for both technical and non-technical stakeholders. Technical Skills: Experience in incident response and investigation using tools like SIEM, SOAR, and EDR platforms. Proficiency in digital forensics and log analysis across Networking, Windows, Mac, Linux, or Cloud environments. Strong understanding of evidence collection and prioritisation procedures. In-depth knowledge of NIST 800-61 incident response lifecycle, including containment, eradication … digital forensics, including evidence acquisition and chain-of-custody practices. Familiarity with frameworks such as MITRE ATTACK, Lockheed Martin Kill Chain, or the Diamond Model. Ability to perform dynamic malware analysis. Knowledge of open-source IR tools such as Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-ELK, or DFIR-IRIS is preferred. Desirable Qualifications: Industry certifications such as ECIH … disruption. Strong communication skills with the ability to stay calm and effective under pressure. Able to align client deliverables with industry best practices. Skilled in proactive threat intelligence and analysis to support IR operations. Proactive, responsible, and eager to contribute to the growth of the Incident Response team. While this role is advertised as remote, it will require occasional More ❯
learn more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with … Requirements: Minimum of two years' experience in a SOC or managed security environment. Strong knowledge of network security (firewalls, IDS/IPS, VPNs). Proficiency in incident response, threat analysis, and vulnerability management. Experience working with SIEM tools for monitoring and event analysis. Understanding of malwareanalysis, forensic investigations, and endpoint security. Strong analytical and problem-solving More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
Privacy and Legal and senior stakeholders. Prepare and present written and verbal incident status reports to ensure the business is kept up to date Conduct post-incident reviews and analysis to identify areas for improvement and help drive continuous improvement Perform digital forensics on computer/network artefacts to assess the risk and impact of an incident. Perform malwareanalysis Work closely with the Senior Manager Incident Response to Input into the development of cyber defence metrics and Key Performance Indicators (KPI) Stay abreast of the latest cyber threats, attack vectors, and security technologies to continuously improve the organization's incident response capabilities Develop and maintain strong relationships with external stakeholders, such as law enforcement agencies, cybersecurity … environment. Demonstrable understanding of security monitoring, intrusion detection, prevention and control systems including firewalls, anti-virus, web proxies. Technical knowledge and practical experience in any associated area e.g., networks, malwareanalysis, digital forensics etc. Attention to detail, strong analytical skills and efficient problem solving. Cultural sensitivity and social flexibility in a global corporate environment. Experience and confidence in More ❯
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malwareanalysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malwareanalysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
East London, London, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malwareanalysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
London, England, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malwareanalysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malwareanalysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malwareanalysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Central London / West End, London, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
with hands-on SOC experience . Proficiency in threat-hunting methodologies and investigative techniques. Experience with SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malwareanalysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
investigations, determine root causes, and recommend remediation. Collaborate with IT, Privacy, Legal teams, and stakeholders; prepare incident reports. Conduct post-incident reviews for continuous improvement. Perform digital forensics and malware analysis. Develop cyber defence metrics and KPIs with the Incident Response team. Stay updated on cyber threats and technologies. Build relationships with external stakeholders for information sharing and response … serious cyber incidents as a Digital Forensic Incident Responder. Working within large, complex enterprise environments. Understanding of security monitoring, intrusion detection, prevention, and control systems. Technical expertise in networks, malwareanalysis, and digital forensics. Strong analytical and communication skills. Company Overview: Element is a leading testing, inspection, and certification company with over 9,000 employees across 30 countries. More ❯
comprehensive reports for clients. Technical skills: Demonstrated experience in responding to and investigating incidents whilst utilizing various monitoring, detection and investigation tooling – SIEM, SOAR, EDR etc. Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication … tabletop exercises, and IR planning. Should have an understanding of Technical Frameworks such as MITRE Attack, Lockheed Martin kill chain or Diamond model. Should be able to perform dynamic malware analysis. Qualifications: Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have Knowledge of open-source IR tools, such as Velociraptor, Eric Zimmerman Tools, Chainsaw … skills, with the ability to manage and coordinate various incidents whilst remaining calm under pressure. Ability to align client deliverables with industry best practices. Experience in threat intelligence and analysis to support proactive IR. Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth. While this role is advertised as remote, it will More ❯
London, England, United Kingdom Hybrid / WFH Options
Cybereason
MDR) and Managed Extended Detection and Response (MXDR) services to large organisations around the globe. You’ll be working closely with some of the best minds in incident response, malwareanalysis, and security research, partnering with our customers and partners to defend against the most advanced adversaries. We value our people and empower them to work remotely. As … such as Product, Customer Success, etc.) What We Are Looking For: Previous experience in a CIRT/SOC environment. 1+ years of experience is an advantage. General familiarity with malware and its techniques (e.g., code injection, fileless execution, maintaining persistence) Familiarity with static and behavioral malwareanalysis methods and tools (e.g., sandbox environments) Background and experience in … at least two of the following is an advantage: Endpoint security, malwareanalysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics Familiarity with common operating system concepts (e.g., processes, threads, DLLs, parent-child process relationships, scheduled tasks) Solid foundation in networking protocols and architectures Experience with a scripting language (Python, Bash, PowerShell, etc.) Self-motivated More ❯
