ARCHIVED
This job listing has been archived and is no longer accepting applications.
MisuJob - AI Job Search Platform MisuJob

Senior SecOps Analyst

Ki

London, England, United Kingdom Hybrid permanent

Posted: March 2, 2026

Interested in this position?

Create a free account to apply with AI-powered matching

Quick Summary

We are a leading digital insurance company that works with Google and UCL to create a platform that uses algorithms to give insurance quotes in seconds, rather than days.

Job Description

Who are we?đź‘‹

Look at the latest headlines and you will see something Ki insures. Think space shuttles, world tours, wind farms, and even footballers’ legs. 

Ki’s mission is simple. Digitally disrupt and revolutionise a 335-year-old market. Working with Google and UCL, Ki has created a platform that uses algorithms, machine learning and large language models to give insurance brokers quotes in seconds, rather than days. 

Ki is proudly the biggest global algorithmic insurance carrier. It is the fastest growing syndicate in the Lloyd's of London market, and the first ever to make $100m in profit in 3 years. 

Ki’s teams have varied backgrounds and work together in an agile, cross-functional way to build the very best experience for its customers. Ki has big ambitions but needs more excellent minds to challenge the status-quo and help it reach new horizons.

Where you come in?

As a Senior Security Operations Analyst, you lead security operations activities, including incident response for medium to high severity incidents, advanced threat hunting, and detection engineering. You build deep expertise in security monitoring and response, you automate your work, mentor junior analysts, and influence security decisions across teams.

You work independently on complex security problems, uphold and advance security operations practices, and collaborate regularly with engineering teams across Cloud Services, Infrastructure and Product on detection, monitoring, and vulnerability management initiatives.

This role is expected to use AI to build automation and agentic AI workflows responsibly, to improve productivity, while ensuring safe use, data protection, and appropriate security controls.

What you will be doing: 🖋️

Security Monitoring & Detection Leadership

• Lead development and tuning of SIEM detection rules and alerts
• Develop and tune detection use-cases for AI misuse (suspicious tool calls, anomalous connector usage, token abuse, prompt injection attempts, unusual access patterns)
• Design and implement advanced detection logic and analytics
• Conduct and automate proactive threat hunting activities
• Analyse complex security events and identify advanced threats
• Optimise security monitoring to reduce false positives and improve signal quality
• Build security dashboards and metrics for leadership visibility

Incident Response Leadership

• Lead incident response for medium to high severity security incidents
• Lead investigation and response for AI-related incidents (prompt injection, data leakage via AI tooling, compromised connectors, overprivileged tool access), and translate lessons learned into improved monitoring, playbooks, and preventative controls
• Coordinate incident response activities across security and technology teams
• Conduct advanced forensic analysis and root cause investigation
• Drive post-incident reviews and implement improvements
• Maintain and improve incident response playbooks
• Mentor junior analysts on incident response techniques
• Participate in crisis management and business continuity exercises

Threat Intelligence & Hunting

• Lead threat hunting program and conduct advanced hunting activities
• Analyse threat intelligence and translate to detection and response capabilities
• Research adversary TTPs and attack techniques (MITRE ATT&CK)
• Share threat intelligence with stakeholders and drive proactive improvements
• Monitor threat landscape and assess impact to Ki's environment
• Build threat intelligence capabilities and processes

Vulnerability Management

• Lead vulnerability prioritisation and risk assessment
• Partner with teams on infrastructure and application vulnerability remediation
• Track vulnerability metrics and drive timely remediation
• Coordinate penetration testing and security assessments
• Support risk-based vulnerability management decisions

Cross-Functional Leadership

• Collaborate with Cloud Security engineers on detection and monitoring architecture
• Partner with AppSec on integrating security testing into vulnerability management
• Support SANE, cloud, and infrastructure engineers during complex infrastructure and application incidents
• Lead cross-functional workstreams on security initiatives
• Proactively identify opportunities for collaboration across security functions

Mentorship & Security Culture

• Mentor junior and mid-level security operations analysts Build trust and credibility with engineering teams
• Uphold and advance security operations principles and ways of working
• Contribute to security operations roadmap and strategy Drive security operations process improvements


Requirements:
A successful candidate will have:

• Significant experience in security operations, incident response, threat hunting, or SOC roles
• Deep expertise in security monitoring, detection, and incident response
• Proven track record leading complex security incidents to resolution
• Experience with advanced threat hunting and detection engineering
• Hands-on scripting experience and delivering automations to production
• Strong background in SIEM platforms and security operations tooling
• Demonstrated ability to mentor and develop junior analysts
• Experience building trust and collaborating with engineering teams
• Practical understanding of AI and LLM threat patterns and mitigations, and how to operationalise detections in SIEM
• Expert knowledge of Azure Sentinel (or similar SIEM platforms)
• Advanced KQL query language methodology for detection and hunting
• Deep understanding of MITRE ATT&CK framework and adversary TTPs
• Expert knowledge of incident response methodologies (NIST, SANS)
• Experience with advanced threat hunting techniques and methodologies & XDR/EDR platforms (Darktrace or similar)
• Advanced security event analysis and correlation
• Understanding of cloud security monitoring (GCP, Azure)
• Knowledge of network security monitoring and traffic analysis
• Strong understanding of networking, operating systems, and cloud security
• Scripting skills in Python, PowerShell, or similar for automation
• Understanding of Infrastructure-as-Code and DevSecOps practices
• Familiarity with Kubernetes and container security
• Advanced incident response and coordination skills
• Digital forensics and malware analysis knowledge
• Experience with forensic tools and techniques
• Understanding of legal and regulatory requirements for incident handling
• Experience with vulnerability scanning platforms and tools
• Knowledge of vulnerability prioritisation frameworks (CVSS, EPSS)
• Understanding of penetration testing methodologies

Why Apply Through MisuJob?

AI-Powered Job Matching: MisuJob uses advanced artificial intelligence to analyze your skills, experience, and career goals. Our matching algorithm compares your profile against thousands of job requirements to find positions where you have the highest chance of success. This saves you hours of manual job searching and ensures you only see relevant opportunities.

One-Click Applications: Once you create your profile, applying to jobs is effortless. Your resume and cover letter are automatically tailored to highlight the most relevant experience for each position. You can apply to multiple jobs in minutes, not hours.

Career Intelligence: Beyond job matching, MisuJob provides valuable career insights. See how your skills compare to market demands, identify skill gaps to address, and understand salary benchmarks for your experience level. Make data-driven decisions about your career path.

Frequently Asked Questions

How do I apply for this position?

Click the "Register to Apply" button above to create a free MisuJob account. Once registered, you can apply with one click and track your application status in your dashboard.

Is MisuJob free for job seekers?

Yes, MisuJob is completely free for job seekers. Create your profile, get matched with jobs, and apply without any cost. We help you find your dream job without any hidden fees.

How does AI matching work?

Our AI analyzes your resume, skills, and experience to understand your professional profile. It then compares this against job requirements using natural language processing to calculate a match percentage. Higher matches mean better fit for the role.

Can I apply to jobs in other countries?

Absolutely. MisuJob features jobs from companies worldwide, including remote positions. Filter by location or look for remote opportunities to find jobs that match your preferences.

Ready to Apply?

Join thousands of job seekers using MisuJob's AI to find and apply to their dream jobs automatically.

Register to Apply