Senior Threat Detection Analyst

KPMG International Cooperative, City Centre, Manchester

Senior Threat Detection Analyst

Salary Not Specified

KPMG International Cooperative, City Centre, Manchester

  • Full time
  • Temporary
  • Remote working

Posted 2 days ago, 19 Dec | Get your application in today.

Closing date: Closing date not specified

job Ref: 0c6ea9f334d441749b31b3c4b810eab5

Full Job Description

The KPMG EWT function is a cornerstone of our business. We do work that matters to our local business and communities - supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in enterprise technology this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time. KPMG is one of the world's largest and most respected consultancy businesses, we've supported the UK through times of war and peace, prosperity and recession, political and regulatory upheaval. We've proudly stood beside the institutions and businesses which make the UK what it is. Why join KPMG EWT as a Senior Threat Detection Analyst? The Team is an important function within Security Operations in KPMG. The team play a key role in ensuring that the business IT systems are protected and monitored from cyber threats. The team works with external MSSPs to monitor, analyse, report cyber security threats and respond accordingly. The team works with the different internal business capabilities to ensure that security monitoring service is embedded into their solutions. The team is also responsible for making sure that security monitoring is aligned with cyber threat landscape and business risks on an ongoing basis. The person will be playing a key role in ensuring that the business IT systems are protected and monitored from threats, participate in the active monitoring of the security sensors and ensure that appropriate actions are taken as part of the Incident Response process, work with the different KPMG business capabilities to ensure that security monitoring service is embedded into their solutions. You will be part of on-call rota for SOC and required to be on-call for one week at a time typically, during a month. What will you be doing?

  • Act as an escalation point for other security analysts in the SOC, including 3rd party MSSP
  • Co-ordinate SOC team response and work with Threat Detection manager to improve triage processes
  • Deputise Threat Detection Manager with full delegated responsibilities, when required
  • Proactively monitor the network security sensors ensuring timely detection, investigation and remediation of potential threats in line with the incident management lifecycle
  • Use the advanced security analytics toolsets to monitor for emerging threat patterns and vulnerabilities, attempted or successful breaches
  • Work closely with other KPMG teams to ensure that all technologies are activity monitored including troubleshooting where necessary
  • Interact with the Global Security Operations Centre (GSOC) & MSSP, including Incident response and intelligence sharing, escalating to management where required
  • Triage and manage incidents, events and queries from the business to the relevant resolver group
  • Contribute to the Continual Service Improvement of the teams' operations through proactive analysis, engagement and collaboration
  • Detect, respond and coordinate response for security events while capturing essential details and artefacts
  • Operationalise actionable intelligence reports from Threat Intelligence team and external sources
  • Maintain event response documentation, participate in post-mortems, and write event reports
  • Contribute to projects that enhance the security posture of KPMG
  • Identify trends, potential new technologies, and emerging threats, which may impact KPMG
  • Review and prioritise alerts based on Standard Operating Procedures
  • Review and triage suspected security events reported by staff members or Security Monitoring platforms
  • Accurately document work in Incident case management system as per defined standards
  • Leverage multiple data sources to analyse detection alerts and staff reported cyber-attacks to identify which events require response activities based on Standard Operating Procedures
  • Declare an incident and escalate it to Incident Response team, ensuring findings have been accurately captured in the Incident case management system as per defined standards
  • Ensure that cases are accurately categorised to ensure the appropriate feedback is provided to the Detection and Response Engineering team and to facilitate reporting
  • Identify and record gaps in visibility and security posture through the course of investigations as per defined Standard Operating Procedures
  • Identify potential new detection logic and escalate to the Detection and Response Engineering team
  • Hunt for threat indicators from log data and other available endpoint/network artefacts

    Prior experience in Cyber Security
  • Experience of working in a Security Operations Centre or Security Monitoring Team.
  • Experience with managed security services and security consulting would be a plus
  • Hands on SIEM and EDR tooling knowledge and experience including technologies such as Microsoft Sentinel, Microsoft Defender Suite etc.
  • Experience in end-to-end information security incident management and mitigating and addressing threat vectors including Advanced Persistent Threat (APTs), Distributed Denial of Service (DDoS), Phishing, Malicious Payloads, Malware, etc
  • Experience with Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Web Application, Firewalls, Firewall logs, systems logs, web logs, application logs and Security Information and Event Management (SIEM) systems
  • Experience with technologies, tools, and process controls to minimise risk and data exposure.
  • Experience in search query languages such as KQL, OSquery or SPL
  • Solid experience of working in Cloud environments such as AWS, Azure, & GCP
  • Experience with building threat-based Use Cases using frameworks such as MITRE ATT&CK
  • Solid understanding of ISO 27001, Cyber Essentials/Essentials Plus, GDPR and other information security-related regulatory and compliance standards
  • Understanding of security threats, attack scenarios, intrusion detection and incident management
  • Ability to function effectively in a matrix structure
  • Ability to deal with ambiguity and to keep a cool head when dealing with crisis or stressful situations
  • Strong analytical skills
  • Apply analytical rigor and demonstrate business acumen to understand complex business scenarios
  • Fluent in English, Bachelor's degree in Computer Science or related field
  • Information Security and/or Information Technology industry certification (CISSP, SANS GIAC, SC-200, AZ-500 or equivalent)


  • Technology is at the heart of what we do and part of the very DNA of our business. That's why we've invested in a single powerful team of connected technologists. 1,500 specialists, creating a step change in the way we work. Broader, deeper expertise, which is delivered to our clients faster than ever. Our connected solutions stretch across a range of specialisms too. From technology transformation, cyber and risk management through to security operations, data and analytics, automation, powered apps and Cloud. This is an opportunity to join a team that combines the entrepreneurial spirit and imagination of a start-up with the resources only a global network can provide. We're committed to simplified structures and are investing in workplace tools that enable us to collaborate and innovate whether you're working at home, in our office or at client sites.