Forensic Analysis Jobs in Berkshire

11 of 11 Forensic Analysis Jobs in Berkshire

SOC Tier 3 Analyst

Reading, England, United Kingdom
Avance Consulting
correlate security alerts. o Take ownership of Tier 3- level escalations from Tier 1 and Tier 2 analysts and guide them through complex incident response procedures. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioral analysis and threat intelligence data. o Analyze data from logs, network traffic, endpoint activities, and threat intelligence feeds … to detect unusual or malicious activity. o Collaborate with other security teams to uncover hidden threats and vulnerabilities. o Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. o Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements. o Prepare reports … findings on emerging threats. o Develop and maintain custom detection signatures or playbooks to enhance detection and response capabilities. 7. Reporting & Documentation: o Create detailed incident reports, including technical analysis and recommendations for mitigation. o Present findings to management and external stakeholders, such as clients or regulatory bodies, when necessary. o Ensure proper documentation of incident response workflows, timelines More ❯
Posted:

SOC Tier 3 Analyst

Reading, South East
LA International Computer Consultants Ltd
Detection and Response: o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioural analysis and threat intelligence data. o Analyse data from logs, network traffic, endpoint activities, and threat intelligence feeds … to detect unusual or malicious activity. 3. Incident Forensics: o Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. o Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements 4. Remediation and Recovery: o Collaborate with threat intelligence teams to identify … to manage incidents within the scope of data privacy laws and regulations. Key Skills & Experience: o Proficient in incident response tools and techniques, including network and system forensics, malware analysis, and memory analysis. o Expertise in analyzing and responding to threats on different platforms (Windows, Linux, cloud environments, etc.). o Familiarity with scripting languages (Python, PowerShell, etc.) to More ❯
Employment Type: Contract
Posted:

SOC Tier 3 Analyst

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
LA International Computer Consultants Ltd
Detection and Response: o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioural analysis and threat intelligence data. o Analyse data from logs, network traffic, endpoint activities, and threat intelligence feeds … to detect unusual or malicious activity. 3. Incident Forensics: o Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. o Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements 4. Remediation and Recovery: o Collaborate with threat intelligence teams to identify … to manage incidents within the scope of data privacy laws and regulations. Key Skills & Experience: o Proficient in incident response tools and techniques, including network and system forensics, malware analysis, and memory analysis. o Expertise in analyzing and responding to threats on different platforms (Windows, Linux, cloud environments, etc.). o Familiarity with scripting languages (Python, PowerShell, etc.) to More ❯
Employment Type: Contract, Work From Home
Posted:

SOC Analyst (L2)

Reading, South East
LA International Computer Consultants Ltd
Detection and Response: o Utilize advanced SIEM (Security Information and Event Management) tools, threat intelligence platforms, and other security technologies to analyze and correlate security alerts. 2. Threat Hunting & Analysis: o Proactively search for threats across the environment using behavioural analysis and threat intelligence data. o Analyse data from logs, network traffic, endpoint activities, and threat intelligence feeds … to detect unusual or malicious activity. 3. Incident Forensics: o Perform in-depth forensic analysis to determine the scope, impact, and root cause of security incidents. o Collect, preserve, and analyze evidence related to breaches, intrusions, or malware infections while adhering to legal and regulatory requirements 4. Remediation and Recovery: o Collaborate with threat intelligence teams to identify … to manage incidents within the scope of data privacy laws and regulations. Key Skills & Experience: o Proficient in incident response tools and techniques, including network and system forensics, malware analysis, and memory analysis. o Expertise in analyzing and responding to threats on different platforms (Windows, Linux, cloud environments, etc.). o Familiarity with scripting languages (Python, PowerShell, etc.) to More ❯
Employment Type: Contract
Posted:

L3 SOC Analyst

Reading, England, United Kingdom
JR United Kingdom
posture and reduce cyber risks through operational leadership and capabilities. We’re looking for a Level 3 SOC Analyst to join our client's team, offering expertise in security analysis and incident response to help drive the success of their Cyber Security Operations Center (CSOC). In this role, you will investigate and validate potential security threats, utilising a … overall security capabilities. Key Responsibilities: Advanced Incident Response: Handle escalated security incidents that L1 and L2 analysts cannot resolve, such as sophisticated malware infections, APTs, and complex intrusions. Lead forensic analysis and threat hunting efforts to ensure rapid containment and recovery. Security Analysis and Root Cause Analysis: Conduct detailed analysis of security events to address … current cyber threats. Participate in or lead security event analysis activities. Security Reporting and Advisories: Contribute to or lead the delivery of cyber security reports and advisories to key stakeholders. Residual Risk Assessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk. Advanced SIEM Tuning: Refine and tune SIEM tools to reduce false positives More ❯
Posted:

