Job Summary: The Senior Incident Response Analyst will play a critical role in our Security Operations Center (SOC) by leading the detection, analysis, and response to cybersecurity incidents. This individual will be responsible for monitoring security events, conducting in-depth investigations, and implementing advanced threat detection techniques. The ideal candidate will have extensive experience in cybersecurity, a strong … years of experience in a SOC or similar cybersecurity role. Strong understanding of cybersecurity principles, threat landscapes, and attack vectors. Proficiency with security tools and technologies. Experience with incident response and digital forensics is advantageous. Excellent analytical and problem-solving skills. Strong communication and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities. Experience with scripting More ❯
This job is brought to you by Jobs/Redefined, the UK's leading over-50s age inclusive jobs board. Job Description Job Summary: The Senior Incident Response Analyst will play a critical role in our Security Operations Center (SOC) by leading the detection, analysis, and response to cybersecurity incidents. This individual will be responsible for monitoring security … years of experience in a SOC or similar cybersecurity role. Strong understanding of cybersecurity principles, threat landscapes, and attack vectors. Proficiency with security tools and technologies. Experience with incident response and digital forensics is advantageous. Excellent analytical and problem-solving skills. Strong communication and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities. Experience with scripting More ❯
Incident Response Lead Analyst - Cyber Security Join to apply for the Incident Response Lead Analyst - Cyber Security role at Boston Consulting Group (BCG) Incident Response Lead Analyst - Cyber Security 1 day ago Be among the first 25 applicants Join to apply for the Incident Response Lead Analyst - Cyber Security role at Boston … across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do Position Overview As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This role … requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG’s global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to strengthening our security posture and More ❯
across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do Position Overview As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This role … requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG’s global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to strengthening our security posture and … minimizing business risks associated with cyber threats. What Will You Do? Act as a Tier 3 Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. Investigate security incidents, including malware infections, phishing attacks More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
of the skills or experience we're looking for, please go ahead and apply. We'd love to hear from you! About the role We are looking for an IncidentAnalyst on a 12 Month Fixed Term Contract. The IncidentAnalyst will the perform daily management of the incident backlog through the effective collaboration with … resolver teams. The role will help develop a centralised information repository to enable the efficient identification and resolution of incidents across all priorities when they occur. Reporting to the Incident Manager you will aid with the adoption and continual improvement of the Incident Management process and all associated procedures. As an IncidentAnalyst in HL you … Service Management to become a Service Delivery Manager, Relationship Manager, Service Level Manager or Process Owner for any other ITIL processes. What you'll be doing Management of the incident backlog, ensuring incidents are resolved within agreed SLAs. Analyse incident data to identify trends and opportunities for improvement. Ensure the quality of incident data meets specified requirements. More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
us and have most of the skills or experience we're looking for, please go ahead and apply. We’d love to hear from you! About the role The IncidentAnalyst will the perform daily management of the incident backlog through the effective collaboration with the Service Desk and resolver teams. The role will help develop a … centralised information repository to enable the efficient identification and resolution of incidents across all priorities when they occur. Reporting to the Incident Manager you will aid with the adoption and continual improvement of the Incident Management process and all associated procedures. As an IncidentAnalyst in HL you will have the opportunity develop your technical and … Service Management to become a Service Delivery Manager, Relationship Manager, Service Level Manager or Process Owner for any other ITIL processes. What you’ll be doing Management of the incident backlog, ensuring incidents are resolved within agreed SLAs. Analyse incident data to identify trends and opportunities for improvement. Ensure the quality of incident data meets specified requirements. More ❯
and review and raise security incidents in ticketing systems. Assist in security reporting, ensuring timely and quality delivery. Prepare and present reports using Microsoft PowerPoint and Excel. Provide Critical Incident Response Reports and lessons learned to stakeholders. Handle legal and law enforcement-related issues as necessary. Review security incidents periodically for trend analysis and recommend improvements or sales opportunities … to the Security Delivery Lead. Respond to incidents following playbooks and the Security Incident Management Process. Advise the account on Critical Security Advisories, including responses to Threat Advisories, ModCerts, Carecert, and emergency patches. Develop and maintain a vulnerability management system for zero-day vulnerabilities. Manage security information requests from clients. Lead on complex incidents and ensure lessons learned are … security qualifications (e.g., CISSP, CISM) or willingness to obtain them. Proven security industry experience, preferably in public sector or armed services. Knowledge of tools, equipment, and forensic requirements for incident response and evidence collection. Note: DXC does not make employment offers via social media or request payments from applicants. For more info, see the employment scams link. About the More ❯
