• Security Analyst II

    Location(s) UK-Greater London-Hayes
    Req #
    Cyber Security
  • About Rackspace

    Rackspace is modernizing IT in today’s multi-cloud world. We have been honored by Fortune, Forbes, Glassdoor and others as one of the best places to work. We serve over 50% of the Fortune 100 companies & customers in 120 countries around the globe. Our achievements are powered by our people – we call them Rackers.  We grow & thrive through world-class development opportunities, learning & selling bleeding-edge technologies & solutions, and most importantly, connecting with each other (the best & brightest in the industry). Are you a Racker? Join us!


    More on Rackspace


    Rackers aren’t all alike. We look different. We think uniquely. We are from many places and our beliefs & backgrounds vary. But, being a Racker — a valued member of a winning team on an inspiring mission – is what connects us all. Rackers are encouraged to bring their whole self to work every day, as we know that unique perspectives fuel innovation and enable us to best serve our customers & communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, color, disability, gender, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know.

    Overview & Responsibilities

    Supervise monitoring of security events and alerts received from ISOC security tools. Manage end user reported incidents. Responsible for the first line of security incident response within the Rackspace ISOC. Hunt for suspicious activity based on anomalous activity and indicators of compromise from various intelligence feeds and toolsets. Serve as the technical escalation point and mentor for lower-level analysts. Provide communication and escalation throughout an incident per the ISOC Standard Operating Procedures. Report potential and actual security violations and provide recommendations. Communicate directly with end users and asset owners. Perform in-depth analysis of log files, systems, and network traffic. Maintain a strong awareness of the current threat landscape. Create knowledge base articles for handling low severity incidents.


    Strong knowledge and understanding of network protocols and devices. Experience in intrusion analysis and incident response. Strong experience with Mac OS, Windows, and Unix systems. Demonstrable problem solving, analytical skills and attention to detail. Strong verbal and written communication skills. Packet and log analysis. Ability to handle high pressure situations in a productive and professional manner. Document and conform to processes related to security monitoring. Provide incident investigation, handling, and response to include incident documentation. Strong time management, skills with the ability to multitask. Ability to work a flexible work schedule, including weekends. Provide training and mentorship to lower-level security analysts. Provide tuning recommendations for security tools to tool administrators. Provide tuning recommendations for security tools to tool administrators. Operates under minimal supervision.


    • GCIA required.
    • GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
    • demonstratable background in a security operations center (SOC) environment required.
    • Experience with SIEM (i.e. Arcsight, Splunk, QRadar) Sourcefire, FireEye, FirePower, Snort or an equivalent tool required.
    • Strong OS and/or network system administration skills. Experience with reviewing raw log files, data correlation, and analysis (ie. System logs, netflow, firewall, IDS, IPS) required.
    • Data Loss Prevention
    • Anti-Virus
    • Network Access Control
    • Encryption
    • Vulnerability Identification