Digital Forensics and Incident Response (DFIR) investigations across diverse environments, including crisis support outside normal hours. Present technical findings clearly to both technical and non-technical audiences. Perform forensic analysis on images, logs, and malware samples (static and dynamic analysis). Develop targeted threat hunts tailored to client industries. Document procedures, findings, and improve internal methodologies. Provide … We’re Looking For: 1+ years of DFIR experience. Proven understanding of the incident response lifecycle and attacker TTPs. Strong forensic investigation skills with experience in chain of custody, malwareanalysis, and investigation protocols. Excellent analytical, communication, and interpersonal skills. Ability to work independently, remotely, and collaboratively across teams. Technical Skills: Experience with EDR tools: SentinelOne, Crowdstrike, Microsoft More ❯
monitoring and response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malwareanalysis, forensics, security operations, incident response, detection and hunting, and emergent security intelligence. We don't expect you to be an expert in all of the domains mentioned … security incidents. - Proficiency with a programming or scripting language. PREFERRED QUALIFICATIONS - 5+ years experience working in incident response, security operations, security automation tooling, hunting, or threat intelligence. - Familiarity with malwareanalysis, forensics, SOAR, SIEM platforms, or detection engineering and hunting. Demonstrable subject matter expertise in any of these domains a plus. - Proficiency across a variety of Operating Systems More ❯
London, England, United Kingdom Hybrid / WFH Options
Triskele Labs
Digital Forensics and Incident Response (DFIR) investigations across diverse environments, including crisis support outside normal hours Present technical findings clearly to both technical and non-technical audiences Perform forensic analysis on images, logs, and malware samples (static and dynamic analysis) Develop targeted threat hunts tailored to client industries Document procedures, findings, and improve internal methodologies Provide expert … We're Looking For: 1+ years of DFIR experience Proven understanding of the incident response lifecycle and attacker TTPs Strong forensic investigation skills with experience in chain of custody, malwareanalysis, and investigation protocols Excellent analytical, communication, and interpersonal skills Ability to work independently, remotely, and collaboratively across teams Technical Skills: Experience with EDR tools: SentinelOne, Crowdstrike, Microsoft More ❯
monitoring and response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malwareanalysis, forensics, security operations, incident response, and emergent security intelligence. We don’t expect you to be an expert in all of the domains mentioned above, but we … response response, security automation tooling, threat intelligence, or forensics. - Experience with Amazon Web Services. - Experience in Security Incident Response and proficiency in at least one of the following domains: MalwareAnalysis/Reverse Engineering; Digital Forensics; Security Tool Development & Automation; Programming/Scripting; Network & OS Security; Identity Management Amazon is an equal opportunities employer. We believe passionately that More ❯
hacking, or red teaming. Proven track record of identifying and exploiting critical vulnerabilities. Experience with web application security (OWASP Top 10, API security, etc.). Hands-on experience with malwareanalysis and forensic tools is a plus. Certifications (Preferred) : OSCP (Offensive Security Certified Professional) OSCE (Offensive Security Certified Expert) CEH (Certified Ethical Hacker) GPEN (GIAC Penetration Tester) CISSP More ❯
memory structures on Windows, MacOS and Linux. Coding/scripting experience in one or more general purpose languages. Experience with attacker tactics, techniques, and procedures. Preferred Qualifications Background in malwareanalysis, digital forensics, intrusion detection, and/or threat intelligence. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigate suspicious behavior across networks More ❯
London, England, United Kingdom Hybrid / WFH Options
Anthropic
like EDR, SIEM, SOAR. Strong Candidates May Also Have Experience With Security operations in Kubernetes environments. Proficiency in Python and SQL. Analyzing attack behaviors and prototyping detections. Threat intelligence, malwareanalysis, infrastructure as code, or forensics. Experience in high-growth startups. Additional Details Application deadline: Rolling review. Salary range: £240,000 - £325,000 GBP annually. Education: Bachelor’s More ❯
to cyber security incident. Experience with security tools, such as IDS/IPS, vulnerability scanners, AV, web and email filtering, webapp firewalls and DDoS protections, host-based protections and malwareanalysis engines, Pen testing and offensive security tooling. Familiarity with common enterprise technologies e.g. Microsoft, Linux, VMWare, Citrix Solid understanding of computer networking concepts and standards , including Network More ❯
scale Kubernetes environments. A high level of proficiency in Python and query languages such as SQL. Experience analyzing attack behavior and prototyping high-quality detections. Experience with threat intelligence, malwareanalysis, infrastructure as code, detection engineering, or forensics. Experience contributing to a high growth startup environment. Deadline to apply: None. Applications will be reviewed on a rolling basis. More ❯
What You’ll Be Working On: ️ Responding to and managing security incidents, including malware outbreaks, data breaches, and cyberattacks ️ Conducting incident investigations, performing forensics, and determining the root cause of security incidents ️ Coordinating with internal teams to ensure swift containment, remediation, and recovery of affected systems ️ Documenting incident details and maintaining thorough incident response records for future analysis … with a solid understanding of attack vectors and methodologies ️ Strong knowledge of forensic tools, SIEM systems, and incident management platforms (e.g., Splunk, Palo Alto Networks, Carbon Black) ️ Experience with malwareanalysis, log analysis, and vulnerability assessments ️ Ability to remain calm under pressure and communicate effectively in high-stress situations ️ Certifications such as CISSP, CISM, or GIAC Certified More ❯
alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malwareanalysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to incident response playbooks. Security Risk Management and Compliance … alerts to relevant stakeholders, helping assess potential impacts on organizational assets. Monitor security alerts identified by SOC and CSIRT, participate in investigations, and assist in incident response activities including malwareanalysis and threat hunting. Collaborate with the CERT team in maintaining an up-to-date threat landscape and contributing to incident response playbooks. Security Risk Management and Compliance More ❯