Security Incident Response Analyst Security Incident Response Analyst Apply remote type: Remote with Travel Locations: London Time type: Full time Posted on: Posted 24 Days Ago Time left to apply: End Date: January 17, 2025 (5 days left to apply) Job requisition id: R-8306 About the role Here at DS Smith, we are looking for … a skilled Security Incident Response Analyst to join our Security Operations Team. Are you currently working within a Security Operations team or related role, triaging alerts and incidents and looking to develop professionally? In this role, you will act as an escalation point for the Security Operations Centre analysts and effectively manage higher severity cyber incidents. A key … member of the IT Security Operations and Incident Response team, you will be helping protect our business from the current and emerging cyber threats in an international business operating in over 30 countries. Every day brings something new and exciting within our team, ensuring that no two days are the same. You will be exposed to new challenges and More ❯
Newport, Wales, United Kingdom Hybrid / WFH Options
CPS Group (UK) Limited
talk with your recruiter to learn more. Base pay range Direct message the job poster from CPS Group (UK) Limited Senior Delivery Consultant Placing Tech Talent across the UK Incident Response Analyst – Hybrid – Newport – Up to £55,000 CPS Group is currently working with a leading UK-based Critical National Infrastructure (CNI) organisation, supporting their search for an … experienced Incident Response Analyst to join their growing Cyber Resilience Team. This is an exciting opportunity to be a key player in protecting vital national services from cyber threats, working within a Security Operations Centre (SOC) environment and collaborating with internal and external teams to detect, investigate, and respond to security incidents. Location: Newport – Hybrid (2-3 days … security alerts. Investigate suspicious activity and determine if incidents have occurred. Contain and mitigate security incidents to prevent further impact. Work closely with IT and security teams to develop incident response strategies. Analyse incidents to identify root causes and recommend improvements. Contribute to the development of cyber security plans, policies, and training. What We’re Looking For Proven experience More ❯
Security Analyst, Security Operations and Incident Response Meta is seeking a Security Analyst to join the Global Security Operations and Incident Response team. The Analyst will serve on the front lines of Meta's Security team and will lead and support security investigations across the company's global infrastructure as well as respond to escalations … from the Tier1 team. The analyst will leverage an armory of tools to investigate and respond to both external and internal security threats.Utilizing Meta's tooling, you will monitor security events in real-time, assess external and internal threats, and provide accurate and timely response. You will collaborate closely with technical teams, with a broad set of skills to … tackle the panoply of unique security challenges that we encounter at Meta scale. Security Analyst, Security Operations and Incident Response Responsibilities Investigate and respond to external and internal cybersecurity threats in a timely manner while communicating clearly and proactively until remediation. Act as an escalation point for Tier1 investigations, contribute to the development of the Tier1 function, and More ❯
Senior Analyst, (Delivery Lead), Incident Response London We have a new and exciting role available within our Cyber Security division in London for a Senior Analyst in the Incident Response Team. S-RM is a global intelligence and cybersecurity consultancy. Since 2005, we've helped some of the most demanding clients in the world solve some … Working in Cyber at S-RM Our Cybersecurity division is the newest and fastest-growing part of S-RM. The cyber sector is always evolving, and our Advisory , Testing , Incident Response and Forensics practices are in more demand than ever. We're building a team to meet this challenge. We're quick to respond, innovate, and improve. We don … a range of perspectives and expertise to draw on and help you grow. If that sounds like your kind of team, we'd like to hear from you. Our Incident Response Delivery Leads are a critical part of our Cyber Security division's success. As a Delivery Lead on our team, you will deploy your incident response expertise More ❯
London, England, United Kingdom Hybrid / WFH Options
Damco Spain SL
Join Maersk’s Groundbreaking Cyber Team: Redefining Incident Management & Response Imagine a career where you're not just responding to security incidents—you’re revolutionising how it’s done. At Maersk, one of the world’s largest and most respected logistics and shipping companies, our Cyber team is pioneering a whole new approach to incident response. This isn … of the globe’s most renowned logistics companies, where your contributions truly make a difference. Multidimension role to Keep You Engaged: Unlike any traditional SOC role, as a CERT analyst in Maersk, you’ll engage in a variety of activities, switching between defensive and offensive strategies, conducting threat hunts, and participating in innovative projects and research. This multifaceted approach … in innovative projects that allow you to bring your ideas to life, help shape the future of cybersecurity while developing new capabilities that enhance our operations. Key responsibilities Cyber Incident Response and event management Contributing to the response efforts for security incidents, managing triage, containment, documentation, and the reporting process. Contribute to the Cyber Incident Response process from More ❯
