Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Hays
role will require someone with excellent knowledge of: GDPR, Business Continuity and Disaster Recovery Planning, Information Security Policies, Creating Education and Awareness programmes, Security IncidentResponse and Secure Development Processes (including OWASP). Third Party Supplier Management, Antivirus, Malware, threat hunting techniques and technologies are also highly sought more »
or autonomy, with little need for escalation It would be great if you had: Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incidentresponse, code/malware analysis Strong coding skills CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP more »
with experience or relevant job titles of; Loss Notification Operations Manager, Loss Reporting Team Supervisor, Initial Loss Assessment Coordinator, First Notice of Loss Supervisor, Incident Reporting Team Leader, Claims Intake Manager, Loss Notification Handling Supervisor, Initial Claims Assessment Coordinator, IncidentResponse Team Leader, Loss Reporting Operations Supervisor more »
systems and infrastructure. Investigate and mitigate newly identified cyber security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incidentresponse when necessary. Perform proactive threat hunting for emerging cyber threats. Maintain and optimize TVM tool performance and dashboards. Ensure compliance with industry more »
include, but are not limited to: Design, develop, and maintain Python-based integrations and automation solutions within Google Chronicle, enhancing threat intelligence, detection, and incidentresponse capabilities. Lead the strategic integration of Google Chronicle within Fortrea's cybersecurity infrastructure, optimizing its utility for security analytics and operations. Direct … applications in threat intelligence, with knowledge of how to conduct analyses within SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) platforms. Strong foundation in cybersecurity principles, practices, and technologies, including data management specific to cybersecurity applications. Relevant certifications such as CISSP, GCIH, or Google more »
Years experience Nice to Have Skills: Any of Network+, Security+, CCNA, DEVOPS, JUNOS, Salesforce or other recognised IT admin certification Knowledge of Cyber Incidentresponse and Linux environments Non internet facing IT environments Computer Science Degree or any similar field Benefits: Competitive salary and promotions based on excellence. more »
Hi All, I'm working with a global business looking for an IncidentResponse Lead who has a wide breath of experience working proactively on incidents and confident in collaborating with teams across the business. You will be a fit if you have experience with: Developing playbooks/ more »
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
C-SOC) with two laboratory sites. You will assist STFC's cyber team to define, practice,and verify the adequacy of the cyber critical incident response. You will also assist STFC's infrastructure team whomanage the BAU activities relevant to ongoing cyber assurance, patching, cyberreadiness, and routine incident … of relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
As a member of Experians Global Security Office, the Enterprise Security Incident Manager functions as a Cyber Incident Commander and coordinates the Cyber Fusion Centres (CFCs) response to significant cyber-security incidents according to Experians Global Information Security IncidentResponse Plan and processes. You will … be responsible for initiating and tracking various workstreams during security incidents to ensure there is effective detection, response, containment, eradication, and recovery during incidentresponse and managing executive communications until incident termination. The candidate for this role must be a self-starter, capable of working independently … and have strong technical skills involving cyber-incidentresponse, strong writing skills and effective communication with leaders. This role will require you to be part of an on-call rotation for response to significant security incidents outside of normal work hours, including holidays and weekends. Key Responsibilities more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
Service is a key leadership role responsible for overseeing day-to-day operations, managing the SOC team during shifts, and ensuring effective security analysis, incidentresponse, and monitoring of client infrastructure. Reporting to the SOC Operations Manager, the Shift Lead is a critical escalation point during incidents, contributing … continual service improvement and staff development. What youll be doing: Team oversight - Directly manage and oversee all Analysts during assigned shifts. Security analysis and incidentresponse - Lead security analysis efforts, incident classification, and incidentresponse actions. Monitoring client security infrastructure - Oversee the continuous monitoring of … client infrastructure. SOC escalation point - Act as a key escalation point during incidents, advising on containment points and response strategies. Threat understanding - Maintain a deep understanding of evolving cybersecurity threats What you will bring: Experience with SIEM tools including Splunk, QRadar, and Sentinel. Ability to assess and impact business more »
or autonomy, with little need for escalation It would be great if you had: Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incidentresponse, code/malware analysis Strong coding skills CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
and managing automation scripts for deploying and configuring security agents across large environments. Experience in tuning and optimizing OpenSearch or Elasticsearch indexers. Experience with incidentresponse processes and forensic analysis to support investigations and improve threat detection. Experience with cloud-native security tools and services Desired Qualifications: Advanced more »
Senior IncidentResponse Analyst – Cybersecurity - Up to £80k - Hybrid - up to 35% bonus - Excellent Benefits. My client one of the world’s most renowned aviation groups in the world is searching for a Senior IncidentResponse Analyst to join their team! Skills: Able to serve as … to all levels of hierarchy, including senior leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incidentresponse, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC more »
and governance requirements. Essential Requirements: • 5 years of experience in a technical SOC or cybersecurity role, • 5 years experience of Cyber Security investigations and incidentresponse environments • Good knowledge of Anti Malware, Anti Phishing, EndPoint Detection and Response systems. • Good all round knowledge of different threat scenarios … investigations, incidentresponse processes and remdiation techniques. • Good knowledge of cyber security systems and tooling • Reasonable knowledge of Security Information and Event Management systems • Reasonable knowledge of Firewall systems (Fortigate essential) • Foundational knowledge of Security Orchestration, Automation and Response (SOAR) systems • Good knowledge of common operating systems more »
