recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensicanalysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of … threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues More ❯
attacks and global ransomware campaigns—in a dynamic, fast-paced environment. Key Responsibilities Lead host- and network-based incident investigations, including triage, system recovery, forensicanalysis, malware analysis, and root cause assessments. Develop incident response rules and procedures, conduct tabletop exercises, and contribute to incident management planning. … incidents. Proficiency with tools such as: Open-source investigation tools (Wireshark, TCPDump, NetFlow, etc.) Network defense technologies (IDS/IPS, SIEM, Firewalls, etc.) Malware analysis tools (IDA Pro, REMnux, sandboxing solutions, etc.) Ability to engage and communicate effectively with senior stakeholders. This is a rare opportunity to work under More ❯
leading local IT Security Officers Experience in sourcing and managing vendor relationships , staff and service providers across multiple countries, with expertise in information risk analysis, vulnerability assessment, incident response, and root cause resolution. Specific Technical skills - Excellent knowledge of NIST CSF (1.1 and 2.0), ISO2700x, ISO22301 and NIS 2. … Awareness platforms, Cyber Security Testing, Threat Detection and Response, Security Information and Event Management (SIEM) platforms. As a plus : Expertise in Vulnerability management tools, forensicanalysis tools and methods, GRC Tools Identity, Access & Network Security: Proficiency in Identity and Access Management (IAM), Secure Access Service Edge (SASE), and More ❯
Windsor, Berkshire, South East, United Kingdom Hybrid / WFH Options
Centrica
handle cyber incident investigations, e-Discovery, network forensics, and cyber breach inquiries. Location: Hybrid working with occasional travel to Windsor. Key Accountabilities: Carry out forensicanalysis and incident response investigations Build and manage forensic and incident infrastructure. Lead cyber forensic investigations. Support weekly security operations calls. More ❯
approach to cyber resilience through war-gaming, tabletop exercises, and continuous improvement initiatives. Key Responsibilities: Lead investigations into complex cyber incidents, conducting in-depth forensicanalysis to determine root cause and eliminate threats. Maintain and improve incident response and forensic tooling, ensuring high operational readiness. Coordinate and More ❯