identifying operational and security risks and collaborating with business, functional, and customer stakeholders to develop plans that manage risk to acceptable levels. We are currently seeking a Sr. Cyber Incident Response Analyst to join our team. About the Role Monitor for and investigate suspicious or malicious activity and alerts Review Change Management requests for security relevance and impact … Daily review of system, application logs, and custom monitoring tools Malware and Advanced Persistent Threat (APT) analysis and remediation Incident Response and Investigations Availability for rotating on-call shifts (up to 2 - 3 times per year) About You Bachelor's degree preferred or equivalent related field experience Professional Certifications preferred, including SANS GIAC or CISSP Microsoft, Linux, Networking or … related certifications a plus. Experience in Information Technology Extensive experience in information security incident response and operations management Extensive experience of OS, application, and network security weaknesses, vulnerabilities, and remediation Experience researching, analyzing, and resolving complex problems with minimal supervision Experience reading and understanding system data, including, but not limited to, security event logs, system logs, and firewall logs More ❯
identifying operational and security risks and collaborating with business, functional, and customer stakeholders to develop plans that manage risk to acceptable levels. We are currently seeking a Sr. Cyber Incident Response Analyst to join our team. About the Role Monitor for and investigate suspicious or malicious activity and alerts Review Change Management requests for security relevance and impact … Daily review of system, application logs, and custom monitoring tools Malware and Advanced Persistent Threat (APT) analysis and remediation Incident Response and Investigations Availability for rotating on-call shifts (up to 2 - 3 times per year) About You Bachelor's degree preferred or equivalent related field experience Professional Certifications preferred, including SANS GIAC or CISSP Microsoft, Linux, Networking or … related certifications a plus. Experience in Information Technology Extensive experience in information security incident response and operations management Extensive experience of OS, application, and network security weaknesses, vulnerabilities, and remediation Experience researching, analyzing, and resolving complex problems with minimal supervision Experience reading and understanding system data, including, but not limited to, security event logs, system logs, and firewall logs More ❯
talented Cyber Security and Tech talent needed for their teams | Principal Recruitment Consultant @ Enso... Enso Recruitment is working on behalf of a growing cybersecurity consultancy to find an experienced Incident Response Analyst. This role offers the opportunity to join a team dedicated to reducing the impact of cyber threats and helping clients strengthen their long-term resilience. The successful … candidate will join a fast-paced and collaborative incident response function, contributing to investigations, digital forensics, threat intelligence, and client reporting. This position is ideal for someone who thrives on problem-solving, has strong technical skills, and enjoys working closely with clients during live security incidents. Key Responsibilities: Take part in active incident response cases, including digital forensics … and stakeholder coordination. Conduct initial incident assessments and support the full response lifecycle, from containment to recovery. Carry out security assessments and use threat intelligence and open-source research to inform investigations. Collaborate across teams to deliver end-to-end incident response and security services. Document findings and actions thoroughly, producing clear reports and remediation guidance for clients. More ❯
CYBERSECURITY INCIDENT RESPONSE & THREAT DETECTION ANALYST Location: Columbus, Ohio or Ft. Belvoir, Virginia or Battle Creek, MI. DOD Top Secret Clearance Certification: Baseline Certification for IAT-II and CNDSP/CSSP-IR Participates in 24x7x365 monitoring of SIEM and other cybersecurity monitoring tools to detect and respond to cybersecurity threats within the Enterprise Network Environment. Performs actions to … Host based antivirus, Data loss prevention, Vulnerability Management, Forensics, Malware Analysis, Device Hardening, Understanding of Defense-in-Depth, Ability to build scripts and tools to enhance threat detection and incident response capabilities (Preferably in SPL, Python, PowerShell) • Must possess IT-I Critical Sensitive security clearance or Tier 5 (T5) at time of proposal submission. • Must have Baseline Certification for More ❯
cutting-edge cyber security tools and grow both vertically and horizontally at an accelerated rate. Join our cyber team and elevate your career. Work you'll do The Cyber Incident and Threat Analyst SME will lead, manage, and provide expert-level cyber threat intelligence (CTI) and cybersecurity triage and analysis to support incident response and vulnerability management … without the need for employer sponsorship, now or at any time in the future Active Top Secret security clearance required 10+ years experience int he following: Performing cyber defense incident triage and recommend incident remediation strategies. Determining the scope, urgency, and impact of cyber defense incidents. Correlating threat assessment and incident data. Conducting comprehensive adversary research and … ATT&CK and other analytic frameworks. Developing and document repeatable and effective processes for SOPs and WIs. Identifying near-term changes in adversary tactics, techniques, procedures, and technology. Correlating incident data to identify patterns and trends within cybersecurity incidents Preferred: Prior professional services or federal consulting experience Certifications (e.g., CompTIA Security+, CEH, CISSP) 10+ years experience within: Energy sector More ❯
