Please answer the following questions in order to process your application.
Select your working status in the UK *
File Attachments:
(2MB file maximum. doc, docx, pdf, rtf or txt files only)
* denotes required field
Additional Information:
Availability/Notice
Hourly Rate GBP
Approximately how far are you willing to travel to work (in miles) ?
Key Privacy Information
When you apply for a job, JobServe will collect the information you provide in the application and disclose it to the advertiser of the job.
If the advertiser wishes to contact you they have agreed to use your information following data protection law.
JobServe will keep a copy of the application for 90 days.
More information about our Privacy Policy.
Job Details
Google/GCP Security Analyst (Contract)
Location: London Country: UK Rate: £550 - £650 per day + Inside IR35
Contract Role - Google/GCP Security Analyst - London/Remote - 12 Months Initial - Inside IR35
We are seeking a skilled Google/GCP Security Analyst to join a significant project within the healthcare sector.
Role Overview:
* Job Title: Google/GCP Security Analyst
* Location: London/Remote (occasional travel will be required during your assignment)
* Contract Type: Contract
* Duration: 12 months initially
* Sector: Healthcare.
* Perform in-depth incident analysis and investigations, leading response effort to contain, remediate and prevent security incidents
* Operationalise and optimise Google SecOps SIEM to enhance threat detection, analysis and reporting capabilities.
* Develop, implement and manage security alerts, detections and response playbooks leveraging Google SecOps and other SIEM/SOAR tools
* Integrate and collaborate with other subject matter experts throughout the organization
* Perform host-based digital forensics on Microsoft Windows systems primarily and other operating systems and document findings in clear and concise language
* Identify deficiencies in processes and tools, recommend security controls and/or corrective actions for mitigating technical and business risk.
* Integrate and collaborate with other subject matter experts throughout the organization.
* Develop and deliver training, runbooks and documentation to help upskill team members in the Google SecOps usage and incident response best practices.
Requirements
* Strong understanding of SIEM platforms, with expertise in Google SecOps and knowledge of other platform like Azure Sentinel
* Networking experience (including the OSI Model, TCP/IP, DNS, HTTP, SMTP)
* Solid knowledge of security concepts including threat intelligence, TTPs, attack chain analysis and incident response frameworks
* 3+ years of experience in incident response, threat detection and analysis
* Strong analytical, problem solving and communication skills
Preferred qualifications
* Experience with SOAR platforms and automation of incident response processes.
* Certification in cybersecurity (eg Security+, CCNA Cyber Ops, BTL1 and/or BTL2, GCIH, CEH, CySA+, OSCP, CISSP, CCSP etc.)
* Knowledge of Crowdstrike, Darktrace, Sentinel is a plus
* BS/BA in Computer Science, Computer Engineering, Cyber Security, Forensics and/or equivalent work experience.
Please feel free to contact myself - Daisy Nguyen at Gibbs Consulting for a confidential chat to know more details about the role.
Please also note: Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants who are considered suitable for interview will be contacted.
Posted Date: 22 Nov 2024
Reference: JS-DNGCPSECURITY
Employment Business: Gibbs Hybrid
Contact: Daisy Nguyen