- Company Name
- ED&F Man Commodities
- Job Title
- Cyber Security Analyst
- Job Description
-
**Job Title**
Cyber Security Analyst
**Role Summary**
The Cyber Security Analyst serves as the primary escalation point for an outsourced Security Operations Centre (SOC). This role triages and investigates security alerts, supports major incident response, maintains and optimises endpoint, email, identity, and vulnerability management platforms, and continuously improves the organization’s security posture through tool evaluation and policy updates.
**Expectations**
- Minimum 5 years in a Cyber Security Analyst or equivalent role with proven incident‑response experience.
- Proficiency in EDR (CrowdStrike Falcon preferred), SIEM (Rapid7 or equivalent), email security/DLP, identity management, and vulnerability tools.
- Strong networking fundamentals and cloud security knowledge (Azure/AWS).
- Ability to develop SOC playbooks, run proofs‑of‑concept, and liaise with senior stakeholders.
- Scripting capability in Python and/or AutoIT.
- Excellent communication, collaboration, and composure under incident pressure.
**Key Responsibilities**
- Act as escalation point for SOC; receive, triage, and investigate alerts.
- Conduct thorough investigations to generate actionable insights for incident resolution.
- Participate in major incidents: containment, eradication, recovery, and post‑incident review.
- Document incident timelines and contribute to lessons‑learned reports.
- Maintain and update security policies in line with vendor best practices and Change Advisory Board protocols.
- Monitor agent health, audit version compliance, remediate non‑compliant clients.
- Attend vendor meetings, review support cases, and incorporate best‑practice guidance.
- Design and refine SOC playbooks and response actions; evaluate new security technologies through controlled proof‑of‑conception trials.
- Manage block and safe listings; troubleshoot false positives and tune detection rules.
- Perform email investigations for phishing/BEC incidents; produce monthly vulnerability reports and prioritise remediation.
- Collaborate with infrastructure and application teams to test patches and reduce vulnerability counts.
- Substituting security products as business requirements change while ensuring policy continuity.
**Required Skills**
*Technical*
- EDR management (crowdstrike, policy, sensor deployment).
- SIEM operation (Rapid7, similar).
- Email security (Varonis, proof‑of‑concept evaluation).
- Identity security (Entra ID Conditional Access, PIM).
- PAM tools (BeyondTrust, Okta, Osirium).
- Vulnerability management (Qualys, Rapid7).
- Networking fundamentals (TCP/IP, DNS, firewalls, SSL/TLS).
- Cloud security (Azure/AWS).
- Scripting: Python, AutoIT.
*Professional*
- Incident response and major incident handling.
- SOC playbook design and vendor‑comparison methodology.
- Stakeholder communication, reporting, and recommendation.
- Team collaboration and support‑desk liaison.
- Calming under pressure; resilience during incidents.
**Required Education & Certifications**
- Formal degrees are not mandatory; hands‑on experience and delivery record valued.
- Desired certifications: CompTIA Security+, Network+, CySA+, PenTest+, CASP+, CEH, CISSP, and vendor‑specific credentials such as CrowdStrike, Qualys, Palo Alto, etc.