Reading, England, United Kingdom Hybrid / WFH Options
CGI
Be part of something exciting and rewarding and join our Security Operations (SecOps) Team in The Digital Forensics and IncidentResponse Team. Your role will focus on forensics, however, there is room to grow into incidentresponse if you desire, and this will encompass the full … the other members of the SecOps team to examine, develop and review IR methodologies, tools, systems or processes that may be used within CGI. *IncidentResponse – Whilst this role is a Forensics based role, there is room to grow into incidentresponse and work with our … current incidentresponse team to handle in-depth investigations of networks and hosts, determine attack vectors, establish a timeline of activity and to identify the extend of the compromise. Required qualifications to be successful in this role • Digital Forensics • Host analysis experience with Forensics/EDR tools (enCase more »
AWS, Azure). Familiarity with regulatory compliance standards (e.g., GDPR, HIPAA). Knowledge of scripting languages (e.g., Python, Bash) for automation. Experience with security incidentresponse and forensic analysis. Benefits: Competitive salary and benefits package. Opportunities for professional growth and development. Collaborative and innovative work environment. Access to more »
potential risks. Conduct regular training sessions and awareness programs to educate stakeholders on AI/ML security best practices, policies, and procedures. Work alongside incidentresponse teams to investigate and respond to security incidents and breaches involving AI/ML systems, implementing remedial actions and preventative measures. Evaluate more »
systems and infrastructure. Investigate and mitigate newly identified cyber security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incidentresponse when necessary. Perform proactive threat hunting for emerging cyber threats. Maintain and optimize TVM tool performance and dashboards. Ensure compliance with industry more »
Reading, England, United Kingdom Hybrid / WFH Options
Henderson Scott
+ Bonus) You will be responsible for monitoring clients network and endpoints for security alerts, investigating incidents, and assisting in incident response. You will also play a vital role in maintaining and optimizing our security information and event management (SIEM) platform. While previous experience in a Managed Security Service … monitor the client's network and endpoints for security alerts, and conduct thorough investigations when incidents occur. Serve as the first-tier responder for incident analysis and investigation, escalating issues as necessary. Contribute to containment strategies during security incidents, data loss, or breaches. Assist in the design and implementation … changes. Stay updated on the latest information security trends to assess their potential impact on the client's environment. Participate in an on-call incidentresponse team on a rotational basis (fortnightly). Generate relevant reports, including end-of-day summaries, handover reports, management intelligence, and threat and more »
will be responsible for maintaining Security Operations (SecOps) solutions, controls, and processes across the organisation. You will provide proactive risk remediation, will help with incident readiness & response and will also contribute to the continuous improvement of the security environment. As Senior SOC Analyst you will bring a good … maintain SecOps documentation, policies, and procedures Maintain cybersecurity solutions across systems, applications, and infrastructure Investigate security alerts from the SIEM tool and take appropriate incidentresponse actions. Communicate with stakeholders about security incidents, detailing actions taken. Support the Cyber IncidentResponse Manager by triaging events and more »
reading, south east england, United Kingdom Hybrid / WFH Options
Project People
information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations accordingly. Be the lead in Cyber security incidentresponse and ensure processes and procedures and playbooks are efficient, effective and are tested regularly in line with policy. Develop and maintain a more »
Level - IC4 Responsible for authoring, tuning and deploying SIEM detections, Threat Hunting and automation via pyton scripting and SOAR tools. May participate in an incident management team, responding to security events in line with Oracle incidentresponse playbooks. Investigates purported intrusions and breaches, and oversees root cause … analysis. Coordinates incidents with other business units and may act as incident commander of serious incidents. Participates in developing new methods, playbooks throughout Oracle. Evaluates existing and proposed technical architectures for security risk, provides technical advice to support the design and development of secure architectures and recommends security controls more »
standards, such as the EU AI Act, NIST AI RMF, the Digital Services Act, the Digital Markets Act, GDPR and ISO 27001. Work alongside incidentresponse teams to investigate and respond to security incidents and breaches involving AI/ML systems, implementing remedial actions and preventative measures. Evaluate more »