party monitoring tools to detect issues, perform root cause analysis, and implement remediation actions promptly. Develop comprehensive documentation, runbooks, and playbooks outlining procedures for incidentresponse, troubleshooting, and system maintenance. Qualifications: Bachelor's degree in Computer Science, Engineering, or related field (or equivalent experience). Strong experience with more »
and documentation to support secure DevOps practices. Monitor security metrics and logs to detect and respond to security incidents. Lead and participate in security incidentresponse activities, including root cause analysis and remediation efforts. To be considered for this role, you should have: Must have hands on experience more »
Executive will be supporting the development and enforcement of data protection policies, providing assistance with compliance efforts, handling data subject requests, and contributing to incidentresponse and risk mitigation activities. The Data Protection Executive plays a vital role in helping the organization maintain trust with stakeholders and protect more »
dynamic code analysis, security scanning, investigation of security reports from InfoSec, our bug bounty program, or other trusted partners, and direct work with our incidentresponse team on product security issues and incidents. This role has wide-reaching impact, strong autonomy, and the resources and empowerment to make more »
and threat malware analysis for the organization. Offering security insights and maintaining relationships with the Service Management function concerning change management, problem management, and incident management. Handling level 2/3 operational cyber incident response. Promptly escalating any detected incidents and anomalies within the organization, providing expert guidance … as necessary. Participating in a shared, rotational 24/7 on-call requirement, acting as the single point of contact for all security-related response actions and decisions, Skills: Proficiency and experience in firewalls, intrusion detection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, switches more »
code, perform threat modelling and security testing of applications, run SAST, DAST, SCA and secret scanning tools, manage the bug bounty program and lead incidentresponse for software bugs. Please apply if you're looking to take your career to the next level, happy to run you through more »
engineering expertise including strong proficiency in Python, Go or other languages. Consulting experience related to helping others gains platform engineering and software engineering skills. Incidentresponse skills including platform and application problem diagnosis and resolution. Experience with Terraform, Concourse. Experience with monitoring systems such as Datadog, Splunk and more »
Experience automating platform operations including deployment, upgrading, provisioning (onboarding) and maintenance activities. Software engineering expertise including strong proficiency in Python, Go or other languages. Incidentresponse skills including platform and application problem diagnosis/resolution. Experience with Terraform, Concourse. Experience with monitoring systems such as Datadog, Splunk and more »
previously built user - facing privacy and security capabilities knows how to ensure the integrity and protection of data , i.e. encryption , access controls , threat detection , incidentresponse, GDPR, etc has worked on large corporate accounts , and is confident with the longer-lifecycle enterprise selling process is excited by the more »
service for all environmental legal matters. Their expertise spans strategic and operational compliance advice, responsible investment and environmental governance, climate change planning and adaptation, incidentresponse and regulatory investigations, enforcement and prosecution support, transactional support including deal structure and due diligence, major infrastructure projects, green claims and sustainable more »
Role : Head of Incident Management & Service Operations Location : West London – hybrid Salary : £110,000 – 125,000 + car allowance + bonus + benefits We have a great opportunity with one of our FTSE100 clients looking for a Head of Head of Incident Management & Service Operations to join them … during an exciting period of transformation. You’ll oversee the operational aspects of IT services with a particular focus on incident management. You’ll be responsible for leading and managing the processes, teams, and technologies that ensure effective incident resolution, the delivery of high-quality IT services, and … across service operations. The role: Define the IT Operation Centre standards and patterns for managing incidents, problems, events, change and release management Ensure major incident management procedures are ready-to-deploy Lead on root cause analysis activities for major incidents Be the driver of problem resolution Provide insight into more »
that the business is able to detect and respond to modern Cyber attackers Simulate various threat attacks in order to built appropriate detection and response rules Work with the Security Engineering team to to ensure that all security tooling is calibrated appropriately for prevention and detection Act as the … SOC escalation point of contact and support in incidentresponse Devise processes for attack surface monitoring using automation where appropriate Purple Team Lead: Your background To be considered for this role, you will: Have a poacher turned game keeper mentality in regard to security Demonstrate a proven success more »
Senior IncidentResponse Analyst – Cybersecurity - Up to £80k - Hybrid - up to 35% bonus - Excellent Benefits. My client one of the world’s most renowned aviation groups in the world is searching for a Senior IncidentResponse Analyst to join their team! Skills: Able to serve as … to all levels of hierarchy, including senior leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incidentresponse, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC more »
You will work closely with cross-functional teams to design, implement, and maintain robust and resilient systems, with a focus on automation, monitoring, and incident response. The role: • Working arrangements: Flexible – can be fully remote (UK residents only – unfortunately, Visa sponsorship is not offered for this role) Key Responsibilities … and performance in mind. Implement and maintain monitoring, alerting, and logging systems to proactively identify and resolve issues before they impact customers. Participate in incidentresponse and on-call rotations, diagnosing and resolving production issues to minimize downtime and ensure service reliability. Conduct performance analysis and capacity planning more »
