nation state threat actors and intrusions on a daily basis. We have a vacancy for a Digital Forensics & Incident Response Specialist. The successful candidate would be expected to conduct forensicanalysis of Windows, Linux and macOS systems, analyse log files such as firewall, proxy and DNS logs, lead incident response investigations, threat research and malware-based investigations. Members … threat research. Responsibilities Assist with the investigation of cyber-attacks against our customers as part of the global Incident Response team. Development of tradecraft in investigating complex attacks. Conduct forensicanalysis of Windows, Linux and macOS systems. Perform analysis of log files such as firewall, proxy and DNS logs. Assessment of tools, techniques, and procedures of different … actors ranging from hacktivist and criminal to state-sponsored groups. Requirements Some experience investigating and responding to cyber intrusions. Some e xperience using forensic tools such as EnCase, Velociraptor, Timesketch and Cellebrite UFED. Awareness of EDR tools such as Crowd Strike, SentinelOne, Microsoft Defender for Endpoint or Tanium. Self-starter with ability to identify problems early and develop solutions More ❯
Stevenage, Hertfordshire, South East, United Kingdom Hybrid/Remote Options
MBDA
an experienced Analyst with a passion for Incident response and Threat mitigation. Essentials: Lead digital forensics and incident response (DFIR) activities, ensuring lab readiness, artefact management, and delivery of forensic objectives. Maintain and enhance forensic tools and environments (e.g., Magnet Axiom, Autopsy) to ensure operational capability. Conduct detailed forensicanalysis, malware reverse engineering, and cyber investigation … preservation, and evidence handling processes. Maintain accurate digital forensics documentation, incident playbooks, and readiness rehearsal materials. Lead and execute tabletop exercises (TTEx) to test and improve incident response and forensic readiness. Perform network and endpoint investigations, including AV scans, incident remediation, and validation of security alerts. Collaborate with IM/DEx and Security Operations to enhance incident reporting, alerting … Support SOC operations with investigation, alert triage, and implementation of lessons learned from adversarial validation and DFIR activities. Research and evaluate emerging security tools, technologies, and methodologies; provide gap analysis and recommendations to influence investment. Deliver metrics, dashboards, and reports demonstrating adversarial resilience and capability maturity. Contribute to small-to-medium cyber projects enhancing threat detection, emulation, and response More ❯
a robust Cyber Security roadmap Handle varied and complex security challenges, from system reviews to high-level risk assessments Work closely with third-party suppliers in relation to audits, forensicanalysis and pen testing Requirements: Experience with ISO 27001 is essential Strong background in cyber security management Proven experience in identifying and mitigating security risks# Ability to make More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid/Remote Options
Corriculo Ltd
potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensicanalysis to determine the root cause and recommend remediation actions. Outside of this, you will be an enthusiastic individual with a passion for all things security and will More ❯
the legacy solution, with supporting documentation and recommendations for future improvements. Analyze and document the existing legacy system. Rebuild and optimize data pipelines in Microsoft Fabric using PySpark. Conduct forensicanalysis of data transformations and dependencies. Collaborate with data architects, engineers, and analysts. Troubleshoot data quality and integration issues. Provide recommendations for future modularization and scalability. More ❯
the legacy solution, with supporting documentation and recommendations for future improvements. Analyze and document the existing legacy system. Rebuild and optimize data pipelines in Microsoft Fabric using PySpark. Conduct forensicanalysis of data transformations and dependencies. Collaborate with data architects, engineers, and analysts. Troubleshoot data quality and integration issues. Provide recommendations for future modularization and scalability. More ❯