FPSG Connect

Cyber Security Analyst - Tier 1 - 24/7 Shifts

FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers.


You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within.

Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time.

If you do have SC Cleared status, or higher, i.e.

DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.


The Tier 1 Cyber Security Analyst role will involve working under the guidance of more senior analysts, so your foundational knowledge of Security Information and Event Management (SIEM) solutions, to support the security operations team will be put to very good use.

We are looking to assess your proficiency in utilizing Kusto Query Language (KQL), for log analysis and gain experience using multiple ticketing systems to manage incidents effectively ensuring that we adhere to our service level objectives.


Responsibilities of a Tier 1 Cyber Security Analyst:


, Monitoring and reviewing security events across various SIEM platforms 24/7/365 to detect, triage, and responding to security incidents.


, Acting as the first line of response for security incidents by identifying, validating, and classifying potential threats, escalating to higher tiers when necessary.


, Performing preliminary analysis on alerts to determine false positives and escalate confirmed incidents based on pre-defined criteria.


, Creating and managing incident tickets in the system to track incident status and facilitate accurate handovers between shifts.


, Conducting and documenting formal handover / takeover procedures at the beginning and end of each shift to ensure continuity of operations.


, Liaising with Tier 2 and Tier 3 Analysts for complex investigations, continuity briefs, and updates on service status issues.


, Following and providing feedback on existing processes; identifying and suggesting improvements to streamline workflow efficiency.


, Following procedures to communicate and report incidents to appropriate team members and documenting incidents as per internal guidelines.


, Working closely with other team members, contributing to a cooperative environment while assisting in the completion of assigned tasks.


, Developing a foundational understanding of security event analysis from network traffic, host logs, and other data sources to support incident identification and escalation.


, Completing assigned tasks accurately and in a timely manner as directed by senior analysts or management.


, Engaging with available knowledge and training tools to maintaining and improving technical skills, enhancing the ability to support cyber security operations effectively.


Tier 1 Analyst Roles and Responsiblilties


, Once comprehensive training has been completed, the L1 Analyst will assume shift lead duties in the absence of an L2 Analyst.

You will be responsible for security monitoring, completion of all assigned tasks and ensuring a thorough handover at the end of the shift.


Knowledge and Skills


, Understands and can explain foundational networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.


, Basic knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.


, Competence in using SIEM for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.


, Able to demonstrate basic knowledge using Kusto Query Language (KQL) to search and filter logs effectively.


, Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.


, Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.


, Can communicate simple technical issues to non-technical individuals in a clear and understandable way.


, Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring activities.


, Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.


, Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.


, Shows initiative in learning new technologies and techniques, leveraging internal resources and training to grow professionally.


, Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in incident management.



Next Steps:


If you have SC Clearance, the associated skills for this role, and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately.

Interviews will be conducted ASAP with suitable candidates who meet all the criteria, with attractive packages offered to start ASAP.



We are Disability Confident and neurodiverse aware.

If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process




Share Job