a global basis, the resilience of operations has become a board level issue. You will provide our clients with a full spectrum of services, covering proactive and reactive Cyber IncidentResponse (CIR) Services. The proactive arm of our business covers a breadth of propositions, including playbook development, wargaming, readiness assessments, post-breach assessments, managed threat hunting as well … as implementing response automation technologies. Our specialists work with clients to uplift their maturity and fundamentally enhance their preparedness to respond, via targeted capability uplift, C-Suite awareness campaigns and training. Our technical response team support our clients in live incident responses by working to identify root causes and evict threats. Our professionals apply their experience and … award-winning vendor relationships, we can do whatever it takes - from improving the security of a single component to delivering a holistic security and privacy program. As a Cyber IncidentResponse Advisory and Incident Management Senior Manager or Associate Director, you will focus on developing our business across both proactive and reactive services, whilst leading our advisory More ❯
a global basis, the resilience of operations has become a board level issue. You will provide our clients with a full spectrum of services, covering proactive and reactive Cyber IncidentResponse (CIR) Services. The proactive arm of our business covers a breadth of propositions, including playbook development, wargaming, readiness assessments, post-breach assessments, managed threat hunting as well … as implementing response automation technologies. Our specialists work with clients to uplift their maturity and fundamentally enhance their preparedness to respond, via targeted capability uplift, C-Suite awareness campaigns and training. Our technical response team support our clients in live incident responses by working to identify root causes and evict threats. Our professionals apply their experience and … award-winning vendor relationships, we can do whatever it takes - from improving the security of a single component to delivering a holistic security and privacy program. As a Cyber IncidentResponse Advisory and Incident Management Senior Manager or Associate Director, you will focus on developing our business across both proactive and reactive services, whilst leading our advisory More ❯
to lead and produce deliverables based on reactive services client engagements. The Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to manage incidentresponse engagements and provide guidance on longer term remediation. Your Impact Weekend Work Schedule is Friday-Monday (10 hr work day/40 hr work week) Perform reactive … incidentresponse functions including but not limited to - host-based analysis functions through investigating Windows, Linux, and Mac OS X systems to identify Indicators of Compromise (IOCs) Examine firewall, web, database, and other log sources to identify evidence of malicious activity Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, and custom Crypsis investigation … tools to determine source of compromises and malicious activity that occurred in client environments Manage incidentresponse engagements to scope work, guide clients through forensic investigations, contain security incidents, and provide guidance on longer term remediation recommendations Ability to perform travel requirements as needed to meet business demands (on average 20%) Mentorship of team members in incidentMore ❯
to lead and produce deliverables based on reactive services client engagements. The Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to manage incidentresponse engagements and provide guidance on longer term remediation. Your Impact Weekend Work Schedule is Friday-Monday (10 hr work day/40 hr work week) Perform reactive … incidentresponse functions including but not limited to - host-based analysis functions through investigating Windows, Linux, and Mac OS X systems to identify Indicators of Compromise (IOCs) Examine firewall, web, database, and other log sources to identify evidence of malicious activity Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, and custom Crypsis investigation … tools to determine source of compromises and malicious activity that occurred in client environments Manage incidentresponse engagements to scope work, guide clients through forensic investigations, contain security incidents, and provide guidance on longer term remediation recommendations Ability to perform travel requirements as needed to meet business demands (on average 20%) Mentorship of team members in incidentMore ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Edge
IncidentResponse (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced IncidentResponse (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … s network systems, operational technology, and customer data from emerging and sophisticated cyber risks. Key Responsibilities As a senior member of the Security Operations team, you will: Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and … enhance SOC policies, playbooks, and incidentresponse processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation across cloud and on-prem environments. Support and develop the organisation's SOAR platform, creating automated workflows and improving response efficiency. Perform More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Edge
