×
Register Here to Apply for Jobs or Post Jobs. X

Security Operations Analyst

Job in City of Westminster, Central London, Greater London, England, UK
Listing for: Charles Taylor
Contract position
Listed on 2026-03-03
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 60000 - 80000 GBP Yearly GBP 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Location: City of Westminster

Charles Taylor is looking for a Senior Security Operations Analyst on a 12 months fixed term contract that will complement our existing team, and who will be responsible for performing real-time analysis and security alert investigation for both on-prem and Cloud environments. The ideal candidate will assist in the delivery of key security initiatives and activities and provide excellent client service while evaluating the type and severity of security events and resolve issues by taking the appropriate corrective action.

Success in this role requires a 'can do' attitude and positive engagement with senior management that concentrates on delivering transparent non-disruptive security solutions to enable the business to secure clients, to grow and to innovate rapidly and securely. This role can be performed remotely but occasional travel to London office every 3-6 months might be required.

  • Identify, triage, and respond to security events in a timely manner with consideration to criticality and urgency and support the security operations function during all security related incidents.
  • Provide 2nd and 3rd line incident response and analysis and support the security operations function during security related incidents with timely escalation, and drive to ensure the closure of incidents.
  • Working semi-independently, undertaking information security engagements including working co-ordination (client interaction, deliverables, work plans, escalations etc.)
  • Maintain information security controls and processes as part of a global SOC team (UK and Asia).
  • Provide clear, organised findings, and recommendations, and tracking progress towards resolution and risk mitigation.
  • Identify control gaps/weaknesses within existing business and new business and take part in remediation activities with direction and support from the management.
  • Support the Security Operations Manager in the execution of their duties and assist in successful delivery of the cyber security strategy.
  • Identify control gaps/weaknesses within existing business and new business and taking ownership for remediation activities with direction and support from the Security Operations Manager.
  • Producing high-quality presentations and management reports, and metrics for technical and non-technical audiences.
  • Maintain awareness of developments in the information security industry.
  • Work semi-independently, liaising with other team members across CT, producing high quality oral and written work product and presenting complex technical matters clearly and concisely.
  • Carry out Ad Hoc duties and tasks that are allocated to you at the discretion of management and that are within your capabilities and within the scope of your post.
  • Demonstrate and champion Charles Taylor Values by ensuring Agility, Integrity, Care, and Accountability and Collaboration.
    Advanced understanding of Operating System and Networking fundamentals alongside OS Security (Windows & Linux) and Network Security best practices (perhaps with a home lab you use to learn more).
  • Advanced hands‑on experience with centrally managed information security tools such as Anti‑Virus, EDR, SIEM or SOAR, ideally Azure Sentinel, MS Defender, Active Directory and Entra .
  • Good knowledge of a scripting language such as Python or Power Shell and some experience of using it to automate aspects of Security Operations.
  • Perform log analysis from a variety of sources to identify potential threats.
  • Perform security incident root cause analysis and drive implementation of containment and mitigation strategies.
  • Experience investigating and responding to both external and insider threats.
  • Experience with attacker tactics, techniques, and procedures.
  • Experience in threat hunting including the ability to leverage intelligence data to proactively identify and iteratively investigate suspicious behavior across networks and systems.
  • Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development.
  • Good ability to configure alerts for Microsoft security technologies (e.g., Azure Sentinel, MS…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary