Our client is looking to bring on a Cyber Security Incident Responder with NATO Secret Clearance, for a fully on-site 6-month contract based in Mons, Belgium. About the Role: As a Cyber Security Incident Responder you will: Deliver Cyber Security IncidentResponse activities (TRIAGE … Contain, Eradicate, Recover). Lead or be a member of a Cyber Security IncidentResponse Team, designated to provide Cyber Security Incident Response. Manage the life cycle of the taxonomy. Improve and implement to the IncidentResponse activities. Realise procedures for the IncidentResponse activities. About You: To be successful in this role you will need: A University Degree in IT. 4 years+ of experience in Incident Response. An understanding of the principles of Security, Networks, Vulnerabilities of Networks and Applications. Recent experience in Intrusion Detection and IncidentResponse, ideally more »
of emerging security threats and risks. Helping develop a security culture within the business. Partnering with the different functions working on controls by: Supporting IncidentResponse activities providing further context, OSINT support and behavioural analysis in the event of a security incident impacting the business unit. Maintaining … compliance functions and with internal and external audit functions. Ensure timely delivery of actionable threat intelligence across the organisation, including key stakeholders; Security Operations, IncidentResponse, Vulnerability Management, Security Leadership, Fraud Prevention and Industry intelligence communities. Continuous Improvement through the delivery of; Provide mentoring and development of Threat … Develop proven structure and processes such as run books that help the team achieve outstanding results. Championing and supporting Group Security's wider BCM, Incident and Crisis Management functions. Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource more »
skills and Experience -you will have prior experience as acting as either a lead or an escalation point to the SOC -prior experience with incidentresponse, threat and vulnerability management -development of incidentresponse plans, processes and procedures -Working with Security frameworks MITRE, cyber kill chain more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
I3 Resourcing Limited
DESIRABLE Key responsibilities: Application and infrastructure planning and testing including integrations Maintaining CI/CD pipelines Automation implementation Guidewire Cloud Console configuration On-call, incidentresponse and incident management Monitoring the software development process through its entire lifecycle and ensuring adherence to security standards Regularly updating or more »
and propose solutions for mitigating cyber security risks. Assist in optimizing operational security toolsets. Foster strong relationships with internal teams, stakeholders, and partners. Support incidentresponse, disaster recovery, and business continuity planning. Contribute to security reporting, roadmap planning, and resource allocation. Conduct research on emerging security threats and … Excellent communication skills across all organizational levels. Ability to thrive under pressure, adapt quickly to changing priorities, and make informed decisions. Proficiency in threat response and incident handling. Familiarity with cyber security standards and frameworks such as ISO27001, NIST, SANS, and OWASP. Technical knowledge of large-scale information more »
Dunbar, East Lothian, Scotland, United Kingdom Hybrid / WFH Options
Risktec Solutions Ltd
Administer computer based security and monitoring systems. Carry out software or configuration backups of IT and OT equipment ranging in age. Participate in cyber incidentresponse planning, exercising and digital forensic investigation. Ensure station documentation and network diagrams are maintained and accurately reflect design and configuration changes for more »
Northallerton, North Yorkshire, Yorkshire, United Kingdom
Henderson Scott
services. * Experience using virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incidentresponse team. * Implement metrics and dashboards to give more »
services. * Experience using virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incidentresponse team. * Implement metrics and dashboards to give more »
services. * Experience using virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incidentresponse team. * Implement metrics and dashboards to give more »
Northallerton, North Yorkshire, Yorkshire, United Kingdom
Henderson Scott
virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation Someone hands on. Responsibilities include: Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incidentresponse team. * Implement metrics and dashboards to give more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations accordingly. Be the lead in Cyber security incidentresponse and ensure processes and procedures and playbooks are efficient, effective and are tested regularly in line with policy. Develop and maintain a more »
Birmingham, West Midlands (County), United Kingdom
Jumar Solutions
expertise shines brightest. Mastering Networks: Navigate the OSI Reference Model and engage with various network communication protocols with finesse. Unleash Action: Dive deep into incidentresponse, log analysis, and PCAP analysis - your canvas for showcasing cybersecurity excellence. Digital Sleuth: Investigate Windows/Linux systems, uncovering signs of compromise … with your digital magnifying glass. Communication Virtuoso: Translate cybersecurity risks into language that resonates with business objectives. Incident Commander: Lead security incidents with strategic finesse, providing user-centric updates along the way. Guardian of Cyber Realms: Implement Defensive Cyber-attack methodologies and frameworks, safeguarding digital territories with your toolkit. more »
Birmingham, West Midlands (County), United Kingdom
Jumar Solutions
expertise shines brightest. Mastering Networks: Navigate the OSI Reference Model and engage with various network communication protocols with finesse. Unleash Action: Dive deep into incidentresponse, log analysis, and PCAP analysis - your canvas for showcasing cybersecurity excellence. Digital Sleuth: Investigate Windows/Linux systems, uncovering signs of compromise … with your digital magnifying glass. Communication Virtuoso: Translate cybersecurity risks into language that resonates with business objectives. Incident Commander: Lead security incidents with strategic finesse, providing user-centric updates along the way. Guardian of Cyber Realms: Implement Defensive Cyber-attack methodologies and frameworks, safeguarding digital territories with your toolkit. more »
West Midlands, Birmingham, West Midlands (County), United Kingdom
Jumar Solutions
expertise shines brightest. Mastering Networks: Navigate the OSI Reference Model and engage with various network communication protocols with finesse. Unleash Action: Dive deep into incidentresponse, log analysis, and PCAP analysis - your canvas for showcasing cybersecurity excellence. Digital Sleuth: Investigate Windows/Linux systems, uncovering signs of compromise … with your digital magnifying glass. Communication Virtuoso: Translate cybersecurity risks into language that resonates with business objectives. Incident Commander: Lead security incidents with strategic finesse, providing user-centric updates along the way. Guardian of Cyber Realms: Implement Defensive Cyber-attack methodologies and frameworks, safeguarding digital territories with your toolkit. more »
work with comms teams, risk, intelligence & resilience, security operations, and supply chain. * Develop and maintain supply chain details and processes or lists for security incidentresponse and departmental functions. * Develop and maintain the monthly reporting schedule: KPIs; KRIs; Resilience; Threat intelligence as required. * Assist with drafting of statements more »
functional teams to address vulnerabilities and implement security controls. Maintain up-to-date knowledge of emerging security threats and industry best practices. Participate in incidentresponse and provide guidance in the event of a security breach. Job Requirements Significant experience in vulnerability management, including vulnerability assessment, penetration testing more »
Engagement and Insight strategies. Experience in database management and optimisation, i.e. reorganisation and rebuild. Strong knowledge of database backup and recovery procedures. Experience of incidentresponse (triage, classification, investigation, and escalation). Proficient in database encryption at rest, in transit and in memory. Financial Services experience and exposure more »
to optimise comms outreach and engagement with the supply chain. * Develop and maintain supply chain security comms list/process for CTI for security incident response. * Develop and maintain the monthly reporting schedule: KPIs; KRIs; Resilience; Threat intelligence; security integration. * Draft technical SoWs, JDs or commercial proposals (incl Business more »
and production environments. Assist the project, SOC and wider teams and help develop Cyber Use Cases e.g. log source onboarding, use case development with incidentresponse playbook development and automation and integration with Service Now and SysNG Ensure cyber use cases are successfully tested, with defects remediated through more »
DLP technology, configuring policies, and compiling reports for analytics. Monitoring and responding to alerts generated from DLP systems and other technologies. Working with the IncidentResponse team to escalate and respond to potential or real threats. Serving as a DLP subject matter expert within the organisation. Collaborating on … the DLP rule development lifecycle including policy development, response rules, and maintenance. For Purview DLP/DLP Ops role; Create DLP policies in Purview that deliver the same outcome as those currently being delivered through Vontu Need for a rapid cycle of Build & Test cycles Pick up the new more »
Greater London, United Kingdom Hybrid / WFH Options
Jumar Solutions
DLP technology, configuring policies, and compiling reports for analytics. Monitoring and responding to alerts generated from DLP systems and other technologies. Working with the IncidentResponse team to escalate and respond to potential or real threats. Serving as a DLP subject matter expert within the organization. Collaborating on … the DLP rule development lifecycle including policy development, response rules, and maintenance. Create DLP policies in Purview that deliver the same outcome as those currently being delivered through Vontu Need for a rapid cycle of Build & Test cycles Pick up the new processes, follow them through/operate them more »