determine root causes, and recommend remediation. Collaborate with IT, Privacy, Legal teams, and senior stakeholders; report incident statuses. Conduct post-incident reviews for continuous improvement. Perform digital forensics and malwareanalysis on artefacts. Contribute to cyber defence metrics and KPIs. Stay updated on cyber threats and technologies. Develop relationships with external agencies and vendors for information sharing. Key … Incidents as a Digital Forensic Incident Responder. Working successfully in large, complex enterprise environments. Understanding security monitoring, intrusion detection, firewalls, anti-virus, and web proxies. Technical expertise in networks, malwareanalysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a rapidly growing testing, inspection, and certification company with over 9,000 employees across 270 sites More ❯
London, England, United Kingdom Hybrid / WFH Options
BP p.l.c
methods Strong problem-solving skills Sound technical knowledge of security as applied to IT Networks, systems, and applications Good understanding of security fundamentals including network and host forensics, log analysis and basic malwareanalysis Strong technical analysis ability Understand the basics of email routing Understanding of core enterprise technologies such as Active directory, Windows OS, MAC … technical knowledge of security as applied to IT Networks, systems, and applications Strong collaborator management skills Essential Criteria: Good understanding of security fundamentals including network and host forensics, log analysis and basic malwareanalysis Strong technical analysis ability Understand the basics of email routing Understanding of core enterprise technologies such as Active directory, Windows OS, MAC … working Skills: Automation system digital security, Client Counseling, Conformance review, Digital Forensics, Incident management, incident investigation and response, Information Assurance, Information Security, Information security behaviour change, Intrusion detection and analysis, Legal and regulatory environment and compliance, Risk Management, Secure development, Security administration, Security architecture, Security evaluation and functionality testing, Solution Architecture, Stakeholder Management, Supplier security management, Technical specialism Legal More ❯
and security measures. Accountabilities: Monitor security alerts and logs to detect potential security incidents. Conduct initial triage and assessment of incidents to determine severity and impact. Conduct in-depth analysis of security incidents to determine root cause, scope, and extent of compromise. Analyze malware samples, network traffic, and system logs to identify indicators of compromise (IOCs) and attack … Analyze threat intelligence feeds and reports to identify emerging threats and vulnerabilities. Correlate threat intelligence with security events and incidents to enhance detection and response capabilities. Document incident findings, analysis, and response actions in incident reports and case management systems. Prepare and present post-incident reports to management, stakeholders, and regulatory authorities. Coordinate incident response activities with internal teams … Handler (GCIH) Certified Information Security Manager (CISM) Offensive Security Certified Professional (OSCP) CompTIA Cybersecurity Analyst (CySA+) Experience: Several years of experience in cybersecurity, with a focus on incident detection, analysis, and response. Experience working in a CIRT or SOC environment, preferably in a senior role. Demonstrated expertise in conducting digital forensic investigations and malware analysis. Strong understanding of More ❯
London, England, United Kingdom Hybrid / WFH Options
AVEVA Denmark
Investigating, and hunting potential attacks and security risks on AVEVA networks and systems using various platform dashboards and threat feeds. Manage and supervise Cyber Security Response Analyst team on analysis of security events as detected by various security controls, monitoring, and recording security events in daily, weekly, monthly, and quarterly reports. Manage and supervise Cyber Security Response Analyst team … on analysis of escalated security events, notifications, and alerts from managed Security Operation Centre (SOC). Manage and supervise Digital Forensic Responder on incident triage process through the examination and analysis of digital evidence and artifacts. Manage and supervise Digital Forensic Responder on e-discovery and forensic processes to include identification, collection, preservation, and processing of relevant incident … data. Manage and supervise Digital Forensic Responder on immediate host-based and network-based forensic examinations and Malware reverse engineering on security incidents to determine the root cause and to reconstruct a timeline of events to facilitate incident response and recovery. Manage and supervise Digital Forensic Responder on performing malwareanalysis and reverse engineering as directed in More ❯
operations key risk indicators and will be able to identify data points required to measure them. This role will suit a SOC Analyst with a strong technology background, advanced malwareanalysis, reverse engineering skills, and complex forensic investigations experience. The ideal candidate will be a Senior SOC Analyst within another Banking organisation. Minorities, women, LGBTQ+ candidates, and individuals More ❯
operations key risk indicators and will be able to identify data points required to measure them. This role will suit a SOC Analyst with a strong technology background, advanced malwareanalysis, reverse engineering skills, and complex forensic investigations experience. The ideal candidate will be a Senior SOC Analyst within another Banking organisation. Minorities, women, LGBTQ+ candidates, and individuals More ❯
operations key risk indicators and will be able to identify data points required to measure them. This role will suit a SOC Analyst with a strong technology background, advanced malwareanalysis, reverse engineering skills, and complex forensic investigations experience. The ideal candidate will be a Senior SOC Analyst within another Banking organisation. Minorities, women, LGBTQ+ candidates, and individuals More ❯
in establishing cyber operations key risk indicators and identifying data points required to measure them. This role is suitable for a SOC Analyst with a strong technology background, advanced malwareanalysis, reverse engineering skills, and experience in complex forensic investigations. The ideal candidate will be a Senior SOC Analyst currently working within a Banking organization. Minorities, women, + More ❯
london (city of london), south east england, united kingdom
Bangura Solutions
