correlate security alerts. o Take ownership of Tier 3- level escalations from Tier 1 and Tier 2 analysts and guide them through complex incident response procedures. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioral analysis and threat intelligence data. o Analyze data from logs, network traffic, endpoint activities, and threat intelligence feeds … to detect unusual or malicious activity. o Collaborate with other security teams to uncover hidden threats and vulnerabilities. o Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. o Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements. o Prepare reports and … findings on emerging threats. o Develop and maintain custom detection signatures or playbooks to enhance detection and response capabilities. 7. Reporting & Documentation: o Create detailed incident reports, including technical analysis and recommendations for mitigation. o Present findings to management and external stakeholders, such as clients or regulatory bodies, when necessary. o Ensure proper documentation of incident response workflows, timelines More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Limited
analyze and correlate security alerts. Take ownership of Tier 3-level escalations from Tier 1 and Tier 2 analysts and guide them through complex incident response procedures. Threat Hunting & Analysis: Proactively search for threats across the environment using behavioral analysis and threat intelligence data. Analyze data from logs, network traffic, endpoint activities, and threat intelligence feeds to detect … unusual or malicious activity. Collaborate with other security teams to uncover hidden threats and vulnerabilities. Incident Forensics: Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements. Prepare reports and documentation that detail the … by sharing research findings on emerging threats. Develop and maintain custom detection signatures or playbooks to enhance detection and response capabilities. Reporting & Documentation: Create detailed incident reports, including technical analysis and recommendations for mitigation. Present findings to management and external stakeholders, such as clients or regulatory bodies, when necessary. Ensure proper documentation of incident response workflows, timelines, and action More ❯
Detection and Response: o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behaviouralanalysis and threat intelligence data. o Analyse data from logs, network traffic, endpoint activities, and threat intelligence … feeds to detect unusual or malicious activity. 3. Incident Forensics: o Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. o Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements 4. Remediation and Recovery: o Collaborate with threat intelligence teams to identify … to manage incidents within the scope of data privacy laws and regulations. Key Skills & Experience: o Proficient in incident response tools and techniques, including network and system forensics, malware analysis, and memory analysis. o Expertise in analyzing and responding to threats on different platforms (Windows, Linux, cloud environments, etc.). o Familiarity with scripting languages (Python, PowerShell, etc.) to More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
Detection and Response: o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behaviouralanalysis and threat intelligence data. o Analyse data from logs, network traffic, endpoint activities, and threat intelligence … feeds to detect unusual or malicious activity. 3. Incident Forensics: o Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. o Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements 4. Remediation and Recovery: o Collaborate with threat intelligence teams to identify … to manage incidents within the scope of data privacy laws and regulations. Key Skills & Experience: o Proficient in incident response tools and techniques, including network and system forensics, malware analysis, and memory analysis. o Expertise in analyzing and responding to threats on different platforms (Windows, Linux, cloud environments, etc.). o Familiarity with scripting languages (Python, PowerShell, etc.) to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harnham - Data & Analytics Recruitment
first (UK-based), with 1 day/month in London or Nottingham Salary: Up to £75,000 What You'll Do: Drive customer insights through segmentation, campaign performance, and behaviouralanalysis Lead data science-focused projects: forecasting, churn, frequency modelling, experimentation Work cross-functionally with data engineers, ML engineers, product and marketing Take ownership of high-impact projects More ❯