improve security, identifying common attack patterns to publicly exposed aspects of the organization's environment, and contributing to the implementation of scalable and preventative security measures. Executes enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production information systems … and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security service audit schedules, review access authorization, and perform the required access controls testing to identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack … according to agreed alert priority levels, escalation trees, triaging of security alerts, events, and notifications Ties third party attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of More ❯
Ladonia, Texas, United States Hybrid / WFH Options
Centene
improve security, identifying common attack patterns to publicly exposed aspects of the organization's environment, and contributing to the implementation of scalable and preventative security measures. Executes enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production information systems … and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security service audit schedules, review access authorization, and perform the required access controls testing to identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack … according to agreed alert priority levels, escalation trees, triaging of security alerts, events, and notifications Ties third party attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of More ❯
Carlton, Texas, United States Hybrid / WFH Options
Centene
improve security, identifying common attack patterns to publicly exposed aspects of the organization's environment, and contributing to the implementation of scalable and preventative security measures. Executes enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production information systems … and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security service audit schedules, review access authorization, and perform the required access controls testing to identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack … according to agreed alert priority levels, escalation trees, triaging of security alerts, events, and notifications Ties third party attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of More ❯
Mirando City, Texas, United States Hybrid / WFH Options
Centene
improve security, identifying common attack patterns to publicly exposed aspects of the organization's environment, and contributing to the implementation of scalable and preventative security measures. Executes enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production information systems … and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security service audit schedules, review access authorization, and perform the required access controls testing to identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack … according to agreed alert priority levels, escalation trees, triaging of security alerts, events, and notifications Ties third party attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of More ❯
Fort Sam Houston, Texas, United States Hybrid / WFH Options
Centene
improve security, identifying common attack patterns to publicly exposed aspects of the organization's environment, and contributing to the implementation of scalable and preventative security measures. Executes enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production information systems … and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security service audit schedules, review access authorization, and perform the required access controls testing to identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack … according to agreed alert priority levels, escalation trees, triaging of security alerts, events, and notifications Ties third party attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of More ❯
Red Snapper Recruitment are seeking a detail-oriented and experienced Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst to support a robust cybersecurity governance program. This role plays a key part in enhancing and maintaining the integrity of cybersecurity operations through effective data analysis, reporting, and cross-functional collaboration. The successful candidate will contribute … Collaborate with internal teams and external partners to support governance-related functions. Assist with distributing governance reports across organizational leadership and forums. What You Bring: Deep understanding of cyber incident response, patch management, and vulnerability assessment in large-scale environments. Strong problem-solving, analytical, and organizational skills. Ability to build strong working relationships in a global, distributed team environment. More ❯
Red Snapper Recruitment are seeking a detail-oriented and experienced Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst to support a robust cybersecurity governance program. This role plays a key part in enhancing and maintaining the integrity of cybersecurity operations through effective data analysis, reporting, and cross-functional collaboration. The successful candidate will contribute … Collaborate with internal teams and external partners to support governance-related functions. Assist with distributing governance reports across organizational leadership and forums. What You Bring: Deep understanding of cyber incident response, patch management, and vulnerability assessment in large-scale environments. Strong problem-solving, analytical, and organizational skills. Ability to build strong working relationships in a global, distributed team environment. More ❯
Red Snapper Recruitment are seeking a detail-oriented and experienced Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst to support a robust cybersecurity governance program. This role plays a key part in enhancing and maintaining the integrity of cybersecurity operations through effective data analysis, reporting, and cross-functional collaboration. The successful candidate will contribute … Collaborate with internal teams and external partners to support governance-related functions. Assist with distributing governance reports across organizational leadership and forums. What You Bring: Deep understanding of cyber incident response, patch management, and vulnerability assessment in large-scale environments. Strong problem-solving, analytical, and organizational skills. Ability to build strong working relationships in a global, distributed team environment. More ❯