Hi All, I'm working with a global business looking for an IncidentResponse Lead who has a wide breath of experience working proactively on incidents and confident in collaborating with teams across the business. You will be a fit if you have experience with: Developing playbooks/ more »
Leeds, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
of a 24/7 operation with four shift teams working in a standard rotation. They are responsible for utilising the SOC's Security Incident and Event Management (SIEM) toolsets to detect and investigate potential Security and Service Incidents occurring within the monitored networks. These roles require a minimum … using the Protective Monitoring platform and Internet resources to identify cyber-attacks/security incidents. Categorise all suspected incidents in line with the Security Incident policy Recognise potential, successful and unsuccessful intrusion attempts and compromises through reviews and further analysis of relevant event detail and incident summary information. … Write up high quality security incident tickets using a combination of existing knowledge resources and independent research. Assist with remediation activities and conduct permitted remediation (or support customer stakeholders) to inhibit cyber-attacks, clean up IT systems and secure networks against repeat attacks. Produce security incident review reports more »
client base that spans multiple industry verticals. Utilising industry-leading detection technology, the team of experienced SOC members work to provide assurance detection and incidentresponse capabilities to organisations of all sizes. They are now looking for a Security Analyst to join their CREST certified Security Operations Centre … SIEM, IDS and threat Intelligence Technologies. Provide advice and guidance to client targets of cyber-attacks and malicious activity to a high standard. Provide incident reporting capabilities ensuring that all information is provided in a timely, accurate and effective manner. Provide analytical support to other SOC team members during more »
C&I SIR practice works with NCC Group clients to deliver prioritised programs of security improvements: in close collaboration with NCC Group security audit, IncidentResponse, Penetration and Red Teams. Security Consultants play key roles in these client assignments: as recognised security experts they drive change, as well … and their service providers on changes they will make. Key to this role is assessing and enhancing pre-existing risk and security information including incident reports, red team findings, penetration tests and security audits, augmenting those where appropriate with additional security reviews. As part of a project team, they … client Security Posture is materially impacted in a positive manner over the duration of an engagement. Assessing pre-existing risk and security information including incident reports, red team findings, penetration tests and security audits, augmenting those where appropriate with additional security reviews Providing technical input for work plans and more »
party suppliers and external auditors. In addition to this, you will deliver awareness training, test and report on the businesss disaster recovery, continuity and incidentresponse plans, and carry our internal audits of the InfoSec governance frameworks. In order to be suitable for this role, you must be more »
NHS Arden and Greater East Midlands Commissioning Support Unit
and SQL injection tests where applicable on products, generating detailed reports for technical and non-technical staff and stakeholders. Investigate security alerts and provide incidentresponse, feeding back to relevant parties where necessary. Help troubleshoot and resolve issues and conduct post-release/post-implementation testing Assist with more »
training, consultancy, and solutions to regulated, high value and high threat environments. Kenyon International Emergency Services is a world leader in emergency planning and incident response. Air Partner Air Partner works with Climate and Development experts Climate Impact Partners, to allow clients to offset carbon emissions in support of more »
Senior SOC Engineer Hybrid (2 days p/w in office) Leaders in Cybersecurity incidentresponse and managed services, catering to a wide range of clients in both private and public sectors. About the Role: Who We're Seeking: Join our team at the purpose-built 24/ more »
You will work closely with cross-functional teams to design, implement, and maintain robust and resilient systems, with a focus on automation, monitoring, and incident response. The role: • Working arrangements: Flexible – can be fully remote (UK residents only – unfortunately, Visa sponsorship is not offered for this role) Key Responsibilities … and performance in mind. Implement and maintain monitoring, alerting, and logging systems to proactively identify and resolve issues before they impact customers. Participate in incidentresponse and on-call rotations, diagnosing and resolving production issues to minimize downtime and ensure service reliability. Conduct performance analysis and capacity planning more »
Farnborough, Hampshire, South East, United Kingdom
GREENLAYERS LTD
365. Conducting engineering-based assessments on BMS and EMS-based alerts; evaluating operational and customer service risk; and reporting validated alarms in accordance with incident management (IM) procedures. Reporting issues pertaining to engineering systems availability and/or design efficiency; assessing technical design and O&M information; and associated … schematic drawings. Support the Preferred Maintenance Contractor (PMC) with first-line incidentresponse, containment, and resolution, providing technical support and assistance to operational staff in the progression and closure of incidents. Produce and distribute service performance reports on technical third-party suppliers in accordance with agreed service levels. more »
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Matchtech
using industry best practices. Log Management: Manage log sources within the SIEM solution and create alert use cases to identify patterns of anomalous activity. IncidentResponse: Lead the response to high-severity security incidents, providing senior-level response activities and ensuring effective remediation and recovery actions. … Security Orchestration, Automation, and Response (SOAR): Support and develop the SOAR platform, creating new workflows for automated responses to common attack types. Digital Forensics: Conduct forensic analysis on serious security incidents using data from multiple sources to ensure threats are contained and eradicated effectively. Cyber Crisis Scenario Testing: Participate … important security and performance metrics. Job Requirements: Extensive experience in a SOC Level 2 or 3 role with evidence of advanced threat hunting and incident response. Experience in log correlation, forensics investigations, and compliance with regulatory frameworks. Proficiency in security technologies including SIEM, SOAR, EDR, IDS/IPS, and more »