Role: Junior Major Incident & Problem Analyst Location: London - (Hybrid) Duration : Permanent Key Essential Skills: 2-3 years experience in a customer-focused, fast-moving IT support or service management environment Solid foundation in IT service delivery and understanding of Major Incident and Problem Management processes Working knowledge of ITIL practices and terminology Strong communication skills, able to … Confident in managing and participating in major incidents and problem investigations with support from senior staff Basic understanding of IT infrastructure and relevant systems Comfortable producing reports and handling incident/problem tracking (Excel basics and ITSM tool navigation) Strong analytical and organizational skills Desirable Skills: Experience supporting or working with senior stakeholders and learning how to drive process … sectors ITIL or other ITSM certifications in progress or completed Experience using ITSM platforms (eg, ServiceNow, Remedy, BMC, Cherwell) Interest in professional development and growing knowledge of ITIL/incident management best practices Overview We are seeking for Junior Major Incident & Problem Analyst to join our team based in central London. This role requires a proactive, detail More ❯
Network Incident Management Quality Assurance Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity : We are seeking a detail-oriented ITIL Network Incident Management Quality Assurance Analyst to support … the continuous improvement of our IT network incident management processes. The ideal candidate will work closely with the QA Lead to ensure network incident management practices align with ITIL standards and contribute to the overall quality of IT service delivery. Responsibilities: Assist in developing and maintaining quality assurance standards and procedures for IT network incident management, aligned … with ITIL framework. Conduct regular audits of incident records, documentation, and resolutions to ensure compliance with ITIL standards and internal procedures. Analyze incident data, metrics, and trends to identify areas for improvement in the incident management process. Support the training of IT staff on ITIL network incident management practices and quality assurance procedures. Participate in incidentMore ❯
Senior Incident Responder - SOC Analyst (L3) £71000 GBP Hybrid WORKING Location: Central London, Greater London - United Kingdom Type: Permanent Senior Incident Responder - SOC Analyst (L3) Location: UK-wide (hybrid/on-site as required) Salary: £71,000 + Bonus Clearance: Must be eligible for SC Clearance Our client is a global consulting and technology services firm … supporting public and private sector organisations with complex digital and cyber transformation. They are building out their UK Security Practice and are seeking a Senior Incident Responder - SOC Analyst (L3) to lead investigations, manage escalations, and strengthen cyber resilience for mission-critical environments. The Role As a Senior Incident Responder, you'll be the escalation point for … to containment and remediation. You'll drive root cause analysis, ensure runbooks and playbooks are followed, and directly engage with clients and delivery managers to provide expert guidance on incident handling. This is a hands-on technical leadership role that combines investigation, response, threat intelligence, and collaboration with stakeholders. You'll also support service improvement, tool optimisation, and the More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation … technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications & Experience Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation … technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications & Experience Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC/GCIA More ❯
Job Number: R Incident Response Analyst, Senior Key Role: Apply an understanding of monitoring, analyzing, detecting, and resp ond ing to cyber events and incidents in information systems and networks. Contribute to an integrated, dynamic cyber defense and leverage cybersecurity solutions to deliver cybersecurity operational services, including int rus ion detection and prevention, sit uational awareness of network … int rus ions, security events and data spillage, and incident response actions. Contribute to the development of innovative principles and ideas, work on unusually complex problems, and provide solutions that are highly creative. Handle major, high impact incidents, generate clear, concise recommendations, and coordinate activities and professional communications across a range of stakeholders. Work closely with security teams to … of experience in cyber security or information technology disciplines 4+ years of experience with Advanced Persistent Threat ( APT ) hunting, penetration testing, digital forensics, malware reverse engineering, SOC operations, or incident response Experience with Incident Response tools such as SentinelOne, Splunk, or Micro sof t Defender Ability to adapt communications styles and messaging for professionals at all levels of More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Nightwing
disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches … develop mitigation plans, and assist with the restoration of services. Nightwing is seeking a Cyber Threat Analyst to support this critical customer mission. Responsibilities: - Researching and compiling known resolution steps or workarounds to enable mitigation of potential Computer Network Defense incidents within the enterprise - Applying knowledge of the tactics, techniques, and procedures of various criminal, insider, hacktivist, and nation … and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data - Conducting cursory analysis of log data - Identifying the cause of an incident and recognizing the key elements to ask external entities when learning the background and potential infection vector of an incident - Tracking and documenting Computer Network Defense (CND) incidents More ❯
