Cybersecurity Analyst
Motion Recruitment
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
About the Role: Cybersecurity Analyst at Motion Recruitment
Our client, a Managed Security Service Provider (MSSP), is actively seeking a Cybersecurity Analyst to join their expanding team. This position is perfectly suited for individuals who excel in dynamic, intricate environments, enjoy solving complex technical challenges, and possess a strong passion for proactive security measures.
This is a client-facing role where you will be instrumental in delivering Managed Detection and Response (MDR) services. Your responsibilities will include performing in-depth threat hunting and forensic analysis across a diverse range of client networks and environments.
The ideal candidate for this role is capable of working autonomously, engaging directly with clients, and consistently identifying opportunities for security posture enhancements. You will manage multiple client engagements simultaneously, serving as an integral extension of their internal security teams, while leveraging advanced tools for comprehensive detection, investigation, and response.
Required Skills & Experience
- Minimum of 3 years of experience in cyber incident response, ideally in external or multi-company environments
- Minimum of 3 years of proactive threat hunting experience within network traffic and Endpoint Detection and Response (EDR) tools
- Experience handling complex cases such as ransomware or large-scale intrusions
- Deep technical familiarity with network traffic analysis and packet capture techniques
- Ability to analyze logs from Windows systems, firewalls, and other network devices
- Hands-on experience with scripting and automation, preferably in Python or PowerShell
Desired Skills & Experience
- Previous background as a systems administrator in Windows, Linux, or network environments
- Exposure to open-source security tools and technologies used in forensics and packet analysis
- Experience with EDR tools such as CrowdStrike, SentinelOne, FireEye, or Sophos
- Strong understanding of network forensics, threat intelligence, and how to act on findings
- Familiarity with SOAR platforms or automation in security operations
- A personal home lab or history of continuous self-education in cybersecurity through research, articles, or training
Tech Breakdown
- 40% Threat Hunting and Incident Response
- 35% EDR and Networking Forensics
- 25% Scripting, Automation, and Security Process Development
Daily Responsibilities
- 40% Perform daily proactive threat hunting across client environments using both proprietary and open-source tools
- 25% Conduct forensic analysis of network traffic and endpoint data to identify and mitigate threats
- 20% Work directly with assigned clients as part of their extended security teams, providing daily communication and reporting on findings
- 10% Collaborate with internal engineers to share insights, refine processes, and develop new detection capabilities
- 5% Participate in weekly team sessions to discuss emerging threats, new tools, and findings from ongoing investigations
Key skills/competency
- Cyber Incident Response
- Threat Hunting
- Forensic Analysis
- Endpoint Detection and Response (EDR)
- Network Traffic Analysis
- Packet Capture
- Log Analysis (Windows, Firewall)
- Scripting (Python, PowerShell)
- Client Engagement
- Security Operations
How to Get Hired at Motion Recruitment
- Research Motion Recruitment's clients: Understand the types of organizations Motion Recruitment partners with and the security challenges they face, aligning your expertise to these needs.
- Highlight client-facing skills: Emphasize experience in communication, reporting, and directly supporting external stakeholders on your resume and during interviews for the Cybersecurity Analyst role.
- Showcase proactive security expertise: Detail your threat hunting, incident response, and forensic analysis capabilities, particularly with EDR tools and network traffic.
- Quantify achievements: Provide specific examples of how you've mitigated complex threats, improved security postures, or automated processes using Python/PowerShell.
- Prepare for technical deep dives: Expect questions on network forensics, log analysis, and incident response methodologies, demonstrating your problem-solving abilities.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background