incident response, compliance, and implementing innovative security technologies to strengthen the organisation's defenses. Essential functions of the job: SOC operations: perform incident triaging, threatdetection, and response activities. SIEM & EDR management: advance and configure SIEM and EDR systems to optimise threatdetection and response in … response: investigate and mitigate security incidents, applying root cause analysis and remediation. Security testing: conduct regular application and network security assessments to identify vulnerabilities. Threat intelligence: monitor the cybersecurity landscape for emerging threats and develop innovative defensive strategies. Development security: monitor version control systems, identify vulnerabilities, and collaborate with More ❯
member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG’s global network. You will work closely with the Security Operations … Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to strengthening our security posture and minimizing business risks associated with cyber threats. * Act as a Tier 3 Incident Responder, supporting complex investigations into cyber … security incidents. * Conduct proactive threat hunting to detect and neutralize emerging threats. * Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. * Investigate security incidents, including malware infections, phishing attacks, and unauthorized access attempts. * Develop and enhance incident response playbooks, ensuring alignment with More ❯
assessments and vulnerability assessments to identify andmitigate potential security threats. Security SolutionsImplementation: Design and implement security solutions, including identity andaccess management, data protection, and threatdetection and response. Compliance andGovernance: Ensure compliance with industry standards and regulations (e.g.,GDPR, HIPAA) and develop security policies and procedures. Incident Response More ❯
london (city of london), south east england, United Kingdom
Hays
assessments and vulnerability assessments to identify andmitigate potential security threats. Security SolutionsImplementation: Design and implement security solutions, including identity andaccess management, data protection, and threatdetection and response. Compliance andGovernance: Ensure compliance with industry standards and regulations (e.g.,GDPR, HIPAA) and develop security policies and procedures. Incident Response More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
tools such as Microsoft Defender for Cloud, Defender for Endpoint, and Nessus. Collaborate with our outsourced SOC team to enhance Sentinel SIEM, runbooks, and threat detection. Lead investigations into security incidents and conduct proactive threat hunting. Manage endpoint security, patching, vulnerability scanning, and system hardening. Support audits and More ❯