I’m working with a boutique consultancy, who are seeking to grow to their existing cyber function with another dedicated IncidentResponse Consultant. This role is varied, offering the incumbent an opportunity to conduct incidentresponse and threat hunting engagements. Some of your responsibilities will be more »
vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. Works … developing selection criteria to identify appropriate security solutions to support strategic, operational needs, and security requirements.Participate in the development and testing of the security incidentresponse plan, act as the incidentresponse leader. Develop security, risk, and compliance reports and alerts.Participate in the yearly review of … includes a minimum of 5-years experience in Information Security.Proficiency in security framework models such as NIST, etc., implementing and auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirus\antimalware, IDS more »
London, England, United Kingdom Hybrid / WFH Options
Sportradar
the central point of contact during critical situations, including but not limited to technology, financial, security, privacy, and people, to ensure swift and effective response, addressing people safety issues, minimizing addressing service downtime, and restoring normal operations in alignment with predefined service level agreements (SLAs). The role requires … experts, support functions, and business units, to investigate, diagnose, resolve major incidents efficiently, and ensure regulatory requirements are considered. Root Cause Analysis: Facilitate post-incident reviews and root cause analysis (RCA) sessions to identify the underlying causes of crises and issues and implement preventive measures to avoid recurrence. Drive … continuous improvement through post-incident review reports. Documentation and reporting: Maintain accurate records of crises and major incidents, including incident details, actions taken, resolutions, and post-incident analysis findings, adhering to regulatory and compliance requirements. Monitor key performance indicators (KPIs) and metrics related to incident management more »
scope of pentests and manage the process with engineering. Once issues are identified SecOps work closely with operations and engineering teams to resolve them. Incident management. The team manage our security incidentresponse activities, investigating alerts using tools such as Azure Sentinel. SecOps will coordinate the incidentresponse with resolving teams and engage with key stakeholders for updates. As the team works office hours, engaging a managed SOC provider who cover 24/7 incident management. Beyond close daily collaboration with other security teams, SecOps engages with all teams across the business at every more »
Greater London, England, United Kingdom Hybrid / WFH Options
Trident Search
and allow them to offer the best service possible. This is a senior role, so plenty of experience within SecOps is vital, especially within incidentresponse and engaging with the wider business. This role will also see you have direct reports, so experience in a little leadership or … to further enhance capabilities Experience with malware analysis is essential as you will play a senior role in managing this process. Having ownership over incident management and ensuring incidents are closed out in a timely manner or escalated effectively. Risk analysis across multiple teams and technologies is also required … great internal security role, working with a reputable organisation and a talented team. If you have the right experience and are comfortable with your incidentresponse skills then please do go ahead and apply now. more »
root cause analyses, and monitoring the implementation of corrective measures.Assess and contribute to the ongoing development of documentation concerning cloud security policies, procedures, and incidentresponse plans, including the delivery of management KPIs.Assist in creating and implementing security controls that align with regulatory requirements and business goals.Engage in more »
audiences, and a solid business acumen to deal with other senior stakeholders across the business.This role would suit those with an extensive history in IncidentResponse, Threat Hunting and Threat Intelligence services who are used to working in a high-pressure environment and managing geographically dispersed teams across … responsibilities will be: • Manage and develop a global team of L3 Threat Hunting, Forensic & Threat Intelligence specialists, providing expert assistance during a major cyber incident and for routine investigations escalated by the SOC.• Proactively analyse the WTW estate in a threat-led manner looking for signs of compromise, acting more »
capable of implementing secure rebuilds tailored to customer requirements.Conduct assurance assessments of Third-Party suppliers to uphold security standards.Provide expert technical support during incidents response engagements.Reviewing existing technical environment, propose and manage changes to improve IT Security.Take ownership and responsibility for accomplishing objectives across the team and department.Demonstrate steadfast … NIST, CIS Critical Controls.VMWare or Hyper-V and server integration knowledge and experience.Certified Information Systems Security Professional (CISSP) or equivalent.Exposure to ISO 27001, 9001.Any incidentResponse or rebuild after disasters experience is a plus.Knowing we’re right for youEmbracing uniqueness, the culture at Grant Thornton thrives on the more »
Responsibilities: Develop and implement comprehensive information security strategies, policies, and procedures. Conduct risk assessments and vulnerability analyses to identify and mitigate security threats. Lead incidentresponse efforts and manage security breaches efficiently. Collaborate with cross-functional teams to ensure security measures are integrated into all business operations. Stay more »
London, England, United Kingdom Hybrid / WFH Options
Client Server
the appropriate SIEM platform and then once it's embedded ensuring BAU and leading security monitoring, carrying out indepth investigations and actively participating in incident response. This is a high profile role where you'll establish Security Operations Centre procedures and processes from the ground up, collaborating with senior more »
London, England, United Kingdom Hybrid / WFH Options
Jobleads-UK
