team has a proven track record of successfully handling a wide variety of cases, from minor incidents to major investigations. Your main duties will be handling security incidents, conducting forensic investigations and analyses, threat hunting, and performing various security specialist tasks. Additionally, you will manage security incident cases, develop processes and ways of working, and be part of our … and third party stakeholders which are joining in to the investigations. Having experience in leading people is also highly appreciated. You need to be able to analyze logs, perform forensicanalysis of disk and memory images and draft technical DFIR investigation reports in fluent English . We do not expect you to master everything, but at least half … of the following topics should be familiar: Knowledge of Windows, Linux, and macOS operating systems Cloud platforms IR and forensics (AWS, Azure, GCP, M365) Log management and analysis tools Disk- and memory forensics tools Security incident response EDR tools (example MS Security Stack) Security information and event management Modern cyber defense solutions File systems Network protocols Routers, firewalls, IDS More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
agility to operate in a fast-paced environment. Key Responsibilities: Conduct initial assessments of security incidents and contribute to incident management. Participate in live Incident Response operations, including digital forensic investigations. Perform security assessments, threat intelligence gathering, and OSINT analysis. Collaborate across departments to ensure a comprehensive approach to cybersecurity. Engage directly with clients to retrieve relevant logs and … access infrastructure for forensic analysis. Thoroughly document incidents, including timelines, affected systems, response actions, and improvement recommendations. Produce clear, detailed reports for client delivery. Technical Requirements: Hands-on experience in incident response and investigation using tools such as SIEM, SOAR, and EDR. Proficiency in analysing logs across multiple platforms (Networking, Windows, Mac, Linux, Cloud). Solid understanding of evidence … collection and handling procedures. Familiarity with the NIST 800-61 incident response lifecycle, including containment, eradication, and recovery. Experience with digital forensics, chain-of-custody procedures, and forensic tools. Awareness of incident response planning and tabletop exercises. Understanding of frameworks such as MITRE ATT&CK, the Lockheed Martin Kill Chain, or the Diamond Model. Ability to perform dynamic malware More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
OSX, and Linux operating systems operations and artifacts Experience with SIEM technologies, including Splunk, Microsoft Sentinel, or Elastic Experience with forensics tools, including Magnet Axiom and FTK Experience performing forensic imaging, remote collection, and forensicanalysis Experience with malware analysis, including static, dynamic, and reverse engineering Experience performing root cause analysis and following through with … all phases of the incident response lifecycle Top Secret clearance Bachelor's degree Additional Qualifications Experience acquiring memory from the host and performing memory analysis with tools, including Volatility Experience with Endpoint Detection and Response (EDR) tools, including CrowdStrike Falcon and FireEye HX Experience performing analysis of packet capture using tools, including Wireshark Experience with Python or PowerShell … lifecycle of cybersecurity threats, attacks, attack vectors, and methods of exploitation Knowledge of intrusion set tactics, techniques, and procedures (TTPs) ACE, EnCE, GCFE, CCI, GREM, CHFI, GCFA, or CCFP Forensic Certification GIAC Continuous Monitoring (GMON), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Intrusion Analyst (GCIA), GIAC Network Forensic Analyst (GNFA), GIAC Cloud More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & ForensicAnalysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance - Proficiency in identifying potential security … and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting - Familiarity with scripting languages (such as Python, PowerShell, or Bash More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
ANISTAR Technologies
are effectively integrated into the architecture and operation of IT systems. Collaborate with incident response teams to investigate security breaches, malware infections, and other cyber incidents. Conduct digital forensics analysis to determine the root cause of incidents and recommend remediation measures to prevent recurrence. Develop and maintain cybersecurity policies, standards, and procedures based on industry best practices and regulatory More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensicanalysis to determine the root cause and recommend remediation actions. Outside of this, you will be an enthusiastic individual with a passion for all things security and will More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensicanalysis to determine the root cause and recommend remediation actions. Outside of this, you will be an enthusiastic individual with a passion for all things security and will More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
The One Group
Start Date: ASAP What's the role? This is a technically diverse Security Analyst position covering areas like: Vulnerability management (Tenable.io or equivalent) SIEM monitoring (Elastic preferred) and log analysis Incident detection, triage, and escalation (CrowdStrike or similar EDR) Compliance audits (ISO27001, STIGs) Infrastructure hardening and security baseline validation Some threat hunting and forensicanalysis Creating documentation More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
in event of any cyber incident. Key responsibilities: Act swiftly to contain and mitigate cyber incidents, including malware infections, phishing attacks, data breaches, and unauthorized access events. Conduct systems analysis and forensicanalysis (subject to appropriate tooling availability, e.g., CADO software) to trace the origin of incidents, assess the scope of the damage, and identify affected systems More ❯
Quantico, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
Mobile Security and Vulnerability Engineer, Senior Location: Quantico, VA Work Type: Onsite Remote Work: No Job Description: Provide reverse engineering, static, and dynamic binary analysis, and vulnerability analysis of software on a variety of different platforms and operating systems. Write proof-of-concept software that simulates the behavior of analyzed binaries and their interactions with other system components … technical documentation of research or findings as it relates to all security mechanisms, including access control, encryption, and obfuscation. Qualifications: 10+ years of experience with reverse engineering or vulnerability analysis Experience with Python, C, or C++ programming languages Experience with embedded device software development and compilers, linkers, and binary code generation process Experience with static reverse engineering of software … exploit chains to devices or microcontrollers Top Secret clearance Bachelor's degree in Computer Science, Electrical Engineering, Computer Engineering, Science, Technology, Engineering, or Mathematics Additional Qualifications: Experience with forensics analysis of media Experience in analyzing packet captures with tools, including Wireshark Knowledge of operating systems and security practices Knowledge of cryptographic algorithms and protocols Clearance: Applicants selected will be More ❯
to find improvements. It is up to the leads build on that desire and passion. Opportunities to work on complex challenges, while using expertise in coding, algorithms, complexity/forensicanalysis, technical architecture, and various system design strategies to address those challenges. Why Lloyds Banking Group Like the modern Britain we serve, we're evolving. Investing billions in More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
CMS UK
access to critical information. You will be joining a fast growing legal services team at one of the largest global law firms that manages cutting edge technology for its forensicanalysis, review and distribution of electronic and physical evidence for the firm's clients during the investigation and disclosure stages of litigation or arbitration cases.This team is involved More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
CMS UK
access to critical information. You will be joining a fast growing legal services team at one of the largest global law firms that manages cutting edge technology for its forensicanalysis, review and distribution of electronic and physical evidence for the firm's clients during the investigation and disclosure stages of litigation or arbitration cases.This team is involved More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
CMS UK
access to critical information. You will be joining a fast growing legal services team at one of the largest global law firms that manages cutting edge technology for its forensicanalysis, review and distribution of electronic and physical evidence for the firm's clients during the investigation and disclosure stages of litigation or arbitration cases.This team is involved More ❯