Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Eden Scott
Cybersecurity IncidentResponse Lead Location: Hybrid - must live in comutable distance to Glasgow city centre (maybe a requirement to be on-site in an office at short notice). Excellent Cybersecurity IncidentResponse Lead opportunity to join a leading UK bank who continue to expand their … Cyber Security capabilities. You will be a sharp, decisive, and highly experienced Cybersecurity IncidentResponse Specialist looking to join a high-performing Detect & Respond Operations Team. You will thrive working under pressure, excel at solving complex problems, and have a knack for identifying and neutralising threats before they … resilience. Provide clear, concise briefings and reports to senior leadership, offering insight into incidents, risks, and ongoing threat landscapes. 💡 Your background: Proven experience leading incidentresponse operations and cybersecurity investigations. Deep understanding of cyber attack vectors, threat actors, and red team/blue team methodologies. Strong analytical skills More ❯
glasgow, central scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
An exciting opportunity has arisen for a Cyber Security IncidentResponse Manager to join a leading Financial Services organisation based in Glasgow. This role plays a key part in safeguarding the organisation from cyber threats by identifying, responding to, and mitigating cybersecurity incidents. As part of the Cyber … Detect and Respond Operations Team , you will be instrumental in enhancing security operations, strengthening defences, and ensuring operational resilience. Key Responsibilities Lead real-time response to cyber threats, managing cybersecurity incidents and investigations through to resolution. Analyse security breaches, identify attack vectors, and ensure appropriate remediation actions are taken. … to improve cybersecurity measures and prevent future threats. Provide clear communication to senior management on cybersecurity risks and incidents. Drive continuous improvement through post-incident reviews and scenario testing. What They're Looking For Extensive experience in cybersecurity incidentresponse and operational leadership within a Security Operations More ❯
Job Description An exciting opportunity has arisen for a Cyber Security IncidentResponse Manager to join a leading Financial Services organisation based in Glasgow. This role plays a key part in safeguarding the organisation from cyber threats by identifying, responding to, and mitigating cybersecurity incidents. As part of … Detect and Respond Operations Team , you will be instrumental in enhancing security operations, strengthening defences, and ensuring operational resilience. Key Responsibilities Lead real-time response to cyber threats, managing cybersecurity incidents and investigations through to resolution. Analyse security breaches, identify attack vectors, and ensure appropriate remediation actions are taken. … to improve cybersecurity measures and prevent future threats. Provide clear communication to senior management on cybersecurity risks and incidents. Drive continuous improvement through post-incident reviews and scenario testing. What They're Looking For Extensive experience in cybersecurity incidentresponse and operational leadership within a Security Operation... More ❯
methodologies within various GTIS teams. This is a hands-on engineering role where you will design, build, and optimise automation frameworks, observability tools, and incidentresponse mechanisms. This role also involves collaborating across GTIS and CTO, engaging with storage, data, and other product teams. You will act as … Programming and Scripting - This includes expertise in languages such as Python, Powershell, or Go, which are essential for automating routine tasks and system deployments. Incident Management and Troubleshooting - The ability to manage incidents effectively, troubleshoot issues swiftly, and perform root cause analysis to prevent future incidents. Systems Engineering and … be based in Knutsford (Radbroke Hall) or Glasgow Campus . Purpose of the role To apply software engineering techniques, automation, and best practices in incidentresponse, to ensure the reliability, availability, and scalability of the systems, platforms, and technology through them. Accountabilities Availability, performance, and scalability of systems More ❯
Join us as a Security Engineer to help detect threats, improve incidentresponse, and meet compliance requirements by designing, implementing, and maintaining the security of computer systems and networks, identifying vulnerabilities, responding to incidents, and collaborating with other teams to ensure a secure environment. To be successful as … writing KQL and SPL; log sources, ingestion patterns, and correlation rules). DevOps knowledge (Git/BitBucket/GitLab). Security Fundamentals (threat detection, incidentresponse, threat intel; knowledge of the MITRE ATT&CK framework and security operations). Some other highly valued skills may include: Scripting - Python … securely generated, stored, and used. Execution of audits to monitor, identify, and assess vulnerabilities in the bank's infrastructure/software and support the response to potential security breaches. Identification of advancements to support the innovation and adoption of new cryptographic technologies and techniques. Collaboration across the bank, including More ❯
Tier 1 Analysts and providing more in-depth analysis of potential threats to the organisation. The role is crucial in the investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. The Tier 2 Analyst will work closely with senior and junior … analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions. This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a shift allowance. Candidates will be required to have active SC … threats to Tier 3 Analysts with detailed analysis for further action Monitor the threat landscape and document findings on evolving threat vectors Follow established incidentresponse playbooks, providing feedback for enhancements and streamlining CTAC processes Co-ordinate with Tier 3 Analysts and management to refine detection and responseMore ❯
Tier 1 Analysts and providing more in-depth analysis of potential threats to the organisation. The role is crucial in the investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. The Tier 2 Analyst will work closely with senior and junior … analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions. This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a shift allowance. Candidates will be required to have active SC … threats to Tier 3 Analysts with detailed analysis for further action Monitor the threat landscape and document findings on evolving threat vectors Follow established incidentresponse playbooks, providing feedback for enhancements and streamlining CTAC processes Co-ordinate with Tier 3 Analysts and management to refine detection and responseMore ❯
You will play a crucial role in ensuring the resilience of our high-profile public sector clients' business operations in the event of an incident or disaster. In this role, you will be responsible for planning, coordinating, and executing disaster recovery testing to validate the effectiveness of IT recovery … Maintain detailed documentation and reporting for client audits, risk committees, and compliance reviews. Provide training and awareness to client teams on DR testing and incidentresponse procedures. Work with emergency planning teams, elected officials, and public sector partners to integrate IT recovery within wider resilience and emergency responseMore ❯