IncidentResponse (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced IncidentResponse (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … s network systems, operational technology, and customer data from emerging and sophisticated cyber risks. Key Responsibilities As a senior member of the Security Operations team, you will: Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and … enhance SOC policies, playbooks, and incidentresponse processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation across cloud and on-prem environments. Support and develop the organisation's SOAR platform, creating automated workflows and improving response efficiency. Perform More ❯
designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incidentresponse, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations – their infrastructure. In this … for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you'll … utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These More ❯
SOC Analyst role where you’re pigeonholed into one narrow specialism. At CyPro, you’ll have the opportunity to get involved in a wide range of areas including monitoring, incidentresponse, threat intelligence, detection engineering, automation and internal security operations. You’ll play a key role in our Security Operations Centre, delivering 365-day monitoring, detection and response … As the team grows further, you’ll have the flexibility to focus more deeply on the areas that interest you most – whether that’s advanced detection engineering, threat intelligence, incidentresponse leadership or platform automation. If you’re ambitious and want to help shape something rather than simply follow a process, this is the right environment for you. … Core Responsibilities: Security Monitoring & IncidentResponse Monitor security alerts generated by Microsoft Sentinel, Microsoft Defender, Datadog and Elastic. Assess severity and impact of alerts, triage and investigate incidents independently. Execute containment and remediation actions using defined runbooks and playbooks. Correlate data across platforms to identify anomalies, malicious patterns and attacker behaviour. Produce detailed incident reports, RCA and More ❯
london (city of london), south east england, united kingdom
CyPro
SOC Analyst role where you’re pigeonholed into one narrow specialism. At CyPro, you’ll have the opportunity to get involved in a wide range of areas including monitoring, incidentresponse, threat intelligence, detection engineering, automation and internal security operations. You’ll play a key role in our Security Operations Centre, delivering 365-day monitoring, detection and response … As the team grows further, you’ll have the flexibility to focus more deeply on the areas that interest you most – whether that’s advanced detection engineering, threat intelligence, incidentresponse leadership or platform automation. If you’re ambitious and want to help shape something rather than simply follow a process, this is the right environment for you. … Core Responsibilities: Security Monitoring & IncidentResponse Monitor security alerts generated by Microsoft Sentinel, Microsoft Defender, Datadog and Elastic. Assess severity and impact of alerts, triage and investigate incidents independently. Execute containment and remediation actions using defined runbooks and playbooks. Correlate data across platforms to identify anomalies, malicious patterns and attacker behaviour. Produce detailed incident reports, RCA and More ❯
SOC Analyst role where you’re pigeonholed into one narrow specialism. At CyPro, you’ll have the opportunity to get involved in a wide range of areas including monitoring, incidentresponse, threat intelligence, detection engineering, automation and internal security operations. You’ll play a key role in our Security Operations Centre, delivering 365-day monitoring, detection and response … As the team grows further, you’ll have the flexibility to focus more deeply on the areas that interest you most – whether that’s advanced detection engineering, threat intelligence, incidentresponse leadership or platform automation. If you’re ambitious and want to help shape something rather than simply follow a process, this is the right environment for you. … Core Responsibilities: Security Monitoring & IncidentResponse Monitor security alerts generated by Microsoft Sentinel, Microsoft Defender, Datadog and Elastic. Assess severity and impact of alerts, triage and investigate incidents independently. Execute containment and remediation actions using defined runbooks and playbooks. Correlate data across platforms to identify anomalies, malicious patterns and attacker behaviour. Produce detailed incident reports, RCA and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Rise Technical Recruitment Limited
