chesterfield, midlands, United Kingdom Hybrid / WFH Options
LT Harper - Cybersecurity Recruitment
Digital Forensics & IncidentResponse Consultant Our client, a globally recognised consultancy with one of the most established and high-performing Cyber IncidentResponse teams in the UK, is looking to hire new incidentresponse talent. As one of only 9 accredited Tier 1 responders … industries, work on some of the most significant incidents in the UK, and benefit from top-tier training and certifications. Key Responsibilities of an IncidentResponse Consultant: Lead and coordinate response efforts for high-impact cyber incidents Conduct forensic analysis of compromised systems, memory dumps, and network … data. Provide clients with actionable insights on emerging threats and attacker tactics. Collaborate directly with stakeholders during response and recovery engagements. Support pre-sales efforts by contributing to bids, proposals, and client pitches. Key requirements of an IncidentResponse Consultant: Proven hands-on experience managing and investigating More ❯
a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our IncidentResponse team and looking for a IncidentResponse Analyst to join us in tackling some of the most challenging cybersecurity threats. … a critical role in reducing the impact of cyberattacks and enchanting our clients security posture to prevent future attacks. Key responsibilities include: Conducting initial incident assessments and contribute to IncidentResponse management. Participate in live IncidentResponse operations including digital forensics. Perform security assessments, threat … etc. Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incidentresponse following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
Job Title: Senior Cyber Security Incident Responder Role: A leading Managed Security Service Provider is expanding its team and is hiring a Senior Incident Responder. This is a dedicated incidentresponse position focused on managing high-impact cases and directly supporting clients experiencing cyber breaches. This … is an opportunity to take full ownership of incidentresponse engagements, work directly with customers under pressure, and shape a growing IR function within a well-established MSSP. If you’ve led major incidents and want to step into a visible, high-trust role, this is it. Responsibilities … Lead end-to-end incidentresponse investigations and containment efforts Communicate directly with clients during live cyber incidents, offering reassurance and expert guidance Produce detailed incident reports with root cause analysis and actionable recommendations Perform forensic and log analysis using SIEM, EDR, SOAR, and other security tools More ❯
carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global IncidentResponse Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with proven defensive methodology, we … position will require extensive and frequent travel to multiple locations and sometimes on short term notice. Reporting to the Global Head of Digital Forensics & IncidentResponse, the successful candidate will work as part of the Post Breach Remediation team and serve as the Incident Commander in all … VPNs, and group policies Liase with DFIR team and Sales to keep open communication regarding compromised client Assist DFIR team with additional workflow through incidentresponse cases Communicate effectively with clients to understand their specific needs, provide updates on remediation progress, and offer guidance on enhancing their cybersecurity More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Lawrence Harvey
a pivotal role at the heart of a rapidly growing mobile-first payments solution organisation, where you can truly shape and affect how the incidentresponse is delivered. You would be reporting to the Security Operations Lead (who reports to the Head of Security) and will be working … responsibilities You will be responsible for building the infrastructure of a new in-house SOC, all the way through to conducting precise and robust incidentresponse against basic and advanced threat actors. You will be responsible for the automation workflow design and use case development. You will work … on the SIEM detection content development and false positive reduction. You will be in charge of robust and detailed incidentresponse to threats, investigation, and triage of day-to-day security events. Key requirements Experience in deploying security related IaC projects at scale. Familiarity with SOAR and optimisation More ❯
s carefully selected team of experts are capable of solving complex cybersecurity challenges – keeping data secure and businesses running as usual. CyberClan’s Global IncidentResponse Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with Proven defensive methodology. Our … in insurance law and claims handling. This role supports the CERT team with reviewing insurance policies, assisting with claims assessments, and contributing to breach response efforts. Ideal for someone with early in-house or private practice experience who’s ready to grow into a broader commercial legal role. This … role will provide review, assessment, advise and expertise in the management of the claims process to support CyberClan’s delivery of IncidentResponse projects, including analysis of claims and providing recommendation for resolution of those claims. We are seeking an experienced claims professional to join our team and More ❯
carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global IncidentResponse Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with proven defensive methodology, we … position will require extensive and frequent travel to multiple locations and sometimes on short term notice. Reporting to the Global Head of Digital Forensics & IncidentResponse, the successful candidate will work as part of the Post Breach Remediation team and serve as the Incident Commander in all … through mitigation and remediation Liase with DFIR team and Sales to keep open communication regarding compromised client Assist DFIR team with additional workflow through incidentresponse cases Monitor network incidents using network monitoring tools and other systems to maintain 99.9% uptime of our network Monitor and take ownership More ❯
carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global IncidentResponse Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with proven defensive methodology, we … security teams, customer operation teams as well as breach coach legal teams. This role with be reporting to the Global Head of Digital Forensics & IncidentResponse, the successful candidate will work as part of the Post Breach Remediation team and will collaborate closely with other cross-functional teams … identification of root cause and issue resolution or escalation Identify and escalate priority issues that need immediate attention Meet or exceed customer expectations on response quality, timeliness of responses and overall customer experience Serve as internal and external point of contact on customer escalations and ensure customer issues are More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Accelerant
aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incidentresponse efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with partners in infrastructure … such as AZ-500/AZ-700/AZ -305. Background in computer networking. Experience with a scripting language for task automation. Previous incidentresponse participation. Previous experience working as a security or infrastructure engineer in a cloud environment. Enjoy our comprehensive benefits package designed to meet More ❯
aligned with global business risk/objectives. This role is focused on technical operations and support of various information security tools including event/incident management (SIEM), cloud security, endpoint detection and response, email security, and vulnerability management. This position will be responsible for supporting the Director IT … cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security operations, legal, compliance, incidentresponse teams, etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information …/IP, Storage devices, network devices, fail-safe strategies, system architecture, LAN and WAN and intranet/internet security environments including firewalls, intrusion detection, incidentresponse, vulnerability testing, operating system hardening, regulatory compliance, and data classification. Experience in IAM, SEIM, Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Lawrence Harvey
in place, this is a relatively greenfield SOC buildout, where you will work alongside the SOC Manager to shape their SOC monitoring, detection and response function. Key Responsibilities: Act as a lead and technical escalation point on the most complex incidents and investigations. Work closely with Security Engineering team … to recommend system tuning/configuration improvements. Mentor and train junior team members through complex incidentresponse investigations. Key Requirements: Significant experience working in a SOC environment, dealing with and responding to escalated and most high profile incidents. Comprehensive knowledge of the Microsoft Security stack – Defender, Sentinel, etc … Knowledge of various IncidentResponse techniques and procedures. Experience working in hybrid-cloud SOC environments – Azure/AWS preferably. If you’re an experienced SOC Analyst, looking to shape how one of the most innovative Mobile Payments FinTech firms build out their cyber defence capability and leave a More ❯
The scope of work includes replacing the existing Trend Micro infrastructure and rolling out CrowdStrike across all server environments to enhance threat detection and response capabilities. Job Title: Security Consultant Job Type: 3 month Contract Contract: Outside I35 Location: Remote Responsibilities: Collaborate with delivery teams and the client to … develop SOC playbooks supporting both SIEM and SOC operations. Design and implement SOAR workflows to automate incidentresponse processes. Configure correlation searches and alerting mechanisms, optimising rules to minimise false positives. Serve as the Subject Matter Expert (SME) for SIEM deployment, supporting data ingestion from sources such as … AWS and Qualys. Assist in the integration of SIEM alerts with Jira, enabling streamlined alert tracking and incident management. Define and configure alert severity levels within SIEM, SOAR, and Jira to align with established Service Level Agreements (SLAs). Build and customise dashboards to support real-time reporting and More ❯
manage system health. Skills and Strengths: AWS (Amazon Web Services) Auto Scaling Fargate Route53 Observability tools (New Relic, DataDog, Splunk) Containerization (Docker, Kubernetes, Fargate) IncidentResponse IaC (Terraform, CloudFormation, Helm, CDK) Scripting (Ansible, Bash, Python, GO) CI/CD Primary Job Responsibilities: Design and support EC2/ECS … solutions to improve scalability and efficiency. Implement security best practices across AWS environments, ensuring compliance with industry standards and safeguarding cloud infrastructure. Develop automated incidentresponse mechanisms and self-healing solutions to minimize downtime and enhance fault tolerance. Diagnose and resolve infrastructure, networking, and application-related performance issues More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incidentresponse plan, including incident detection, response, investigation, and resolution, to minimise the impact of security incidents. What you'll need to More ❯
