Submitting more applications increases your chances of landing a job.

Here’s how busy the average job seeker was last month:

Opportunities viewed

Applications submitted

Keep exploring and applying to maximize your chances!

Looking for employers with a proven track record of hiring women?

Click here to explore opportunities now!
We Value Your Feedback

You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for

Would You Be Likely to Participate?

If selected, we will contact you via email with further instructions and details about your participation.

You will receive a $7 payout for answering the survey.


User unblocked successfully
https://bayt.page.link/VLmfjTy8Vxz9C8oY8
Back to the job results

Cyber Operations Analyst

30+ days ago 2026/08/01
Other Business Support Services
Create a job alert for similar positions
Job alert turned off. You won’t receive updates for this search anymore.

Job description

Job Description


Purpose of the role



To monitor the performance of operational controls, implement and manage security controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. 




Accountabilities



  • Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage.
  • Identification of emerging cyber security threats, attack techniques and technologies to detect/prevent incidents, and collaborate with networks and conferences to gain industry knowledge and expertise.
  • Management and analysis of security information and event management systems to collect, correlate and analyse security logs, events and alerts/potential threats.
  • Triage of data loss prevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network.
  • Management of cyber security incidents including remediation & driving to closure.

Analyst Expectations



  • Will have an impact on the work of related teams within the area.
  • Partner with other functions and business areas.
  • Takes responsibility for end results of a team’s operational processing and activities.
  • Escalate breaches of policies / procedure appropriately.
  • Take responsibility for embedding new policies/ procedures adopted due to risk mitigation.
  • Advise and influence decision making within own area of expertise.
  • Take ownership for managing risk and strengthening controls in relation to the work you own or contribute to. Deliver your work and areas of responsibility in line with relevant rules, regulation and codes of conduct.
  • Maintain and continually build an understanding of how own sub-function integrates with function, alongside knowledge of the organisations products, services and processes within the function.
  • Demonstrate understanding of how areas coordinate and contribute to the achievement of the objectives of the organisation sub-function.
  • Make evaluative judgements based on the analysis of factual information, paying attention to detail.
  • Resolve problems by identifying and selecting solutions through the application of acquired technical experience and will be guided by precedents.
  • Guide and persuade team members and communicate complex / sensitive information.
  • Act as contact point for stakeholders outside of the immediate function, while building a network of contacts outside team and external to the organisation.

All colleagues will be expected to demonstrate the Barclays Values of Respect, Integrity, Service, Excellence and Stewardship – our moral compass, helping us do what we believe is right. They will also be expected to demonstrate the Barclays Mindset – to Empower, Challenge and Drive – the operating manual for how we behave.





Join us as a “Cyber Operations Analyst" at Barclays, where you'll spearhead the evolution of our digital landscape, driving innovation and excellence. You'll harness cutting-edge technology to revolutionise our digital offerings, ensuring unapparelled customer experiences.
You may be assessed on the key critical skills relevant for success in role, such as experience with, skills to meet business requirement as well as job-specific skillsets.



To be successful as a “Cyber Operations Analyst” you should have experience with:



Basic/ Essential Qualifications:



  • Proficiency in SIEM technologies & usability in a Large & Complex Computing Environment.



  • Analysis and response of detected security incidents, timely escalation and drive to ensure the closure of incidents.



  • Incident Response skills including proficiency in PCAP Capture, Network Analysis, and Traffic Patterns.



  • Identify attacks and malware (Trojans, Ransomware, etc.) analysing event data generated from proxy, endpoints, IDS, MPS, network devices etc.



  • Minimum Qualification – bachelor’s degree.





Desirable skillsets/ good to have:



  • Proficiency of Operating System fundamentals and OS Security (Windows & Linux);



  • Proficiency in Networking Principles, Protocols, & Practices.



  • Understanding of traditional ITIL concepts Incident, Change and Problem management.



  • Understanding of Cloud Security Principles (AWS/Google/Azure)



  • Understanding of Open-Source network analysis tools, and Open-source intelligence tools (OSINT).



  • In-depth knowledge of the Cyber Kill-Chain, Intelligence-driven defence and security architectures.



  • Ability to help write concise reports based on complex data with accuracy, brevity, and speed.



  • Understanding of Ethical Hacking from the perspective of a Blue-team member; the countermeasures and mitigation controls which can be implemented to minimise the threat landscape and risk to an organisation.



  • Appreciation of End Point security products including firewalls, Anti-virus and network access control.



  • Appreciation for programme and project management methodologies.



  • Experience delivering technical detection and response programs and initiatives is also desirable.



  • Active SANS certifications in the areas of network, incident handling, malware and forensic analysis (GREM, GCIA, GCFA, GCIH) are desirable, but not essential.



  • Strong working knowledge of Splunk and the Splunk Query Language.



  • Understanding and experience of reverse-engineering malware would also be beneficial but is not essential.



  • A good technical understanding of the threats against the financial industry from both the physical and Cyber threat domains.



  • Proficiency in Phishing Threat Types (Targeted Spear, Broad-based SPAM, Targeted Industry, Whaling, etc.).




This role will be based out of Pune.






This job post has been translated by AI and may contain minor differences or errors.

You’ve reached the maximum limit of 15 job alerts. To create a new alert, please delete an existing one first.
Job alert created for this search. You’ll receive updates when new jobs match.
Are you sure you want to unapply?

You'll no longer be considered for this role and your application will be removed from the employer's inbox.