IT Operations Analyst (Tier 3) - Monitoring & Incident Response Location: Washington, DC (Capitol Hill - 20515) Clearance Requirement: US Citizen, must be able to obtain a security clearance Schedule: Full-time 24/7 Operations Support (Shift-based, may include nights/weekends) We are seeking a highly skilled IT Operations Analyst (Tier 3) to join our Integrated Operations … Center (IOC) in Washington, DC. In this role, you'll provide 24/7 monitoring, incident response, and technical escalation to ensure the stability and performance of IT systems, networks, and applications. This position is ideal for a hands-on professional with a strong background in IT monitoring, incident management, and system troubleshooting who thrives in high-stakes … Classify and prioritize incidents based on impact and urgency (ITIL/ITSM standards). Collaborate with Tier 1 Service Desk to guide escalations and validate user-reported incidents. Communicate incident status to stakeholders and contribute to post-incident reviews. Use Power BI and Power Automate to create dashboards, reports, and workflow automation. Maintain accurate documentation, shift logs, and More ❯
We are searching searching for a Technical Resilience Analyst , who will play a key role in strengthening the organization's resilience posture, with a focus on AWS cloud environments. This role combines hands-on technical analysis, project delivery and business support to ensure systems are robust, compliant and recoverable. This position will be a 6 month engagement (Inside IR35 … environments. Excellent communication skills, with the ability to explain technical concepts and provide clear guidance to non-technical stakeholders. Strong analytical and problem-solving abilities. Experience with resilience testing, incident response and compliance reporting. More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen
L2 Security Analyst - SIEM, EDR, Firewalls, Email gateways, Incident Response, Triage - Hertfordshire - £38,000 - £40,000 Opportunity to join one of the fastest growing Solution Providers in the UK and they are showing no signs of slowing down. This role is to add to an already busy SOC team working on triaging, investigating, and resolving security tickets, as … well as supporting the wider team in maintaining the organisation's security posture Key skills (essential) Proven experience working in a SOC environment or as a Security Analyst Strong understanding of the Microsoft stack especially the Security piece - Sentinel and Defender. Strong understanding of cybersecurity fundamentals, including malware, phishing, and network attacks Familiarity with endpoint protection, Firewalls, and email … security systems Knowledge of Scripting or automation (eg, PowerShell, Python) Experience with incident response frameworks and ITIL ticketing systems (eg ServiceNow, Jira) Nice to have Any MS365 certifications and CW PSA (nice to have) Relevant security certifications such as CompTIA Security+, CySA+, GSEC, or equivalent (nice to have) Within this role and organisation, there is loads of opportunities for More ❯
CYBERSECURITY INCIDENT RESPONSE & THREAT DETECTION ANALYST Location: Columbus, Ohio or Ft. Belvoir, Virginia or Battle Creek, MI. DOD Top Secret Clearance Certification: Baseline Certification for IAT-II and CNDSP/CSSP-IR Participates in 24x7x365 monitoring of SIEM and other cybersecurity monitoring tools to detect and respond to cybersecurity threats within the Enterprise Network Environment. Performs actions to … Host based antivirus, Data loss prevention, Vulnerability Management, Forensics, Malware Analysis, Device Hardening, Understanding of Defense-in-Depth, Ability to build scripts and tools to enhance threat detection and incident response capabilities (Preferably in SPL, Python, PowerShell) • Must possess IT-I Critical Sensitive security clearance or Tier 5 (T5) at time of proposal submission. • Must have Baseline Certification for More ❯
incidents, ensuring timely containment, analysis, and remediation. You act as the primary liaison between our business and our global Security Operations Center, ensuring seamless communication and escalation. You translate incident learnings into actionable improvements for the cybersecurity setup within the Coatings division and c ollaborate with SOC analysts to identify and assess threats and support proactive threat hunting initiatives. … Furthermore, you develop and refine incident response playbooks and workflows tailored to the Coatings division's operational needs. You provide clear, structured updates to business units and leadership during and after incidents and s upport internal training and awareness initiatives based on real-world incident scenarios. WHAT YOU OFFER master's degree in computer science, information technology, or … field, with 2-3 years of professional experience in cybersecurity expertise in operative cybersecurity, including threat detection and system hardening as well as experience in developing and executing structured incident response procedures teamplayer with excellent communication skills in both written and spoken German and English strong interpersonal skills and a collaborative approach to working with cross-functional global teams More ❯