Senior Cyber IncidentResponse InvestigatorFully UK RemoteDV Clearance or eligibility essential£80,000 + OT and On-Call earning £100,000+ Excellent opportunity for a candidate with IncidentResponse experience, DV Clearance or the ability to obtain it, and extensive experience with cyber forensic tools to join a business offering an entirely remote working position, the … key stakeholders within your client. This is a highly autonomous environment and you'll even set your own hours of work.The ideal candidate will have good experience within Cyber Response and have a wide range of experience with different cyber forensic tools. Candidates must be happy to travel to customer sites a few times a year, must be eligible … a wide and varied client base, remote working opportunities, and the chance to make a real difference to businesses across the UK and Europe! The Role: *Senior-Level Cyber IncidentResponse Investigator*Fully Remote*Helping businesses deal with real-time cyber-attacks remotely*Occasionally travelling to customer sites*£80,000 base + OT and On-all bumping total More ❯
milton keynes, south east england, united kingdom Hybrid / WFH Options
MIB
strategic and hands-on Security Operations Manager to fortify our defences, drive compliance, and lead proactive risk mitigation across the organisation. You’ll oversee Security Operations and Engineering, manage incidentresponse, and collaborate with IT, legal, and compliance teams to embed a culture of security awareness. If you're passionate about protecting assets and reputation while leading with … and implementation of strategic security plans to enhance MIB’s security posture and resilience Operational Resilience Identify within Security Operations and support the business on our Operational Resilience efforts IncidentResponse Management : Lead and coordinate from a Security perspective incidentresponse efforts, ensuring timely and effective resolution of security incidents Budget Management The Security Operations Manager … Engineering teams. This includes the ability to mentor and guide team members, fostering a collaborative and high-performance environment Experience in budget management and control Extensive experience in security incidentresponse leadership. This includes coordinating and managing incidentresponse efforts, ensuring timely and effective resolution of security incidents. Relevant advanced security qualifications such as CISSP, GIAC. More ❯
A global IT MSP is looking for an experienced SOC IncidentResponse & Threat Hunting Manager to join its expanding Security Operations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and IncidentResponse Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and … a forward-thinking approach to cybersecurity. The successful candidate will lead advanced incidentresponse activities, mentor a high-performing team, and shape the strategic direction of cyber defence capabilities across a diverse customer base. On offer Salary - Competitive depending upon experience Company Bonus Scheme Comprehensive Benefits Pack 10% Company Pension £6k Vehicle allowance Excellent skill up and career … progression Flexible working from Day 1 Plus more Skills & Experience Proven experience leading incidentresponse and threat hunting teams within a SOC or similar environment. Deep technical expertise in Digital Forensics and IncidentResponse (DFIR), with strong analytical and problem-solving skills. Skilled at translating complex technical findings into clear, actionable insights for technical and non More ❯
A global IT MSP is looking for an experienced SOC IncidentResponse & Threat Hunting Manager to join its expanding Security Operations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and IncidentResponse Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and … a forward-thinking approach to cybersecurity. The successful candidate will lead advanced incidentresponse activities, mentor a high-performing team, and shape the strategic direction of cyber defence capabilities across a diverse customer base. On offer Salary - Competitive depending upon experience Company Bonus Scheme Comprehensive Benefits Pack 10% Company Pension £6k Vehicle allowance Excellent skill up and career … progression Flexible working from Day 1 Plus more Skills & Experience Proven experience leading incidentresponse and threat hunting teams within a SOC or similar environment. Deep technical expertise in Digital Forensics and IncidentResponse (DFIR), with strong analytical and problem-solving skills. Skilled at translating complex technical findings into clear, actionable insights for technical and non More ❯
A global IT MSP is looking for an experienced SOC IncidentResponse & Threat Hunting Manager to join its expanding Security Operations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and IncidentResponse Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and … a forward-thinking approach to cybersecurity. The successful candidate will lead advanced incidentresponse activities, mentor a high-performing team, and shape the strategic direction of cyber defence capabilities across a diverse customer base. On offer Salary - Competitive depending upon experience Company Bonus Scheme Comprehensive Benefits Pack 10% Company Pension £6k Vehicle allowance Excellent skill up and career … progression Flexible working from Day 1 Plus more Skills & Experience Proven experience leading incidentresponse and threat hunting teams within a SOC or similar environment. Deep technical expertise in Digital Forensics and IncidentResponse (DFIR), with strong analytical and problem-solving skills. Skilled at translating complex technical findings into clear, actionable insights for technical and non More ❯
