Incident Analyst Jobs

5 of 5 Incident Analyst Jobs

Security Operations Analyst / Incident Response Analyst

London, England, United Kingdom
NETbuilder
in observability and cybersecurity. We foster a collaborative environment where security professionals can grow, make an impact, and work with modern tooling. We’re recruiting for an experienced SecOps Analyst to support a prestigious multinational client. In this role, you’ll champion a proactive, security-first culture within the SOC. You’ll ensure security events and incidents are automated … Triage alerts, validate incidents, gather context, and escalate according to severity. Investigate threats using network and host-based tools across Windows, macOS, Linux, and Unix environments. Manage the full incident lifecycle: detection, investigation, response, and remediation. Maintain and standardise SOC processes, policies, and runbooks. Research emerging threat vectors, commodity malware, and APT tactics. Provide feedback on detection rules and … to break down technical findings for diverse audiences. Detail-oriented, curious, and creative when tackling unexpected challenges. Your Experience A minimum of 3 years+ as a SOC or SecOps Analyst, with practical incident handling and threat detection experience. Proven ability to optimise detection tools, reduce noise, and drive SOC improvements. Comfortable with shift work and participating in on More ❯
Posted:

Incident Response Analyst

Houston, Texas, United States
K.L. McKinney
ideal candidate will be responsible for detecting, investigating, and responding to security incidents across networks, endpoints, and cloud environments. This role requires expertise in threat intelligence, forensic analysis, and incident handling to minimize the impact of security breaches and strengthen the organizations cybersecurity posture. Key Responsibilities: Incident Detection & Response Monitor security alerts from SIEM, EDR, IDS/IPS … indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by attackers. Collaborate with threat intelligence teams to track adversary behavior and emerging threats. Security Operations & Reporting Document incident reports, timelines, and remediation actions. Develop and update incident response playbooks and standard operating procedures (SOPs). Participate in post-incident reviews to improve security controls and … response strategies. Collaboration & Continuous Improvement Work closely with SOC analysts, security engineers, and IT teams to enhance detection capabilities. Provide incident response training and tabletop exercises to improve team readiness. Assist in automating security response tasks using SOAR tools. Qualifications & Skills: Education: Bachelors degree in Cybersecurity, Computer Science, Information Security, or related field. Experience: 3+ years in incident More ❯
Employment Type: Any
Salary: USD 120,000 Annual
Posted:

Incident Response Analyst (SOC)

City of London, London, United Kingdom
Bonhill Partners
Bonhill Partners are excited to represent our global investment bank as they look to expand their cyber security teams as part of a globalisation initiative. Client: Investment Banking Role: Incident Response Analyst (SOC) Job type: 3 month contract-> convert to perm at VP level Location: London, near Bank. Project snapshot: Experience responding to cybersecurity incidents (triage, containment, eradication … ArcSight) Ability to perform log analysis across network, host, application, and cloud sources Understanding of malware behaviour, attack vectors, and common threat actor techniques Familiarity with MITRE ATT&CK, incident handling frameworks (NIST, SANS) Experience with alert investigation, root-cause analysis, and writing clear incident reports Ability to use EDR tools (CrowdStrike, Carbon Black, SentinelOne etc.) Knowledge of More ❯
Posted:

Incident Response Analyst (SOC)

London Area, United Kingdom
Bonhill Partners
Bonhill Partners are excited to represent our global investment bank as they look to expand their cyber security teams as part of a globalisation initiative. Client: Investment Banking Role: Incident Response Analyst (SOC) Job type: 3 month contract-> convert to perm at VP level Location: London, near Bank. Project snapshot: Experience responding to cybersecurity incidents (triage, containment, eradication … ArcSight) Ability to perform log analysis across network, host, application, and cloud sources Understanding of malware behaviour, attack vectors, and common threat actor techniques Familiarity with MITRE ATT&CK, incident handling frameworks (NIST, SANS) Experience with alert investigation, root-cause analysis, and writing clear incident reports Ability to use EDR tools (CrowdStrike, Carbon Black, SentinelOne etc.) Knowledge of More ❯
Posted:

Junior Incident Analyst

Nationwide, United Kingdom
Newto Training
Looking to move away from retail, hospitality or shift work – and build a career that actually gives you long-term stability and flexibility? Cyber Security is one of the fastest-growing industries in the world, and you don’t need More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:
Incident Analyst
10th Percentile
£27,338
25th Percentile
£36,375
Median
£40,250
75th Percentile
£50,750
90th Percentile
£62,600