What are the responsibilities and job description for the Cyber Security Analyst position at The University of Manchester?
About IT Services
IT Services at the University of Manchester is a vibrant and fast-moving department, we focus on delivering excellent customer service and quality services for our staff, students and researchers.
The Team
You will be part of the Identity and Security group located within the University’s IT Security Operations team. IT Security Operations supports the business operations of the organisation through monitoring, prevention and the rapid mitigation of all incidents adversely impacting the confidentiality, integrity and availability of its information infrastructure and assets. The goal of the team is to ensure maximum operational uptime of mission critical IT systems needed by the organisation in its daily operations. Security Operations has four key areas of focus : incident response; network monitoring and intrusion detection; security testing and vulnerability management. Team members will be expected to work across all of these security functions as needed.
The Role
The Cyber Security Analyst plays a critical role in leading the efforts to keep the University’s systems and networks secure as part of the Tier 1 level of support. The role will be expected to engage with stakeholders across IT Services and the University to understand the security requirements and gauge the effectiveness of the team’s data security initiatives. To maintain the breadth and depth of knowledge, the Cyber Security Analyst will need to keep abreast of emerging technologies, security products and threats to ensure these are reflected in the University’s security standards and best practices. The role is also expected to have a have a basic knowledge across all security functions but will primarily be responsible for security monitoring and incident detection, investigation, and response.
The Person
The successful candidate should be able to demonstrate the following :
- Experience of providing first-line support as part of a security operations team.
- Strong knowledge of cyber security principles, technologies and best practices.
- Experience with analysing event logs and recognising cyber intrusions or attacks.
- Experience using tools such as SIEM, IDS / IPS, antivirus and endpoint protection (e.g. Microsoft Sentinel and Microsoft Defender for Endpoint)
- Knowledgeable about network protocols and devices.
- Experience of working with Windows, MacOS and Linux / Unix operating systems.
What can you expect in return
Our diverse job opportunities all include a top benefits package that includes many features that are hard to find in the private sector :
In fact, there are so many benefits available you can see more of them by clicking
Find out more about our organisation and values :
When completing the additional information section of your application, please ensure you make reference to the job description and person specification above, as this will form an integral part of the shortlisting process.
As an equal-opportunity employer, we welcome applicants from all sections of the community regardless of age, sex, gender (or gender identity), ethnicity, disability, sexual orientation and transgender status. All appointments are made on merit.
Our University is positive about flexible working