operations key risk indicators and will be able to identify data points required to measure them. This role will suit a SOC Analyst with a strong technology background, advanced malwareanalysis, reverse engineering skills, and complex forensic investigations experience. The ideal candidate will be a Senior SOC Analyst within another Banking organisation. Minorities, women, LGBTQ+ candidates, and individuals More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
London, England, United Kingdom Hybrid / WFH Options
Huntress Labs Incorporated
growth. The Huntress Security Operations Center is an elite team of individuals who wake up every day to combat threat actors. You will have daily opportunities to progress your analysis skills while being at the forefront of what’s happening in the wild. If you’re looking to accelerate your career and skills, this is the team for you … tactical review of EDR telemetry, log sources, and forensic artifacts to determine the root cause of attacks where possible and provide remediations needed to remove the threat Perform tactical malwareanalysis as part of investigating and triaging alerts Investigate suspicious Microsoft M365 activity and provide remediations Assist in escalations from the Product Support team for threat-related and … Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs) Demonstrated experience with static and dynamic malwareanalysis concepts Working knowledge of Windows Administration or Enterprise Domain Administration Active Directory, Group Policy, Domain Trusts, etc. Working knowledge of core networking concepts Common ports/protocols More ❯
in establishing cyber operations key risk indicators and identifying data points required to measure them. This role is suitable for a SOC Analyst with a strong technical background, advanced malwareanalysis, reverse engineering skills, and complex forensic investigation experience. The ideal candidate will be a Senior SOC Analyst currently working within a Banking organization. Minorities, women, LGBTQ+ candidates More ❯
determine root causes, and recommend remediation. Collaborate with IT, Privacy, Legal teams, and senior stakeholders. Provide incident reports. Conduct post-incident reviews for continuous improvement. Perform digital forensics and malware analysis. Contribute to developing cyber defence metrics and KPIs. Stay updated on cyber threats and technologies. Maintain relationships with external stakeholders for information sharing. Key Skills: At least five … serious cyber incidents as a digital forensic responder. Proven success in large, complex enterprise environments. Understanding of security monitoring, intrusion detection, firewalls, antivirus, web proxies. Technical expertise in networks, malwareanalysis, digital forensics. Effective communication with senior stakeholders. Company Overview: Element is a rapidly growing testing, inspection, and certification company with over 9,000 employees across 270 sites More ❯
operations key risk indicators and will be able to identify data points required to measure them. This role will suit a SOC Analyst with a strong technology background, advanced malwareanalysis, reverse engineering skills, and complex forensic investigations experience. The ideal candidate will be a Senior SOC Analyst within another Banking organisation. Minorities, women, LGBTQ+ candidates, and individuals More ❯
for both technical and non-technical stakeholders. Technical Skills: Experience in incident response and investigation using tools like SIEM, SOAR, and EDR platforms. Proficiency in digital forensics and log analysis across Networking, Windows, Mac, Linux, or Cloud environments. Strong understanding of evidence collection and prioritisation procedures. In-depth knowledge of NIST 800-61 incident response lifecycle, including containment, eradication … digital forensics, including evidence acquisition and chain-of-custody practices. Familiarity with frameworks such as MITRE ATTACK, Lockheed Martin Kill Chain, or the Diamond Model. Ability to perform dynamic malware analysis. Knowledge of open-source IR tools such as Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-ELK, or DFIR-IRIS is preferred. Desirable Qualifications: Industry certifications such as ECIH … disruption. Strong communication skills with the ability to stay calm and effective under pressure. Able to align client deliverables with industry best practices. Skilled in proactive threat intelligence and analysis to support IR operations. Proactive, responsible, and eager to contribute to the growth of the Incident Response team. While this role is advertised as remote, it will require occasional More ❯
investigations, determine root causes, and recommend remediation Collaborate with IT, Privacy, Legal teams, and stakeholders; report incident statuses Conduct post-incident reviews for continuous improvement Perform digital forensics and malwareanalysis Contribute to developing cyber defence metrics and KPIs Stay updated on cyber threats and technologies Develop relationships with external agencies and vendors for information sharing Key Skills … Experience Needed: Managing serious cyber incidents as a digital forensic responder Working within large, complex enterprise environments Understanding of security monitoring and intrusion detection systems Technical expertise in networks, malwareanalysis, and digital forensics Effective communication with senior stakeholders Company Overview: Element is a global testing, inspection, and certification company with over 9,000 employees worldwide. We aim More ❯
learn more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with … Have: Minimum of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malwareanalysis, forensic investigations, and endpoint security. Strong analytical and problem-solving More ❯
learn more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with … Requirements: Minimum of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malwareanalysis, forensic investigations, and endpoint security. Strong analytical and problem-solving More ❯
causes, impacts, and remediation steps. Collaborate with IT, Privacy, Legal teams, and senior stakeholders; prepare incident reports. Conduct post-incident reviews and continuous improvement initiatives. Perform digital forensics and malwareanalysis to assess incident impact. Contribute to developing cyber defence metrics and KPIs. Stay updated on cyber threats and security technologies. Develop relationships with external stakeholders such as … cyber incidents as a digital forensic responder. Proven success working within large, complex enterprise environments. Understanding of security monitoring tools, intrusion detection, and prevention systems. Technical expertise in networks, malwareanalysis, and digital forensics. Effective communication with senior stakeholders. Company Overview Element is a rapidly growing testing, inspection, and certification company with over 9,000 employees across More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