Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
ransomware, and APTs. Handle escalations from Tier 1 analysts and provide technical mentoring. Analyze and correlate alerts using SIEM and EDR tools such as Splunk and Microsoft Defender. Perform forensicanalysis to identify root causes and recommend containment and recovery actions. Develop detection use cases, improve processes, and maintain accurate incident documentation. Collaborate with IT and security teams … years in cybersecurity, with strong SOC or incident response experience. Proficient in SIEM (Splunk, ArcSight) and EDR (Defender, CrowdStrike, Carbon Black). Strong knowledge of digital forensics, malware analysis, and threat hunting. Skilled across Windows, Linux, and cloud environments. Familiar with frameworks such as MITRE ATT&CK, NIST, and ISO 27001. Scripting experience (Python, PowerShell) beneficial. Preferred Certifications SOC More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
NIST, CIS, and ISO/IEC 27001/27002. Hands-on experience with tools such as FortiSIEM, Q-Radar, Microsoft Defender, Darktrace, Microsoft Sentinel, or similar platforms. Experience in forensicanalysis, red-team exercises, and crisis simulation activities. Desirable Experience managing or supporting both IT and OT environments. In-depth understanding of adversarial TTPs and complex threat landscapes. More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
NIST, CIS, and ISO/IEC 27001/27002. Hands-on experience with tools such as FortiSIEM, Q-Radar, Microsoft Defender, Darktrace, Microsoft Sentinel, or similar platforms. Experience in forensicanalysis, red-team exercises, and crisis simulation activities. Desirable Experience managing or supporting both IT and OT environments. In-depth understanding of adversarial TTPs and complex threat landscapes. More ❯
team. As an Incident Responder, you'll take the lead on active engagements involving real-world attacks such as ransomware, data breaches, insider threats, and more. You'll conduct forensic investigations, advise clients on containment and recovery strategies, work on delivery and implementation, and produce detailed post-incident reports. This is a hands-on, client-facing role that requires … response and enjoys being busy. Responsibilities: Co-ordinate and manage cyber security incident response for a diverse client base, ensuring effective containment, investigation, and recovery. Conduct in-depth digital forensicanalysis of relevant incident data Monitor and interpret the evolving cyber threat landscape, providing clients with timely, relevant insights into emerging threats, tactics, and vulnerabilities that may impact … security, with a strong background in Managing IR Cases/Projects Strong knowledge of cyber security threats, attack vectors, IOC, remediation. Hands-on experience with a range of different forensic tools, ELK, EDR, SIEM, and log analysis, Open Source Toolkits Comfortable communicating with both technical and non-technical stakeholders during high-stress situations. You must have excellent communication More ❯
future of real estate technology. Role Responsibilities Architect, build, and optimise scalable ETL pipelines for diverse datasets. Onboard, document, and curate external datasets for internal use. Perform data validation, forensicanalysis, and troubleshooting. Deliver high-quality, maintainable Python code and participate in peer reviews. Collaborate with stakeholders and researchers to support analytics and product development. Integrate data from More ❯
Develop and approve Go-to-Market plans with local teams to drive subscriber growth and manage churn - Systematically track the health of key accounts identifying roadblocks and dependencies - Provide forensicanalysis of issues with hands-on, detailed support - Deploy AI powered solutions to transform and accelerate knowledge and growth across the PSM network - Manage executive engagement with key More ❯