a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our IncidentResponse team and looking for a IncidentResponse Analyst to join us in tackling some of the most challenging cybersecurity threats. … a critical role in reducing the impact of cyberattacks and enchanting our clients security posture to prevent future attacks. Key responsibilities include: Conducting initial incident assessments and contribute to IncidentResponse management. Participate in live IncidentResponse operations including digital forensics. Perform security assessments, threat … etc. Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incidentresponse following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain More ❯
carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global IncidentResponse Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with proven defensive methodology, we … position will require extensive and frequent travel to multiple locations and sometimes on short term notice. Reporting to the Global Head of Digital Forensics & IncidentResponse, the successful candidate will work as part of the Post Breach Remediation team and serve as the Incident Commander in all … VPNs, and group policies Liase with DFIR team and Sales to keep open communication regarding compromised client Assist DFIR team with additional workflow through incidentresponse cases Communicate effectively with clients to understand their specific needs, provide updates on remediation progress, and offer guidance on enhancing their cybersecurity More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Vanquis Bank Limited
will proactively identify, analyse, respond, and mitigate cyber threats that pose risks to Vanquis Banking Groups cybersecurity posture. This involves monitoring security events, conducting incidentresponse activities, enhancing our threat detection capabilities, and ensuring compliance with policy, standards, and regulation. Your contributions will directly impact our ability to … participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security IncidentResponse, Threat Hunting, Penetration Testing & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the … investigation and resolution of complex security incidents. Support the delivery of retrospective improvements based on incident analysis, RCAs and PIRs. Engage with third-party security partners to enhance and mature services. Maintain centralised processes across all VBG product lines, promoting synergy and efficiency. Stay updated on the latest cyber More ❯
a pivotal role at the heart of a rapidly growing mobile-first payments solution organisation, where you can truly shape and affect how the incidentresponse is delivered. You would be reporting to the Security Operations Lead (who reports to the Head of Security) and will be working … responsibilities You will be responsible for building the infrastructure of a new in-house SOC, all the way through to conducting precise and robust incidentresponse against basic and advanced threat actors. You will be responsible for the automation workflow design and use case development. You will work … on the SIEM detection content development and false positive reduction. You will be in charge of robust and detailed incidentresponse to threats, investigation, and triage of day-to-day security events. Key requirements Experience in deploying security related IaC projects at scale. Familiarity with SOAR and optimisation More ❯
Conduct regular security risk assessments and support mitigation planning. Manage supply chain security, including vendor risk assessments and responses to customer due diligence. 3. IncidentResponse Policy & Preparedness Develop and maintain cybersecurity incidentresponse policies and playbooks. Work with regional IT teams to ensure incidentresponse processes are well understood and consistently applied. Promote awareness and preparedness through guidance and documentation. 4. Security Operations & Third-Party Oversight Collaborate with the Security Operations Centre (SOC) to enhance operational security practices. Manage relationships with third-party security providers, ensuring coverage of regional threats and vulnerabilities. More ❯
carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global IncidentResponse Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with proven defensive methodology, we … position will require extensive and frequent travel to multiple locations and sometimes on short term notice. Reporting to the Global Head of Digital Forensics & IncidentResponse, the successful candidate will work as part of the Post Breach Remediation team and serve as the Incident Commander in all … through mitigation and remediation Liase with DFIR team and Sales to keep open communication regarding compromised client Assist DFIR team with additional workflow through incidentresponse cases Monitor network incidents using network monitoring tools and other systems to maintain 99.9% uptime of our network Monitor and take ownership More ❯
carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global IncidentResponse Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with proven defensive methodology, we … security teams, customer operation teams as well as breach coach legal teams. This role with be reporting to the Global Head of Digital Forensics & IncidentResponse, the successful candidate will work as part of the Post Breach Remediation team and will collaborate closely with other cross-functional teams … identification of root cause and issue resolution or escalation Identify and escalate priority issues that need immediate attention Meet or exceed customer expectations on response quality, timeliness of responses and overall customer experience Serve as internal and external point of contact on customer escalations and ensure customer issues are More ❯
Gloucester, Gloucestershire, UK Hybrid / WFH Options
FluidOne
continuously monitoring, evaluating, and improving clients overall security posture. The successful applicant will have a strong background in security operations, excellent customer service skills, incidentresponse, and threat hunting, as well as experience in managing and mentoring junior team members. You should also have experience in providing exceptional … Investigate, mitigate and remediate with the assistance of our SOC team as part of our cyber helpdesk function. Conduct log analysis during event and incident investigations. Assist in the IncidentResponse process internally and in communication with the customer. Produce high-quality alert, incident, and threat More ❯
aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incidentresponse efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with partners in infrastructure … such as AZ-500/AZ-700/AZ -305. Background in computer networking. Experience with a scripting language for task automation. Previous incidentresponse participation. Previous experience working as a security or infrastructure engineer in a cloud environment. Enjoy our comprehensive benefits package designed to meet More ❯
in place, this is a relatively greenfield SOC buildout, where you will work alongside the SOC Manager to shape their SOC monitoring, detection and response function. Key Responsibilities: Act as a lead and technical escalation point on the most complex incidents and investigations. Work closely with Security Engineering team … to recommend system tuning/configuration improvements. Mentor and train junior team members through complex incidentresponse investigations. Key Requirements: Significant experience working in a SOC environment, dealing with and responding to escalated and most high profile incidents. Comprehensive knowledge of the Microsoft Security stack – Defender, Sentinel, etc … Knowledge of various IncidentResponse techniques and procedures. Experience working in hybrid-cloud SOC environments – Azure/AWS preferably. If you’re an experienced SOC Analyst, looking to shape how one of the most innovative Mobile Payments FinTech firms build out their cyber defence capability and leave a More ❯
Proactively identifying and resolving performance bottlenecks and infrastructure issues Automating infrastructure provisioning, configuration management, and deployments Implementing effective logging, monitoring, and alerting strategies Managing incidentresponse and post-mortem processes to improve system resilience Implementing high-availability and fault-tolerant solutions Working with DevOps engineers to streamline CI … cloud architectural decisions Continuously improving infrastructure reliability and operational efficiency WHAT ARE WE LOOKING FOR IN A CANDIDATE? Experience with SRE principles, such as incident management, error budgets, and service-level objectives (SLOs) Experience designing and implementing robust observability, monitoring and logging solutions Strong proficiency with observability and monitoring … cloud-native applications in production environments Proficiency in capacity planning and performance optimization Experience in managing and improving CI/CD pipelines Knowledge of incidentresponse best practices and on-call operations WHAT IS LIFE LIKE AT SMARTSEARCH? We are a multi-award winning Tech company with an More ❯
manage system health. Skills and Strengths: AWS (Amazon Web Services) Auto Scaling Fargate Route53 Observability tools (New Relic, DataDog, Splunk) Containerization (Docker, Kubernetes, Fargate) IncidentResponse IaC (Terraform, CloudFormation, Helm, CDK) Scripting (Ansible, Bash, Python, GO) CI/CD Primary Job Responsibilities: Design and support EC2/ECS … solutions to improve scalability and efficiency. Implement security best practices across AWS environments, ensuring compliance with industry standards and safeguarding cloud infrastructure. Develop automated incidentresponse mechanisms and self-healing solutions to minimize downtime and enhance fault tolerance. Diagnose and resolve infrastructure, networking, and application-related performance issues More ❯
Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity with SIEM tools, vulnerability scanning, and incidentresponse . Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications Relevant certifications such as OSCP, CEH, CISSP, CISM More ❯
based clients, this role also requires eligibility to obtain SC Clearance. Roles & Responsibilities Create, maintain, and optimise Logic Apps and Sentinel playbooks to automate incident detection and response workflows in Microsoft Sentinel. Develop and implement API integrations between Microsoft Sentinel and other systems to enhance data collection, cross … as expected, identifying opportunities for further improvements. Skills & Experience Hands-on experience with Microsoft Sentinel: proven track record in developing playbooks, automation workflows, and incidentresponse processes within Microsoft Sentinel. Experience in building and maintaining workflows with Azure Logic Apps to automate processes. Strong experience in API development More ❯
