Cyber Threat Detection AnalystLocation: Berkshire (On site)Salary: £40,000 - £47,000 (depending on experience) + excellent benefits and trainingSecurity Clearance: Ideally hold Security Clearance or be eligible for SC (must be a UK national)________________________________________Company OverviewAn exciting opportunity to join a global technology powerhouse with an exceptional cyber security team. The organisation delivers mission critical solutions and places cyber security at the core of its operations, investing heavily in people, tooling, and continuous professional development.________________________________________Role OverviewAs a Cyber Threat Detection Analyst, you will be a key contributor within a blue team security function, responsible for identifying, analysing, and responding to cyber threats across enterprise environments. You will work hands on with modern detection and response tooling, supporting investigations and helping to strengthen the organisation's overall cyber defence capability.This role is ideal for someone who enjoys analytical problem solving, working closely with security data, and developing their technical skills within a collaborative and high performing team.________________________________________Skills & Experience We're Seeking* Experience working in a SOC, cyber defence, or threat detection environment* Experience with SIEM platforms including Elastic Security, Microsoft Sentinel, and Splunk, using KQL, ES|QL, and Kibana Query Language to analyse and interpret security data* Familiarity with incident response processes and the security event lifecycle* Exposure to endpoint detection and response technologies such as Microsoft Defender, CrowdStrike, SentinelOne, or Carbon Black* Understanding of attacker techniques and frameworks such as MITRE ATT&CK* Solid knowledge of core networking concepts including TCP/IP, DNS, HTTP/S, firewalls, and VPNs* Experience analysing logs from Windows, Linux, cloud, and network sources* Strong analytical and communication skills, with the ability to clearly document and explain findings________________________________________Key Responsibilities* Monitor security tools and alerting platforms to identify suspicious activity and potential threats* Carry out structured investigations using log data, telemetry, and supporting threat intelligence* Perform evidence driven analysis to determine the scope, impact, and root cause of security events* Support incident response activities, including containment, remediation, and escalation where required* Collaborate closely with SOC, incident response, and engineering teams to ensure effective outcomes* Participate in post incident reviews, contributing to lessons learned and continuous improvement* Assist in enhancing detection logic, investigative workflows, and response processes________________________________________Desirable / Nice to Have* Experience with cloud security monitoring (Azure, AWS, or GCP)* Exposure to threat intelligence feeds and IOC enrichment* Scripting or automation experience using KQL, PowerShell, Python, or similar* Familiarity with SOAR tooling and automated response workflows* Experience working in regulated, high security, or mission critical environments________________________________________Security Qualifications (Beneficial)* CompTIA Security+ or CySA+* Microsoft SC 200 or related security certifications* GIAC certifications such as GCIH or GCIA* CREST, EC Council, or other recognised cyber security credentials________________________________________Why Join? Exceptional opening within a globally recognised organisation Competitive salary with an excellent benefits package Strong focus on training, certifications, and career progression Exposure to modern security tooling and real world threat scenarios Opportunity to work alongside experienced cyber security professionalsDon't delay in applying via the link! ________________________________________About AdeccoAdecco is acting as an Employment Agency. We are proud to be an equal opportunities employer. We are on the client's supplier list for this role.________________________________________Keywords Cyber Threat Detection, Security Operations, SOC Analyst, Blue Team, Threat Hunting, Threat Intelligence, Incident Response, Incident Handling, SIEM, Elastic Security, Microsoft Sentinel, Splunk, Log Analysis, Security Monitoring, Detection Engineering, Use Case Development, MITRE ATT&CK, Adversary Tactics, Indicators of Compromise, IOC Analysis, EDR, XDR, Microsoft Defender, CrowdStrike, SentinelOne, Endpoint Security, Network Security, Firewall, IDS, IPS, DNS, TCP/IP, VPN, Azure Security, AWS Security, Cloud Security Monitoring, KQL, ES|QL, Kibana Query Language, PowerShell, Python, SOAR, Security Automation, Digital Forensics, Malware Analysis, Cyber Defence, Cyber Security Analyst