
  • Good understanding of regulatory standards and compliance (e.g., GDPR, ISO 27001, PCI DSS).
  • Experience with Sentinel, Rapid 7 IDR, IVM, Cortex EDR, or similar.
  • Strong understanding of network security, endpoint protection, IAM, and data protection concepts.
  • Abil…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary