Share this Job

24x7 Security Analyst - Managed Security Services

Apply now »

Date: 31-Dec-2021

Location: Athens, GR, 176 74

Company: Lloyds Register

About Nettitude


Founded in 2003, Nettitude is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace. Through our research and innovation centres, we provide threat led services that span technical assurance, consulting and managed detection and response offerings.

To learn more, please visit https://www.nettitude.com/



The role


Working as a key member of our 24x7 SOC team, you will use your expertise to detect and respond to a threats of varying capabilities and sophistication. You will use next-generation SIEM, EDR, network monitoring, in house technology and commercial threat intelligence to deliver continuous monitoring and triage suspicious events, providing an assessment of risk/threat to enable efficient response.  

Not only will you assess threats using all information sources available to you, you’ll also get involved in projects that enhance our capability, ensuring we continue to build on our cutting-edge detection & response services, protecting our clients globally.

We don’t operate under the traditional SOC tiers, with no glass ceilings, and we prioritise development as part of our close knit, high-trust team. So, the passion and drive to get involved, make a difference and having an eye for detail is key to us providing a first-class service; supporting both our security mission and that of our clients.





This role is based out of our Athens office. Remote working is possible. All applicants need to be Greek residents.



What you’ll be doing in your role:


In your role you will:

  • Be the first to detect and respond to real threats with diverse capability, sophistication, vectors and objectives as part of a 24/7 shift team
  • Utilise industry-leading security tools to investigate cyberattacks, generating detailed, jargon-free Incident Reports of your findings, with actionable recommendations, mitigations, and investigative leads
  • Operate as part of our established SOC managed detection & response day team, providing proactive defensive monitoring to customers of all shapes, sizes and verticals
  • Maintain regular verbal and written communications with stakeholders, Representing Nettitude internally and externally as required
  • Create high-standard management and operational reports in a timely, concise, and actionable manner
  • Develop cutting-edge playbooks and detection use-cases, using industry best-practice, threat intelligence and detections frameworks
  • Maintain an up-to-date global security awareness via a mixture of open, closed and commercial sources, including defensive monitoring technologies,  threats and trends



Key Skills:


The following are the requirements for this role:


  • Strong communication and interpersonal skills
  • Strong understanding of Windows internals
  • Strong written and speaking English skills.
  • Good understanding of cyber security principles
  • Good understanding of Unix operating systems
  • Good understanding of security and network protocols
  • Working knowledge of attack vectors, TTPs and the ability to differentiate between normal and abnormal activity, providing recommendations on countermeasures and remediation activities
  • Working knowledge of security devices and their role in defending a network
  • Working knowledge of the Cyber Kill Chain and other cyber frameworks, specifically in understanding what stages an attack technique would be and how to interrupt it
  • Demonstrable ability to work on own projects and within a team
  • Demonstrable dedication to continually grow and develop
  • Be a self-starter, able to initiate and develop concepts and ideas into solutions
  • Ability to attain Security Clearance (SC)


There are no formal requirements for any qualifications or certifications. We’re not looking for badge collectors; we look far deeper than that. However, one or more of the following may serve as an distinct advantage.


  • SC-200: Microsoft Security Operations Analyst
  • CREST CPIA, CRIA, CPTIA or above
  • EDR-vendor certifications
  • Azure/AWS/GCP Administrator/Engineer, DevOps or Data
  • Defensive Security or similar industry recognised certifications (E.g GIAC, SBT) will also be well received



What we offer:


We are a people-focused, high-performing, high-trust managed security services team. We pride ourselves on our investment in our people, meaning as we are a fast-evolving team in an exciting working environment, you’ll always have opportunities to solve the latest cybersecurity challenges, with the responsibility and development opportunities to match.


Here are some of our favourites:


  • Access to our interactive learning platforms via our partners, with encouragement to pursue supplemental external training
  • Intensive new starter training program, blending theory, hands-on labs, case studies, online and on the job training to help you hit the ground running
  • Constantly updated training & progression plans with multiple tracks of development, supporting lateral movement or upwards progression
  • Generous annual training, cross-training and project days
  • The option to join in with company and department socials to relax, get to know your new colleagues and team build (currently virtual)
  • A supportive team enabling you to succeed and grow your career


 An attractive remuneration package will be provided.





We don’t expect candidates to tick all the boxes, if you feel your skills, knowledge and experience are a good match for the requirements and have a desire to learn and develop, apply now via the ‘apply’ button and upload your C.V. and cover letter.

Job Segment: Consulting, Unix, Technology, Research