×
Register Here to Apply for Jobs or Post Jobs. X

X Security Analyst

Job in Birmingham, West Midlands, B1, England, UK
Listing for: LRQA
Full Time position
Listed on 2026-03-07
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below
Position: 24 x 7 Security Analyst

Location:

LRQA Nettitude, Birmingham

Position Category:
Information Technology

Position Type:
Employee Regular

Role Description

This role reports to SOC Team Lead. As the SOC Analyst, you will be accountable for the effective delivery of your tasks, ensuring expected performance standards while continuously developing your skills as part of a high trust, high performing security service.

You will leverage your experience in security operations to enable the smooth delivery of our award‑winning defensive monitoring service, supporting proactive detection and response for clients across the globe.

You will be expected to contribute hands on, technically where and when needed, including deep‑dive investigations, supporting incident response, threat hunting, tuning detections, and when/if required delivering technical training to new starters.

As a SOC Analyst, you must proactively initiate actions and work independently to quickly mitigate threats, set an example, maintain operational continuity, make informed decisions, and ensure efficient delivery of your tasks under pressure.

The roles and responsibilities of the SOC Analyst are reviewed annually to ensure alignment with current organisational needs, emerging threats, and industry best practice.

Collaboration with Other Teams

As SOC Analyst, you will be working closely with Threat Intelligence, Engineering and Incident Response teams as this is essential to strengthen the SOC's ability to detect, investigate, and respond to emerging threats. This collaboration ensures timely sharing of actionable intelligence, refinement of detection rules, suggesting improvement of security tools, and alignment of operational processes, ultimately enhancing overall organisational security posture.

Continual

Improvement

This role drives continuous improvement within the SOC by identifying gaps in processes, detection capabilities, and team performance, and supporting implementation of solutions to enhance operational efficiency.

The SOC Analyst works on alerts to refine triage and response workflows, ensuring lessons learned are translated into updated playbooks and best practices.

Analyst & Operations Oversight
  • Perform day‑to‑day activities of the SOC analysts across all shifts.
  • Ensure all alarms/cases are reviewed and responded to within the predefined SLA.
  • Maintain and keep documentation up to date (including design specifications, diagrams and process documentation).
  • Complete all HALO case files on time and with accurate and timely data/results.
  • Aim to ensure high‑quality incident triage and investigation following predefined and agreed SOC processes.
  • Coordinate with other shifts to maintain operational continuity and consistent processes.
Key Performance Indicators, Service Level Agreements & Reporting
  • Key Performance Indicators (KPIs) are goals that must be achieved to demonstrate satisfactory or above performance for this job role.
  • KPIs will be monitored on an ongoing basis throughout each year and will be explored in further depth as part of the performance management process.
  • Service KPIs/SLAs and deliverables are tracked, adhered to and any deviations remediated through root cause analysis and non‑conformance.
Threat Detection

The analyst continuously monitors security alerts and logs across all customer environments using SIEM, EDR and other security and monitoring tools used by LRQA/Nettitude SOC Team.

Key responsibilities include:

  • Review real‑time alerts and telemetry to identify suspicious activity or breaches.
  • Analyse logs, network flows and endpoint data to validate alerts and understand threat context.
  • Maintain and tune SIEM/SOAR correlation rules and endpoint detection signatures to reduce false positives and improve coverage.
  • Triage and investigate unusual events to confirm incidents or dismiss benign anomalies.
Threat Hunting

Proactively search for hidden threats and improve detection.

Responsibilities include:

  • Perform hypothesis‑driven threat hunts across multiple client networks using telemetry, threat intelligence and the MITRE ATT&CK framework.
  • Identify weak spots or blind spots in monitoring coverage and recommend new rules, queries or sensors to close them.
  • Analyse…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary