university Strong technical knowledge in one or more of the following: network and application security testing, IT security governance and risk, digital forensics and incidentresponse, security architecture, deployment of security appliances such as DLP, SIEM, IDS/IPS, etc. In-depth knowledge of the security and privacy more »
payment card industry compliance services Be able to communicate to clients regarding the strategic and tactical risks of account data protection, regulatory compliance, breach response, etc. Assess payment card compliance maturity and help clients in building and implementing sustainable PCI compliance program Support organizations through assessing, developing and implementing … Business requirements definition Data inventory and information flow mapping Cybersecurity risk management Third party vendor management Interactions with consumers/individuals (data subject requests) Incident management and breach notifications Bachelor's degree in an information technology, business, or related discipline from an accredited college/university 7+ years of … in one or more of the following: network and IT infrastructure, common application and database design, IT governance and risk management, third party management, incidentresponse, knowledge of typical network and IT security components Working knowledge of key cybersecurity compliance standards and regulations, including but not limited to more »
market strategies targeting data rich organizations Be able to communicate to clients regarding the strategic and tactical risks of data protection, regulatory compliance, breach response Assess data protection and privacy maturity and help clients in building and implementing sustainable data protection program Support organizations through assessing, developing and implementing … and procedure drafting Data inventory and information flow mapping Privacy risk management Third party vendor management Interactions with consumers/individuals (data subject requests) Incident management and breach notifications Bachelor's degree in an information technology, business, or related discipline from an accredited college/university 7+ years of … in one or more of the following: network and IT infrastructure, common application and database design, IT governance and risk management, third party management, incidentresponse, knowledge of typical network and IT security components Working knowledge of key privacy regulations, including but not limited to, the GDPR, CCPA more »
Action Employer Responsible for authoring, tuning and deploying SIEM detections, Threat Hunting and automation via pyton scripting and SOAR tools. May participate in an incident management team, responding to security events in line with Oracle incidentresponse playbooks. Investigates purported intrusions and breaches, and oversees root cause … analysis. Coordinates incidents with other business units and may act as incident commander of serious incidents. Participates in developing new methods, playbooks throughout Oracle. Evaluates existing and proposed technical architectures for security risk, provides technical advice to support the design and development of secure architectures and recommends security controls … the department. Responsible for authoring, tuning and deploying SIEM detections, Threat Hunting and automation via pyton scripting and SOAR tools. May participate in an incident management team, responding to security events in line with Oracle incidentresponse playbooks. Investigates purported intrusions and breaches, and oversees root cause more »
recruiting professionals to support a range of technical roles in Digital Forensics, including Digital Forensics Examiner, Computer Forensic Analyst/Expert, and Digital Forensics IncidentResponse Analyst/Expert. All positions are in the DHS Cybersecurity Service. DHS Cybersecurity Service (DHS-CS) uses a multi-phase assessment process … configuration) to identify the TTPs (tactics, techniques and procedures) of an adversary and use discovered data to enable mitigation of potential cyber events. Communicating incident findings from a forensic investigation to appropriate stakeholders outlining recommendations to prevent and mitigate future risks and threats using cyber defense techniques. Providing key more »
DHS) is recruiting professionals to support a range of developmental roles in Digital Forensics, including Digital Forensics Examiner, Computer Forensic Analyst, and Digital Forensics IncidentResponse Analyst. All positions are in the DHS Cybersecurity Service. DHS Cybersecurity Service (DHS-CS) uses a multi-phase assessment process to qualify … configuration) to identify the TTPs (tactics, techniques and procedures) of an adversary and use discovered data to enable mitigation of potential cyber events. Communicating incident findings from a forensic investigation to appropriate stakeholders outlining recommendations to prevent and mitigate future risks and threats using cyber defense techniques. Actively providing more »
looking for: 2+ years in Pre-Sales or similar role within an MSP/Reseller organisation. Previous experience being part of or working with incidentresponse teams would be beneficial Good understanding of incidentresponse stages and handling preferred o Knowledge and/or experience using more »
through to resolution, recording all actions taken and communicating the impact of the actions to the appropriate levels of management Provide 24x7x365 support and incidentresponse Must have: A degree in Computer Science, Information Management, or a related field. Open and approachable with a strong team ethos. Self more »
in the Microsoft Stack and SIEM tools will be crucial in maintaining and enhancing our client's security posture. Key Responsibilities: Security Monitoring and IncidentResponse: Monitor and analyse security events using SIEM tools Investigate security incidents and breaches, and implement containment and remediation actions Develop and maintain … incidentresponse procedures Client Interaction and Training: Provide security training to clients on tools such as Lookpoint and Check Point Conduct regular security awareness sessions to ensure clients are up-to-date with best practices and threat landscapes Offer guidance and support to clients on implementing security measures … not required) Experience: Proven experience as a SOC Analyst or in a similar role within managed services Strong experience with SIEM tools and security incident management Proficiency with the Microsoft Stack, including Azure, M365, and Defender Experience with technologies outside SIEM, such as Palo Alto, Fortinet or Check Point more »
Sunderland, Tyne and Wear, Tyne & Wear, United Kingdom Hybrid / WFH Options
Sellick Partnership
and providing training sessions to 1st, 2nd and 3rd line support teams. Maintaining and developing documentation for system configurations, procedures and processes. Lead on incidentresponse efforts to resolve system outages, minimising downtime and dealing with functionality failures. Regular system maintenance activities such as updates, configuration changes and more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threat detection, incidentresponse, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management tools, and more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
with remote working flexibility. Job Title: Lead Security Analyst Job Type: Permanent Location: London, UK(Remote) Job details: Purpose of the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment … and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating … manage security incidents by analyzing alerts from diverse sources and collaborating with external monitors to identify and address potential threats. Serve as a primary incident responder, leading the containment and resolution process in line with established protocols to reduce risks. Enhance security procedures to improve the organization's monitoring more »
policies and audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity planner managed through BDO's Azure DevOps environment. Oversee incidentresponse, threat detection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK and SIEM more »
include, but are not limited to: Design, develop, and maintain Python-based integrations and automation solutions within Google Chronicle, enhancing threat intelligence, detection, and incidentresponse capabilities. Lead the strategic integration of Google Chronicle within Fortrea's cybersecurity infrastructure, optimizing its utility for security analytics and operations. Direct … applications in threat intelligence, with knowledge of how to conduct analyses within SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) platforms. Strong foundation in cybersecurity principles, practices, and technologies, including data management specific to cybersecurity applications. Relevant certifications such as CISSP, GCIH, or Google more »
Hi All, I'm working with a global business looking for an IncidentResponse Lead who has a wide breath of experience working proactively on incidents and confident in collaborating with teams across the business. You will be a fit if you have experience with: Developing playbooks/ more »
Cambridge, Cambridgeshire, East Anglia, United Kingdom
Guarding UK
to identify vulnerabilities and implement mitigation strategies. Regulatory Compliance: Stay abreast of security trends, technological advancements, and regulatory changes to continuously enhance security measures. IncidentResponse: Incident Management: Promptly respond to security incidents, ensuring de-escalation and safety for all involved. Investigations: Conduct thorough investigations, gather evidence … accurate records and prepare detailed reports for management review and regulatory compliance. Training and Development: Ongoing Education: Provide continuous training on security procedures, emergency response tactics, and conflict resolution techniques. Drills & Simulations: Conduct regular drills to assess readiness and reinforce best practices for various security scenarios. Professionalism: Foster a … Cybersecurity Operations Manager, Information Security Operations Manager, IT Security Operations Manager, Network Security Operations Manager, Security Control Center Manager, Security Monitoring Manager, and Security IncidentResponse Manager. REF more »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Reed Technology
strategic goals, and drive implementation. End-to-End DLP Management: Managing all aspects of DLP within a business, including policy creation, deployment, monitoring, and incident response. Data Leakage Considerations: Awareness of potential ways data can leak out of an organisation External Data Sharing: Knowledge of secure methods for sharing more »
that Attack Analysis requirements are represented in the architecture, design and implementation of cloud environments. You'll help design, write and automate detection and incidentresponse processes and tools for public and private cloud environments. Working in cybersecurity takes passion for technology, speed, a desire to learn, and … strengthen our data. As a member of the Attack Analysis team, you will fit into a Global team providing 24/7 monitoring and IncidentResponse , acting as the frontline for attacks against the firms' infrastructure. As a Detection Engineer, your role will include advanced analysis, threat hunting … as a technical escalation point and coaching the team through adopting monitoring responsibility. Key areas of focus include: Public/Private Cloud Engineering and IncidentResponse,Detection Engineering, Threat Modelling.Hands-on experience withat least 1 cloud platform (AWS, Azure, GCP) is required. Primary Qualifications Min. 6 years of more »
Global Head of Technical Cyber IncidentResponse We are seeking passionate people to grow the Cyber Security team within WTW and provide an excellent service and trusted expertise to all parts of our business. As part of a business wide transformation, we have an exciting opening for a … new role of Global Head of Technical Cyber IncidentResponse . As part of the Cyber Defence and Security Operations department, you will be a senior leader managing the ICS IncidentResponse service ensuring WTW can contain and eradicate cyber-attacks from our environment. You will … and a solid business acumen to deal with other senior stakeholders across the business. This role would suit those with an extensive history in IncidentResponse for global enterprise organisations or have led MSSP services and are used to working in a high-pressure environment and managing geographically more »
Introduction As a Principal IncidentResponse Consultant at IBM X-Force IncidentResponse, you will be responsible for managing and coordinating major cyber incidents across our clients’ enterprise environments. During a major cyber incident, Principal IR Consultants are responsible to ensure all relevant stakeholders are … kept informed, engagement objectives are met or exceeded, and coordinate and lead junior consultants in the response effort. A Principal IncidentResponse Consultant can communicate effectively with client executives, technical teams, counsel and other stakeholders to deliver excellence in responding to and resolving incidents. You are expected … network exploitation, covering tracks). Knowledge of cloud service models (e.g., IaaS, PaaS and SaaS) and how those models can limit digital forensics and incident response. Knowledge of malware analysis concepts and methodologies. Knowledge of adversarial tactics, techniques, and procedures. Knowledge of system and application security threats and vulnerabilities more »
strengthening our commitment to leave the world better than we found it. Description Apple is seeking a security professional to join its Information Security Response Organization, as part of the Threat Analysis and IncidentResponse function. A successful candidate will possess a proven technical background, relevant Information … Security experience with a strong focus in the IncidentResponse lifecycle.You will work with a global team of security professionals on a follow-the-sun model with a primary focus on the identification, containment, and mitigation of security incidents. This role is an integral part of the security … will have the opportunity to work on technology and processes with global reach. Minimum Qualifications Extensive experience in Information Security with a focus on IncidentResponse, Security Engineering, and/or Intrusion Detection Proficient understanding of incidentresponse automation strategies, with demonstrated ability to implement them more »
This is a Senior Consultant role with responsibility for managing and delivering Control Risks cyber response threat hunting solutions. This involves managing our threat hunting engagements and where needed leading the technical aspects of cyber response cases. This role will report to the Associate Director of Cyber Response … enhance our Threat Hunting Standard Operating Procedures ensuring they reflect client requirements and align with our Cyber Threat Intelligence team Work with our Cyber Response Technology and Automation lead to implement the tooling required to effectively threat hunt Implement a quality assurance program to ensure threat hunting engagements proactively … attack techniques, to form hunting playbooks and mitigation steps. Work closely with our Cyber Threat Intelligence team and share threat hunting playbooks with the incidentresponse team. Incidentresponse Overseeing host and network based investigations. Leveraging the Digital Forensics IncidentResponse (DFIR) team to more »
We are looking for a Vice President, Solution Engineering, Cyber Risk to advise our clients and prospective clients on Managed Detection and Response (MDR) services. In this role you will partner with our Sales and IncidentResponse teams to introduce, position and architect technical solutions to address … our clients detection and response needs. You will act as a trusted advisor and technical subject matter expert on Managed Detection and Response, which will include sound working knowledge of Endpoint Detection and Response (EDR), Security Incident and Event Management (SIEM), and Network Detection and Response … the development of sales materials and documentation, and assist with sales-enablement for both internal and partner sales teams Support internal marketing, product, and incidentresponse engagement managers with messaging and communication about Kroll s MDR services Engage with key technology and channel partners to represent Kroll s more »
and services. Monitoring and Alerting: Implement and maintain robust monitoring, alerting, and logging systems to proactively identify and resolve issues. Ensure optimal system performance. IncidentResponse: Lead incidentresponse efforts, investigate root causes of outages, and implement preventive measures to reduce the likelihood of recurrence. Capacity … Continuous Improvement: Continuously evaluate and improve system reliability, performance, and efficiency through automation and optimisation. Documentation: Maintain comprehensive documentation for infrastructure configurations, procedures, and incident reports. Requirements Bachelor's or Master's degree in Computer Science, Information Technology, or a related field. Proven experience as a Site Reliability Engineer more »