*immediate joiners are prioritised for this role.
Why This Role Matters
Our client is seeking an interim Security Operations Analyst for a 6-month contract to bolster their global team. This opportunity involves delivering transparent, non-disruptive security solutions that empower the business to innovate rapidly and securely.
The Mission
Threat Triage: Identify, evaluate, and respond to security events promptly based on their urgency and criticality.
Deep Investigation: Perform in-depth monitoring and analysis of security alerts across both on-premises and cloud environments.
Incident Response: Execute remote remediation of malicious activity and conduct detailed malware analysis.
Process Enhancement: Develop and refine existing procedures for incident detection, triage, and the deployment of countermeasures.
How You'll Succeed:
Strong understanding of Operating System and Networking fundamentals alongside Windows and Linux security best practices.
Hands-on capability with centrally managed information security tools like Anti-Virus, EDR/XDR, SIEM, or SOAR technologies.
Proven capability to configure alerts for Microsoft security ecosystems such as Azure Sentinel and MS Defender.
Competence in crafting customized strategic remediation plans for targeted threats and Advanced Persistent Threats.
Solid knowledge of scripting languages like Python or PowerShell to effectively automate routine security operations tasks.
Working familiarity with cloud security platforms and products including Azure Cloud, M365 E5, and related environments.