WHSmith North America
Cyber Security Analyst
WHSmith North AmericaUnited States20 hours ago
Full-timeInformation Technology

Job Summary

We’re looking for a seasoned Cybersecurity Analyst to take the fight to advanced threats. From incident response and malware analysis to threat hunting and vulnerability management, you’ll be on the front lines safeguarding our systems, data, and users while contributing to the overall program maturity. If you thrive on solving complex problems and driving continuous improvement, this is your mission.


Job Responsibilities


  • Monitor and analyze security tools, systems, and network activity for threats or suspicious behavior.
  • Investigate and triage alerts, perform threat hunting, and conduct malware and phishing analysis.
  • Manage the full lifecycle of security incidents, from detection through resolution and documentation.
  • Conduct vulnerability assessments, detection validation, and regular security reviews or audits.
  • Maintain and optimize security monitoring platforms, infrastructure, and tooling.
  • Collaborate with IT and third-party partners to implement security controls, apply fixes, and support incident response.
  • Develop and maintain incident response playbooks, procedures, and security awareness initiatives.
  • Ensure compliance with internal policies, industry standards, and regulatory requirements.
  • Generate and maintain reports, dashboards, and metrics for ongoing security performance tracking.
  • Provide occasional after-hours or on-call support as part of incident response efforts.
  • Perform other related tasks as assigned.


Technical Requirements

  • Proficiency with SIEM tools (e.g., Splunk, QRadar) and EDR platforms.
  • Strong understanding of network protocols, security principles, and operating systems (Windows, Linux).
  • Hands-on experience with firewall, IDS/IPS, and threat intelligence technologies.
  • Familiarity with cloud security concepts (AWS, Azure, GCP).
  • Knowledge of attack vectors, mitigation strategies, and incident investigation techniques.


Education & Experience

  • Bachelor’s degree in Cybersecurity or equivalent with 2+ years of relevant experience.
  • 2–4 years in cybersecurity operations or a similar role, ideally within a SOC environment.
  • Relevant certifications preferred: CompTIA Security+, THM SAL1, HTB CJCA, Blue Team Level 1/2, Antisyphon Training, etc.
  • Proven experience in incident response, risk management, and security policy development.
  • Strong knowledge of cybersecurity frameworks, standards, and technologies.


Required Skills

  • Strong analytical and problem-solving skills with attention to detail.
  • Excellent written and verbal communication abilities.
  • Ability to work independently and collaboratively in a fast-paced environment.
  • Skilled in documentation, reporting, and managing multiple priorities.
  • Highly organized, adaptable, and committed to continuous learning.


Nice to Have

  • Experience in retail environments or with point-of-sale systems.
  • Background in networking or infrastructure engineering.
  • Familiarity with security frameworks (NIST, ISO 27001, CIS).
  • Scripting skills in Python, PowerShell, or similar languages.

Key Skills

Ranked by relevance