matters. This includes drafting and implementing privacy strategies, negotiating Data Processing Agreements (DPAs), Standard Contractual Clauses (SCCs), and other privacy-related documentation with clients. IncidentResponse: You’ll assist with incident reports and reviews, ensuring compliance with relevant regulations. DORA Expertise: As part of the escalation point more »
Operations, supercharges SecOps by fusing Lightspeed Security Analytics, Industry-Leading Cyberthreat Intelligence (CTI), AI-based automated threat hunting, alert orchestration, automated threat detection and incidentresponse (TDIR) blocking, community intelligence sharing, exposure management, and dark web protection. Transforming CISOs into superheroes and analysts into SOC terminators. Anomali's more »
Security Center), and services. - Familiarity with security testing methodologies like penetration testing and vulnerability assessments. - Experience with SIEM tools (Splunk, ELK, Azure Sentinel) and incidentresponse/forensics. - Knowledge of security frameworks (NIST, ISO 27001, SOC 2) and relevant certifications (CISSP, CCSP). - Proficiency in Infrastructure as Code more »
security risks. Develop and enforce security policies, standards, and guidelines. Monitor and analyse security threats, identifying and mitigating potential risks. Security Operations: Lead the incidentresponse planning and investigation processes. Oversee the implementation of security measures and regularly review their effectiveness. Collaborate with IT teams to ensure secure more »
use of management information from the following Security tools : SIEM, EDR, Vulnerability Intelligence or Behavioural Analysis.Project Management Experience (PRINCE2, AGILE etc)CompTIA Security.Understanding of incidentresponse and Cyber Kill Chain.ITIL Foundation Level (v3 or v4).Background in a customer facing environment.Demonstrable track record of maintaining strong relationships with more »
of security enhancements and work closely with the Product Managers to ensure this work is scheduled Improve and maintain secure development standards Support the incidentresponse and architecture review processes whenever application security expertise is required Manage application framework and perimeter security improvement projects Assist with the planning more »
the Infrastructure group, and their team of engineering managers and engineers.What You’ll Need:Have a passion for operations. Devops, SRE, service management, and incidentresponse should all be topics you have an interest and experience in.Want to work in a high growth, fast moving environment. Snyk is more »
technical Operations Engineer to join a fast-paced and high-growth business. Responsibilities will vary from monitoring the technical environment all the way to Incident responses and problem resolutions. The best fitted candidate will likely have the following qualities: Proficiency with FIX protocol implementation. Exposure to multiple asset classes more »
engineering expertise including strong proficiency in Python, Go or other languages. • Consulting experience related to helping others gains platform engineering and software engineering skills. • Incidentresponse skills including platform and application problem diagnosis and resolution. • Experience with Terraform, Concourse. • Experience with monitoring systems such as Datadog, Splunk and more »
An ability to balance and plan the short-term actions of the service desk function. Demonstrable experience leading a service desk environment. Experience managing incidentresponse and escalation. Experience creating processes and solutions using ITSM tools to provide appropriate governance of company procedures Experience managing relationships with senior more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
with remote working flexibility. Job Title: Lead Security Analyst Job Type: Permanent Location: London, UK(Remote) Job details: Purpose of the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment … and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating … manage security incidents by analyzing alerts from diverse sources and collaborating with external monitors to identify and address potential threats. Serve as a primary incident responder, leading the containment and resolution process in line with established protocols to reduce risks. Enhance security procedures to improve the organization's monitoring more »
existing team. You will be joining a developing team as a technical resource where you will have the opportunity to lead on projects around incidentresponse, vulnerability management, EDR scanning and more. You will work with an already wide ranging tech stack for an exciting scaling business with … exposure to Data Protection & GDPR would be highly sought after too. In this role you will: Work on a variety of technical projects across incidentresponse, vulnerability management, triaging and more Work with third parties and vendors to ensure full security coverage Provide support to the governance and more »
analysis for the group. Providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for the level 2/3 operational Cyber incident response. Escalating in a timely manner any incidents and anomalies that are … architecture level Operational On-Call Requirement This role has a shared, rotational 24/7 on-call requirement and forms part of information security incidentresponse capability. You will act as the single point of contact for all security related response actions and decisions, including management of … each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. What you'll need: Knowledge and operational experience in firewalls, intrusion detection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, switches, routers, Voice over more »
DoAssess security risks and identify initiatives to address the biggest security risks we face and take them through to delivery.Own and improve the Security Incidentresponse process.Own and improve Viator’s ability to detect and respond.Own the Risk and Compliance programs.Consult with product engineering or other engineering platform more »
London, England, United Kingdom Hybrid / WFH Options
Control Risks
to specific cyber threat incidents, data breaches and other cyber security incidents. Build knowledge of collection tools to support bespoke investigative projects and Cyber IncidentResponse engagements. Conduct research on topics which support other service lines, notably Global Risk Analysis, Compliance Forensics and Investigations, and Response. Develop knowledge more »