the businesses ability to prevent and detect modern attacks. Simulate both established and emerging attacker TTPs and personally build the respective detection rules and response procedures. Through the delivery of purple team sprints, identify opportunities to reduce the businesses attack surface using preventative controls. Work with the Security Engineering … and detection. Develop processes for attack surface monitoring and constant validation through automation. Act as an escalation point for the SOC and assist with incident response. Experience/Skills required: Previous experience emulating sophisticated cyber-attacks, likely in a purple or red team capacity. Deep understanding of modern attacker more »
Senior IncidentResponse Analyst Hybrid – Twice a week in the office (Heathrow Airport) Up to £80,000 + up to 20% bonus + Benefits ------------------------------------------------------------------------------------- Are you ready to tackle cyber threats head-on in a dynamic and high-stakes environment? Joining as a Senior IncidentResponse … on exceptional customer service and operational excellence. ------------------------------------------------------------------------------------- Skills and experience Minimum of 5 years’ experience in endpoint security, malware analysis, threat hunting, penetration testing, incidentresponse, reverse engineering, or digital forensics. Must have strong experience in the operational side. Comprehensive knowledge of AWS cloud infrastructure, including monitoring logs more »
I’m working with a boutique consultancy, who are seeking to grow to their existing cyber function with another dedicated IncidentResponse Consultant. This role is varied, offering the incumbent an opportunity to conduct incidentresponse and threat hunting engagements. Some of your responsibilities will be more »
London, England, United Kingdom Hybrid / WFH Options
Sportradar
the central point of contact during critical situations, including but not limited to technology, financial, security, privacy, and people, to ensure swift and effective response, addressing people safety issues, minimizing addressing service downtime, and restoring normal operations in alignment with predefined service level agreements (SLAs). The role requires … experts, support functions, and business units, to investigate, diagnose, resolve major incidents efficiently, and ensure regulatory requirements are considered. Root Cause Analysis: Facilitate post-incident reviews and root cause analysis (RCA) sessions to identify the underlying causes of crises and issues and implement preventive measures to avoid recurrence. Drive … continuous improvement through post-incident review reports. Documentation and reporting: Maintain accurate records of crises and major incidents, including incident details, actions taken, resolutions, and post-incident analysis findings, adhering to regulatory and compliance requirements. Monitor key performance indicators (KPIs) and metrics related to incident management more »
scope of pentests and manage the process with engineering. Once issues are identified SecOps work closely with operations and engineering teams to resolve them. Incident management. The team manage our security incidentresponse activities, investigating alerts using tools such as Azure Sentinel. SecOps will coordinate the incidentresponse with resolving teams and engage with key stakeholders for updates. As the team works office hours, engaging a managed SOC provider who cover 24/7 incident management. Beyond close daily collaboration with other security teams, SecOps engages with all teams across the business at every more »
Best Practice Working with various other Security personnel Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incidentresponse and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will … will be a requirement to cover 7am-7pm on a shift basis to ensure that full coverage is achieved. The ideal candidate will have: Incidentresponse and security monitoring Understanding of threat modelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix more »
Greater London, England, United Kingdom Hybrid / WFH Options
Trident Search
and allow them to offer the best service possible. This is a senior role, so plenty of experience within SecOps is vital, especially within incidentresponse and engaging with the wider business. This role will also see you have direct reports, so experience in a little leadership or … to further enhance capabilities Experience with malware analysis is essential as you will play a senior role in managing this process. Having ownership over incident management and ensuring incidents are closed out in a timely manner or escalated effectively. Risk analysis across multiple teams and technologies is also required … great internal security role, working with a reputable organisation and a talented team. If you have the right experience and are comfortable with your incidentresponse skills then please do go ahead and apply now. more »
Responsibilities: Develop and implement comprehensive information security strategies, policies, and procedures. Conduct risk assessments and vulnerability analyses to identify and mitigate security threats. Lead incidentresponse efforts and manage security breaches efficiently. Collaborate with cross-functional teams to ensure security measures are integrated into all business operations. Stay more »
capable of implementing secure rebuilds tailored to customer requirements.Conduct assurance assessments of Third-Party suppliers to uphold security standards.Provide expert technical support during incidents response engagements.Reviewing existing technical environment, propose and manage changes to improve IT Security.Take ownership and responsibility for accomplishing objectives across the team and department.Demonstrate steadfast … NIST, CIS Critical Controls.VMWare or Hyper-V and server integration knowledge and experience.Certified Information Systems Security Professional (CISSP) or equivalent.Exposure to ISO 27001, 9001.Any incidentResponse or rebuild after disasters experience is a plus.Knowing we’re right for youEmbracing uniqueness, the culture at Grant Thornton thrives on the more »
London, England, United Kingdom Hybrid / WFH Options
Jobleads-UK
matters. This includes drafting and implementing privacy strategies, negotiating Data Processing Agreements (DPAs), Standard Contractual Clauses (SCCs), and other privacy-related documentation with clients. IncidentResponse: You’ll assist with incident reports and reviews, ensuring compliance with relevant regulations. DORA Expertise: As part of the escalation point more »