ecosystem. You are passionate about leveraging Microsoft security technologies to protect critical assets and data, with a focus on proactive monitoring, threat detection, and incident response. Your hands-on expertise with Microsoft Defender solutions and Azure-based security tools will be crucial in maintaining a secure and resilient IT … Group Policy (GPO) to secure endpoints, user accounts, and cloud applications. Monitor security alerts and incidents through Microsoft Sentinel, conducting thorough investigations and leading response efforts to mitigate risks. Perform proactive threat hunting using data from Defender, Sentinel, and Entra logs to detect potential security incidents. Optimise and maintain … threat detection rules, automation playbooks, and alert tuning within Sentinel and Defender solutions to reduce false positives and enhance response efficiency. Manage access control policies and identity protection configurations to secure user authentication and reduce the risk of account compromise. Regularly assess the security posture of Microsoft 365 and More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Motability Operations
and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. Communication comes naturally More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. Communication comes naturally More ❯
Employment Type: Permanent, Part Time, Work From Home
demand for their services, due to their unique partnership led approach. They provide the following comprehensive suite of services: Services Managed eXtended Detection and Response (MXDR) Complete vCISO Service and Acumen Advisory Services Cyber Threat Intelligence (CTI) Service Enhanced Managed Security Suite IncidentResponse Service Security Posture … though not all are mandatory Develop detection logic and custom security rules within SIEM platforms (e.g., Elastic Security, Splunk, Sentinel) Security Orchestration, Automation, and Response (SOAR) platforms and tools such as Palo Alto Cortex XSOAR, Tines, Splunk Phantom, or similar Automation scripting and programming, particularly with Python Relevant professional More ❯
in as many of these technologies/areas as possible is highly desirable: Security Frameworks (NIST, CIS etc.) PAM Tools and Technologies AWS Security IncidentResponse Endpoint Security (including mobile devices, Windows and Linux) Excellent communication skills and the ability to explain security concepts to management and other More ❯
Cheltenham, Gloucestershire, UK Hybrid / WFH Options
Careers at MI5, SIS and GCHQ
Cyber Security/Security Operations Centre Analyst Evidence of experience working in at least one of the following fields: malware analysis, intrusion detection and incidentresponse Evidence of experience of line management; OR of tasking of, or delegation to, team members. These criteria will be assessed at CV More ❯
the technical implementation of ISO27001 and Cyber Essentials+ (CE+) Manage and enhance the Security Operations Center (SOC) , with one analyst reporting to you Oversee incidentresponse , manage security incidents from detection to resolution Work closely with the compliance manager on vulnerability management Architect secure solutions, validate baseline configurations More ❯
risk with quantifiable results. We’re comprised of top talent from private industry, government, intelligence, and law enforcement who are specialists in threat detection, incidentresponse, digital forensics, offensive security, risk management, and cyber resilience. As a subsidiary of specialty insurance giant, Beazley Insurance, we’ve been at … the forefront of cyber insurance management and breach response activities for business clients in the US, UK, and Europe since 2017. As Beazley Security, the company will have an expanded scope, leveraging nearly two decades of cyber incident experience, a strong services division, and a business strategy focused More ❯
on vulnerability management and remediation planning. Provide input on secure design and architecture of new systems and solutions. Monitor and enhance security tooling and incidentresponse processes. Drive awareness and education initiatives across the organisation to foster a security-first culture. Represent the InfoSec function in meetings, deputising More ❯
applications, and technologies.* Keeping up to date with the latest cybersecurity threats, trends, and technologies, and proactively recommend improvements to our security posture.* Supporting incidentresponse efforts, including investigation, containment, and recovery, and provide guidance to junior security team members.* Assisting in the development and delivery of cybersecurity More ❯
Behaviour Analytics (EUBA) and Insider Risk Management processes and tools. Proven experience in analysing and responding to DLP alerts and incidents , collaborating with the IncidentResponse team for remediation. Strong knowledge of data classification methodologies and associated compliance frameworks. An understanding of security DLP best practices and frameworks More ❯