Skip to content

This website works best using cookies which are currently disabled.Cookie policy  Allow cookies

Job Application


Please answer the following questions in order to process your application.

Email Address *
Select your working status in the UK *
File Attachments:
(2MB file maximum. doc, docx, pdf, rtf or txt files only)
Attach a CV * 
Optional covering letter 
Clear covering letter
 * denotes required field
Additional Information:
First Name
Last Name
Home Telephone
Salary Expectation GBP
Approximately how far are you willing to travel to work (in miles) ?

Key Privacy Information

When you apply for a job, JobServe will collect the information you provide in the application and disclose it to the advertiser of the job.

If the advertiser wishes to contact you they have agreed to use your information following data protection law.

JobServe will keep a copy of the application for 90 days.

More information about our Privacy Policy.


Job Details


Intrusion Analyst (Permanent)

Location: Cheltenham, Gloucestershire Country: UK

Intrusion Analyst

About the role:

An exciting opportunity within a dedicated and innovative Cyber Defence firm, has arisen for an accomplished Intrusion Analyst. This opportunity is available for a talented individual to work in a dynamic and growing security environment.

Working with the cutting-edge technology, you will be working as part of the Response group, consulting on the configuration of the monitoring intrusion detection systems, analysing network traffic and related log files.

Key Responsibilities:

  • Monitoring and responding to alerts from various security monitoring toolsets.
  • Participating in and leading Incident Response and Threat Hunting activities.
  • Assisting the Security Engineering team in the fine tuning of security toolsets and generation of new signatures/rules.
  • Act as a mentor and escalation point to the more junior members of the team, helping them through the more complex incidents and investigations.

Key Skills & Requirements

  • Knowledge and exposure to numerous variations of malware and IOC's.
  • Have experience within the network protocols such as DNS, HTTP, and TCP/IP.
  • Comprehensive knowledge in the principles of IDS and how they are used.
  • A respectable knowledge of SQL.
  • Experience in using security tools such as TCPDump, WireShark, Snort or any other security tools.
  • Knowledge of past and recent Information Security threats.
  • Exposure to computing network design principals.

Posted Date: 09 Dec 2019 Reference: JS Employment Agency: Goodman Masson Contact: Steven Da Silva