L3 SOC Analyst

Slough, England, United Kingdom
JR United Kingdom
posture and reduce cyber risks through operational leadership and capabilities. We’re looking for a Level 3 SOC Analyst to join our client's team, offering expertise in security analysis and incident response to help drive the success of their Cyber Security Operations Center (CSOC). In this role, you will investigate and validate potential security threats, utilising a … overall security capabilities. Key Responsibilities: Advanced Incident Response: Handle escalated security incidents that L1 and L2 analysts cannot resolve, such as sophisticated malware infections, APTs, and complex intrusions. Lead forensic analysis and threat hunting efforts to ensure rapid containment and recovery. Security Analysis and Root Cause Analysis: Conduct detailed analysis of security events to address … current cyber threats. Participate in or lead security event analysis activities. Security Reporting and Advisories: Contribute to or lead the delivery of cyber security reports and advisories to key stakeholders. Residual Risk Assessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk. Advanced SIEM Tuning: Refine and tune SIEM tools to reduce false positives More ❯
Posted:

Graduate Data Analyst

Slough, England, United Kingdom
JR United Kingdom
Social network you want to login/join with: Graduate Data Analyst – London – Full-Time, Office-Based Excel | Data Cleaning | Reporting | Quantitative Analysis | Litigation Support We're working with a boutique data analytics consultancy that partners with top law firms on high-profile commercial and regulatory disputes. They’re now looking for a Graduate Data Analyst to join their … growing team in Central London. This is a fantastic opportunity for a numerically minded graduate to launch a career in data analytics, combining forensic analysis with client-facing work. You’ll be working on complex data sets, helping to quantify financial claims and support legal investigations. The role is office-based and sits within a small, high-performing … team backed by the stability of a well-established financial services group. What you’ll be doing: Reviewing and cleaning datasets from clients and third parties Performing financial analysis to assess overcharging and commercial losses Producing clear, structured outputs in Excel and Word for legal and client use Supporting assumptions and models with logical frameworks when data is incomplete More ❯
Posted:

L3 SOC Analyst

Reading, England, United Kingdom
La Fosse
Berkshire This L3 SOC Analyst will have the previous following experience: Act as a lead investigator for high-severity security incidents, coordinating response activities and containment strategies. Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats. Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk). Collaborate with More ❯
Posted:

SOC Engineer - SC Cleared - Inside IR35

Slough, England, United Kingdom
JR United Kingdom
operations teams to ensure telemetry quality and visibility. Contribute to engineering playbooks, architectural documentation, and automation pipelines. Support threat hunting, red/blue team simulation readiness, and post-incident forensic analysis. #J-18808-Ljbffr More ❯
Posted:

Audio AI & Digital Signal Processing Engineer

Reading, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Overview: Our client is an innovative leader in AI-driven audio technology, pioneering advancements in digital signal processing (DSP) and generative AI. With a cutting-edge approach to watermarking, forensic analysis, and sound synthesis, this company is shaping the future of audio authenticity and AI-powered content creation. Their rapidly growing team collaborates with some of the biggest … DSP Engineer to drive innovation in audio signal processing and machine learning applications. This is an opportunity to work at the forefront of AI-generated sound, audio watermarking, and forensic analysis in a fast-paced, high-impact environment. The ideal candidate will have a deep understanding of digital signal processing, machine learning, and generative AI models for audio … signal processing, including signal injection, enhancement, synthesis, restoration, and error correction. Design and train generative AI models to create, process, and analyze audio content. Implement and refine AI-based forensic audio analysis and watermarking techniques to ensure authenticity and attribution. Collaborate with interdisciplinary teams to manage and preprocess large datasets for AI training. Optimize model performance for real More ❯
Posted:

Audio AI & Digital Signal Processing Engineer

Slough, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
Overview: Our client is an innovative leader in AI-driven audio technology, pioneering advancements in digital signal processing (DSP) and generative AI. With a cutting-edge approach to watermarking, forensic analysis, and sound synthesis, this company is shaping the future of audio authenticity and AI-powered content creation. Their rapidly growing team collaborates with some of the biggest … DSP Engineer to drive innovation in audio signal processing and machine learning applications. This is an opportunity to work at the forefront of AI-generated sound, audio watermarking, and forensic analysis in a fast-paced, high-impact environment. The ideal candidate will have a deep understanding of digital signal processing, machine learning, and generative AI models for audio … signal processing, including signal injection, enhancement, synthesis, restoration, and error correction. Design and train generative AI models to create, process, and analyze audio content. Implement and refine AI-based forensic audio analysis and watermarking techniques to ensure authenticity and attribution. Collaborate with interdisciplinary teams to manage and preprocess large datasets for AI training. Optimize model performance for real More ❯
Posted: