Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
you can flex to meet your needs and training and development opportunities. What you will be doing: Monitor, triage, and investigate security incidents on critical client infrastructure. In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities. Provide Incident Response support. Maintain, improve and develop team knowledge of SOC tools, security operations … triage. Prepare reports for managed clients to both technical and non-technical audiences and continuously improve their content and presentation. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. What you will bring : Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations. Knowledge and experience with Mitre Att … ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusion detection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
sectors. The position involves driving operational improvements, working onsite, leading, and mentoring a small team. Responsibilities: Monitoring, triaging, and investigating alerts across host and network security systems Performing deep analysis of traffic, logs, and system events to identify threats and vulnerabilities Providing mentoring and line management to SOC Analysts Enhancing team knowledge across SOC tooling, detection methodologies, and threat … environment Qualified at SOC Level 2 Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MITRE ATT&CK Framework for detection and threat analysis Experience of static malwareanalysis and reverse engineering (desirable) Scripting or programming with Python, Perl, Bash, PowerShell or C++ (desirable but not essential) SIEM technologies knowledge such More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
investigations, identifying root causes, impacts, and remediation. Collaborate with IT, Privacy, Legal, and senior stakeholders; report incident statuses. Conduct post-incident reviews for continuous improvement. Perform digital forensics and malware analysis. Contribute to developing cyber defence metrics and KPIs. Stay updated on cyber threats and technologies. Maintain relationships with external stakeholders such as law enforcement and cybersecurity vendors. Key … Needed: Managing serious cyber incidents as a digital forensic incident responder. Working successfully in large, complex environments. Understanding security monitoring, intrusion detection, and prevention systems. Technical expertise in networks, malwareanalysis, and digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a rapidly growing testing, inspection, and certification company with over 9,000 employees across More ❯
to reduce risk, determine root cause, impact, and remediation actions. Collaborate with IT, Privacy, Legal teams, and senior stakeholders. Prepare and present incident reports. Conduct post-incident reviews and analysis for continuous improvement. Perform digital forensics on computer/network artifacts and malware analysis. Work with the Senior Manager Incident Response to develop cyber defence metrics and KPIs. … serious Cyber Incidents as a Digital Forensic Incident Responder. Operating successfully within large, federated enterprise environments. Understanding security monitoring, intrusion detection, prevention, and control systems. Technical expertise in networks, malwareanalysis, digital forensics, etc. Effective communication with senior stakeholders. Company Overview: Element is a global testing, inspection, and certification company with over 9,000 employees across 30 countries. More ❯