will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incidentresponse plan, including incident detection, response, investigation, and resolution, to minimise the impact of security incidents. What you'll need to More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Intec Select
infrastructure. Role & Responsibilities: Monitor networks and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incidentresponse support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Hays
ongoing career development and training. As one of our Cyber Security Operations Engineers, you will be responsible for:- Conducting security investigations and leading security incident responses, driving incident resolution Monitoring security systems and infrastructure to support the best performance and reliability Implementing and managing security tools and processes … skills, then LETS TALK! Expertise in an operational Security Operations Centre Previous experience as a Cyber Security Operations Engineer Hands-on experience in an incidentresponse role utilising CrowdStrike Experience developing and delivering on incident and program status Familiar with threat hunting, leveraging intelligence data to proactively More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Dynamic Search Solutions
based clients, this role also requires eligibility to obtain SC Clearance. Roles & Responsibilities Create, maintain, and optimise Logic Apps and Sentinel playbooks to automate incident detection and response workflows in Microsoft Sentinel. Develop and implement API integrations between Microsoft Sentinel and other systems to enhance data collection, cross … as expected, identifying opportunities for further improvements. Skills & Experience Hands-on experience with Microsoft Sentinel: proven track record in developing playbooks, automation workflows, and incidentresponse processes within Microsoft Sentinel. Experience in building and maintaining workflows with Azure Logic Apps to automate processes. Strong experience in API development More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Beazley Security
risk with quantifiable results. We’re comprised of top talent from private industry, government, intelligence, and law enforcement who are specialists in threat detection, incidentresponse, digital forensics, offensive security, risk management, and cyber resilience. As a subsidiary of specialty insurance giant, Beazley Insurance, we’ve been at … the forefront of cyber insurance management and breach response activities for business clients in the US, UK, and Europe since 2017. As Beazley Security, the company will have an expanded scope, leveraging nearly two decades of cyber incident experience, a strong services division, and a business strategy focused More ❯
maintain standard operating procedures and protocols. Collaborate closely with the Cyber Defence team to uphold enterprise defence practices, guidelines, and procedures. Provide support for incidentresponse efforts as needed. Assist with operational and management reporting produced by the team. Skills/Qualifications A highly self-motivated individual with More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Cloud Decisions
development, including KQL, analytics rules, and custom data connectors Scripting and engineering skills – Python, PowerShell, APIs, Function Apps A background in cyber threat detection, incidentresponse or DFIR is a real plus Comfortable working in very fast-moving, customer facing delivery environments The Technical Shizzle: Microsoft Sentinel (KQL More ❯
maintain the Company’s competitive edge. Guiding the creation and maintenance of advanced tools and scripts for real-time detection, threat analysis, and rapid incident response. Championing the adoption of cutting-edge security standards and practices, ensuring our mobile platforms meet both internal and industry regulatory requirements. By applying More ❯
maintain the Company’s competitive edge. Guiding the creation and maintenance of advanced tools and scripts for real-time detection, threat analysis, and rapid incident response. Championing the adoption of cutting-edge security standards and practices, ensuring our mobile platforms meet both internal and industry regulatory requirements. By applying More ❯
Experience 2+ years of experience in business development, sales, or lead generation within the cyber security sector. Strong understanding of penetration testing, red teaming, incidentresponse, and cyber maturity assessments. Excellent communication skills, with the ability to simplify complex technical concepts and convey their business value to prospects. More ❯
chesterfield, midlands, United Kingdom Hybrid / WFH Options
Durlston Partners
Collaborate with developers and traders to optimise infrastructure, troubleshoot issues, and deploy production-ready tooling Write automation and internal tools for deployment, monitoring, and incidentresponse Tune performance across OS, network, and cloud layers — this role is hands-on and detail-oriented Improve system resilience, observability, and security More ❯