The Role
Chorus require passionate individuals for our Cyber Security Operations Centre. Our CSOC team are on a mission to become a world-class, next gen MXDR provider, delivering true value and protection to our clients.
We are searching for an enthusiastic Senior Security Analyst who is interested in threat detection and response, and in using leading technology to automate incident response, remediation and risk reporting. Chorus have a need for forward thinking and motivated individuals that have a passion for cyber, technology and automation.
Key Responsibilities
• Provide mentorship to the analyst team, continually improving both processes and people to deliver the best service possible.
• Write, test and deploy detection rules and analytics within Microsoft Sentinel using KQL.
• Implement tuning across detection content to reduce false positives and improve alert quality.
• Create and maintain playbooks and runbooks to support consistent and effective incident response.
• Assist with engineering tasks such as log source onboarding, parser development and data validation.
• Conduct pre-go-live technical checks on new customer environments to ensure monitoring readiness before handover to operations.Proactively utilise available toolsets to identify compromises within our customers’ environments.
• Challenge the status quo – bring new ideas and better ways of working to the team.
• Perform in-depth investigations in response to security alerts across the technology stack, including Microsoft Sentinel and Microsoft Defender XDR.
• Carry out technical analysis of suspected breaches, including forensic investigation and evidence gathering.
• Proactively use available toolsets to identify compromises within customer environments.
• Lead threat hunting activities across the customer base during periods of low alert volume.
• Prepare and escalate security incidents to customers in a clear and timely manner.
• Act as a Subject Matter Expert (SME) on security, working closely with other internal Chorus teams.
• Create technical documentation, use cases, and playbooks to assist colleagues in Root Cause Analysis (RCA).
• Stay up to date with the evolving threat landscape and emerging attack techniques.
• Respond to ad hoc requests from customers in a timely and professional manner.
• Assist in implementing tuning and analytic content in response to emerging threats.
• Maintain awareness of and follow Chorus company procedures and guidelines, including security, regulatory and quality related matters.
• Comply with all relevant legislative and legal requirements, including industry regulations, employment law, Data Protection and Health and Safety.
• Demonstrate behaviours that promote our values.
• Undertake any other duties as reasonably requested.
Personal Specification - Experience, Education, Knowledge & Skills
Required:
3-5 years+ experience in Cyber Security, a can-do attitude, enthusiasm, and a genuine passion for cyber security and technology are essential. Candidates must demonstrate the ability to break down barriers, think proactively, and show a clear desire to learn and grow within a fast-paced security environment.
Candidates should have relevant experience in a security operations or similar role, with demonstrable knowledge of security monitoring, incident response, and threat detection concepts.
Desired: It would be desirable, but not essential, to hold any of the following qualifications or experience:
• SANS, Blue Team, CompTIA CySA+, Security+, CCNA, or Network+
• Ability to work with Python for automation or scripting tasks.
• Degree in a Computer Science discipline, or equivalent work experience.
• Experience with the MITRE ATT&CK framework or other security defence frameworks.
• Experience and certification within Microsoft/Azure or other cloud-based technologies.
If you do not hold any of the above qualifications, please do not be discouraged from applying.
Role Context
Complexity: The role involves managing complex and time-sensitive security incidents across a diverse customer base. Analysts must rapidly assess and prioritise alerts, apply contextual threat intelligence, and make sound decisions in high-pressure situations using a broad range of security technologies.
Impact: This role directly contributes to the protection of Chorus customers and supports the CSOC team’s mission to become a world-class MXDR provider. Senior Analysts play a key part in service quality and continuous improvement.
Influence: The role holder will interact regularly with CSOC colleagues at all levels, internal teams across Chorus, and directly with customers when escalating incidents or responding to ad hoc requests.
Resources: The role holder manages no direct budget but is responsible for leveraging the full Chorus technology stack effectively, with a particular focus on Microsoft Sentinel and Microsoft Defender XDR.
We recognise that everyone communicates differently, so if you would prefer to submit your cover letter via video instead of a written application, we are very happy to receive this.