Copyright © 2026

Above analytics are generated algorithmically based on job titles and may not always be the same as the company's job classification. You can also check detailed occupation eligibility, and salary criteria on our UK Visa Eligible Occupations & Salary Thresholds page.
Disclaimer: Hunt UK Visa Sponsors aggregates job listings from publicly available sources, such as search engines, to assist with your job hunting. We do not claim affiliation with Eames Consulting. For the most up-to-date job details, please visit the official website by clicking "Apply Now."
We are seeking an experienced Cyber Security Analyst to join our team on an initial six-month contract, playing a key role in strengthening security operations within an insurance environment.
MUST BE ABLE TO START NO LATER THAN 13TH FEB
This role sits at the core of our SOC and SIEM services, with a strong focus on governance, oversight, and continuous improvement across incident detection and response. You will work closely with an outsourced SOC and internal stakeholders, support the Cyber Threat Intelligence (CTI) function, and help ensure the ongoing effectiveness of security controls across a regulated insurance organisation.
This opportunity is well suited to someone with a strong SOC background and prior experience working within the insurance or wider financial services sector, who is comfortable operating in a highly regulated environment.
About the Role
Incident Detection and Response
Oversee SOC responses to alerts from SIEM and other security tooling within an insurance environment
Act as an escalation point for triage, investigation, and real-time incident response
Conduct investigations and root cause analysis, with consideration for regulatory and business impact
Lead lessons-learned sessions following incidents and near misses
Support onboarding of new log sources and the development of SIEM use cases
Threat Intelligence and Analysis
Analyse threat intelligence feeds and correlate findings with internal data
Identify emerging threats relevant to the insurance sector and recommend proactive mitigation strategies
Support CTI resources to ensure a consistent, high-quality service
Collaboration and Communication
Work closely with SOC analysts, CTI teams, IT teams, business stakeholders, and external partners
Clearly communicate incident status, impact, and remediation to both technical and non-technical stakeholders
Assist with shared team mailbox management, including approvals and queries
Documentation and Reporting
Ensure the operation and attestation of ISAE3000 controls within Cyber Security
Maintain detailed incident records and post-incident reporting in line with insurance and regulatory requirements
Contribute to the development and maintenance of incident response playbooks and runbooks
Provide oversight and reporting against agreed SLAs, KPIs, and KRIs
Continuous Improvement
Participate in incident response exercises and simulations
Recommend improvements to detection, response, and recovery processes, aligned to insurance risk profiles
You’ll Enjoy This Role If You
Have experience working in cyber security roles within insurance or financial services
Are comfortable operating in regulated environments with strong governance expectations
Take pride in proactively identifying and managing cyber threats
Enjoy collaborating with stakeholders and advising on security matters
Value ownership and accountability as a key point of contact for SOC and SIEM operations
What We’re Looking For
Proven experience in cyber security incident response and/or SOC operations
Previous experience working within the insurance sector (or closely related financial services environment)
Strong understanding of network protocols, operating systems, and security technologies
Hands-on SIEM experience, particularly Microsoft Sentinel
Knowledge of the MITRE ATT&CK framework and threat hunting methodologies
Ability to work under pressure and manage multiple incidents simultaneously
Strong analytical, problem-solving, and communication skills