A global IT MSP is looking for an experienced SOC IncidentResponse & Threat Hunting Manager to join its expanding Security Operations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and IncidentResponse Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and … a forward-thinking approach to cybersecurity. The successful candidate will lead advanced incidentresponse activities, mentor a high-performing team, and shape the strategic direction of cyber defence capabilities across a diverse customer base. On offer Salary - Competitive depending upon experience Company Bonus Scheme Comprehensive Benefits Pack 10% Company Pension £6k Vehicle allowance Excellent skill up and career … progression Flexible working from Day 1 Plus more Skills & Experience Proven experience leading incidentresponse and threat hunting teams within a SOC or similar environment. Deep technical expertise in Digital Forensics and IncidentResponse (DFIR), with strong analytical and problem-solving skills. Skilled at translating complex technical findings into clear, actionable insights for technical and non More ❯
Head of IT Security Incident and Threat Management Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and Threat Management, you will shape and lead the organization s global response to cyber threats … ensuring they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threat intelligence and incidentresponse strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC) to ensure … proactive defence and rapid response to incidents. Key Responsibilities Develop and execute incidentresponse and threat management strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed More ❯
Birmingham, Chelmsley Wood, West Midlands (County), United Kingdom
SSR General & Management
Head of IT Security Incident and Threat Management Package to £117k DOE + 15% Bonus + Benefits Based Birmingham This is an exciting opportunity to take a strategic leadership role at the forefront of cybersecurity. As Head of IT Security Incident and Threat Management, you will shape and lead the organization’s global response to cyber threats … ensuring they stay one step ahead of emerging risks. You will have the scope to define and deliver a world-class threat intelligence and incidentresponse strategy, working with innovative cutting-edge tools, partners, and experts. The successful candidate will lead and develop a talented in-house team, while managing the external Security Operations Centre (SOC) to ensure … proactive defence and rapid response to incidents. Key Responsibilities Develop and execute incidentresponse and threat management strategies. Lead investigations, resolution, and post-incident analysis of security incidents. Oversee and mentor a team of three direct reports, ensuring their growth and performance. Conduct security audits and vulnerability assessments to strengthen defences. Collaborate across departments to embed More ❯
Senior Detection & Response Engineer Cambridgeshire Based - 1-2 days a week on site We are looking for a highly experienced Senior Detection & Response Engineer to join our client's growing security team. In this critical role, you'll be instrumental in developing a best-in-class incidentresponse function, leading investigations into complex security events, and … building scalable detection and response capabilities across the organisation. This is an exciting opportunity to work at the heart of a modern security operation - building the tools, automation, and processes that enable the business to detect, respond to, and learn from security threats effectively. What You'll Be Doing: Investigate and respond to security events with clarity and precision … triage, analyse, and manage incidents from end to end Develop and improve detection and response processes, technologies, and work flows Design and implement tools to collect and analyse security telemetry from cloud environments Automate security workflows to enhance detection accuracy and reduce response time Build and fine-tune detection rules to focus efforts on high-fidelity alerts Create More ❯
Investigator - Cyber IncidentResponse Location Flexible (UK) Please Note: Due to the nature of client work you will be undertaking, you will need to be willing to go through a Security Clearance process as part of this role, which requires 5+ years UK address history at the point of application. Accenture is a leading global professional services company … of our global team, you'll be working with cutting-edge technologies and will have the opportunity to develop a wide range of new skills. At Accenture, our global IncidentResponse team takes on some of the hardest and most meaningful challenges in cyber security. When major organisations are breached, when ransomware hits the headlines, when espionage or … problems under pressure, thrive on collaboration, and want to work with the best in the industry. Who We Are We’re a globally distributed team of nearly 200 dedicated incident responders, forensics specialists, and crisis managers spread across more than 25 countries. Every day, we work across time zones, cultures, and languages to protect clients that range from household More ❯
