Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Security Analyst - T1

Sapphire Technologies Ltd.

Glasgow

On-site

GBP 60,000 - 80,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Glasgow is seeking a Tier 1 Security Analyst to manage and respond to security alerts in a cutting-edge Security Operations Centre. The successful candidate will triage alerts and conduct security investigations while developing relationships with client IT teams. Strong knowledge in cybersecurity solutions and relevant certifications are essential. This position offers opportunity for growth in a supportive and inclusive environment.

Qualifications

  • Knowledge of relevant certifications in cybersecurity solutions.
  • Ability to monitor and respond to security alerts within SLA.
  • Capable of conducting security investigations using historical data.

Responsibilities

  • Monitor security alerts generated by various technologies.
  • Perform triage and in-depth analysis as guided by processes.
  • Develop strong relationships with the client IT and Information Security team.

Skills

Strong awareness of cyber security industry
Incident response
Triage security alerts
Analytical skills

Tools

SIEM
EDR
Microsoft Sentinel
Threat Intelligence
Job description

We have an exciting opportunity to join our Scottish office in Glasgow City Centre as a Tier 1 Security Analyst (T1SA) based in a state‑of‑the‑art Security Operations Centre (SOC).

Description

The role of a T1SA is responsible for the first point of contact with security alerts. The primary responsibility is triaging security alerts following security playbooks and processes as part of initial incident investigations. Resolving or escalating Security Incidents as required and partaking in incident response tasks to assist with post-incident reviews will be central to the role.

T1SAs are responsible for being resourceful, adaptive and creative with the ability to work under pressure, including but not limited to working to mitigate the impact of live and ongoing security incidents.

This role encompasses building experience while leveraging the team’s expertise to accelerate learning and understanding of the Managed Services that are being delivered. This includes building expertise in cybersecurity and making use of the training resources that will be provided.

Key Activities & Responsibilities
  • Monitor and respond to security alerts generated by technologies such as SIEM, EDR, Microsoft Sentinel, vulnerability management, phishing and threat intelligence solutions within a given SLA.
  • Performing triage, in‑depth analysis and investigation as guided by processes and playbooks.
  • Use sophisticated threat intelligence as part of investigations.
  • Conduct security investigations using historical data.
  • Conduct investigations with a wide range of data sets across multiple customer environments.
  • Develop and maintain a strong relationship with the client IT and Information Security team.

Successful candidates will have a strong awareness of the cyber security industry and demonstrate knowledge with relevant certifications where appropriate for solutions, including XDR, SIEM solutions, Threat Intelligence, EDR, vulnerability management, network, cloud, Artificial Intelligence/Machine learning, SOAR, automation and endpoint security technologies.

🌍 We’re Committed to Inclusion

Sapphire is proud to be an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.

🔗 Ready to make a difference?

Apply now and be part of a team that’s shaping the future of cybersecurity.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.