strategic and hands-on Security Operations Manager to fortify our defences, drive compliance, and lead proactive risk mitigation across the organisation. You’ll oversee Security Operations and Engineering, manage incidentresponse, and collaborate with IT, legal, and compliance teams to embed a culture of security awareness. If you're passionate about protecting assets and reputation while leading with … development and implementation of strategic security plans to enhance MIB’s security posture and resilienceOperational Resilience Identify within Security Operations and support the business on our Operational Resilience effortsIncident Response Management: Lead and coordinate from a Security perspective incidentresponse efforts, ensuring timely and effective resolution of security incidentsBudget Management The Security Operations Manager will play a … and Security Engineering teams. This includes the ability to mentor and guide team members, fostering a collaborative and high-performance environmentExperience in budget management and controlExtensive experience in security incidentresponse leadership. This includes coordinating and managing incidentresponse efforts, ensuring timely and effective resolution of security incidents.Relevant advanced security qualifications such as CISSP, GIAC. Vendor More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
role, you will: Act as the primary escalation point for complex IT and cybersecurity incidents. Manage and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incidentresponse platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior … and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment with best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. Lead and coordinate incidentresponse efforts, including root cause analysis, threat containment and post-incident reporting for clients. Collaborate with the Project and Service Desk teams to embed security into deployments … upgrades, and automation workflows, ensuring systems remain secure by design. Maintain and improve Standard Operating Procedures (SOPs) for security operations, ensuring knowledge is shared across the team for rapid incident handling. Provide mentorship and cybersecurity guidance to junior engineers and Service Desk staff, fostering a culture of security awareness and proactive threat management. Perform ongoing threat intelligence monitoring and More ❯
Job Title: SOC IncidentResponse & Threat Hunting Manager Location: Warrington, UK (Travel may be required) Flexible Working: "Work Your Way" available from day one Im working with a gold-standard IT Managed Service Provider renowned for delivering secure, enterprise-grade solutions across cloud, infrastructure, and cyber domains. Theyre expanding their Security Operations Centre and hiring a hands-on … SOC IncidentResponse & Threat Hunting Manager to lead Tier 3 analysts and drive proactive defence strategies. This is a strategic and technical leadership role, ideal for someone with deep DFIR expertise, strong mentoring capabilities, and a passion for threat hunting and CTI development. Key Responsibilities: Lead and coordinate high-severity incidentresponse engagements Provide technical oversight More ❯
london, south east england, united kingdom Hybrid / WFH Options
Tesco
Senior Incident Responder (DFIR) 🚨 Location: Hybrid (UK-based) Job Type: Full-time Salary: Competitive + up to 20% annual bonus Are you a seasoned DFIR professional with a passion for digital forensics and incidentresponse? Do you thrive in high-pressure environments and want to make a real impact in protecting one of the UK’s largest … retailers? If so, Tesco Technology wants you on our team. We’re looking for a Senior Incident Responder to join our cutting-edge Digital Forensics and IncidentResponse (DFIR) team. You’ll play a pivotal role in investigating and responding to complex security threats across our global estate, working alongside our security operations, threat intelligence, and engineering … teams. What You’ll Be Doing 🕵️ Lead Investigations : Conduct host, network, and cloud-based forensic analysis to uncover the full scope of security incidents. 🛡️ Incident Handling : Support incident managers with root cause analysis and recommend detection and prevention strategies. ⚙️ Drive Innovation : Improve and automate DFIR workflows, collaborating across teams to enhance our security capabilities. 🔍 Threat Hunting : Lead intelligence More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Tesco
Senior Incident Responder (DFIR) 🚨 Location: Hybrid (UK-based) Job Type: Full-time Salary: Competitive + up to 20% annual bonus Are you a seasoned DFIR professional with a passion for digital forensics and incidentresponse? Do you thrive in high-pressure environments and want to make a real impact in protecting one of the UK’s largest … retailers? If so, Tesco Technology wants you on our team. We’re looking for a Senior Incident Responder to join our cutting-edge Digital Forensics and IncidentResponse (DFIR) team. You’ll play a pivotal role in investigating and responding to complex security threats across our global estate, working alongside our security operations, threat intelligence, and engineering … teams. What You’ll Be Doing 🕵️ Lead Investigations : Conduct host, network, and cloud-based forensic analysis to uncover the full scope of security incidents. 🛡️ Incident Handling : Support incident managers with root cause analysis and recommend detection and prevention strategies. ⚙️ Drive Innovation : Improve and automate DFIR workflows, collaborating across teams to enhance our security capabilities. 🔍 Threat Hunting : Lead intelligence More ❯