build the firm’s cyber practice, operating as the lead or (on larger, complex matters) co-lead on all cyber projects, covering preparedness and response briefs. You will also be responsible for developing and driving BD in the cyber space, working with the Senior Director. Cyber incident preparedness … and response is a key, growing field of work this team undertakes and they have worked on a number of high-profile incidents over the last two years. They are also increasingly undertaking cyber incident preparedness projects for existing and new clients, as well as extending their network … team who come from an array of professional backgrounds including journalism, banking, law, as well as communications. RESPONSIBILITIES Leading cyber communication projects (preparedness and response) with minimal input from the Senior Director, where required Devising cyber response communications strategy, covering all stakeholder audiences, with knowledge of regulatory requirements more »
is a super exciting opportunity for someone who wants to join an established team and act as an expert on various matters varying from incidentresponse, network security architecture, policies, and procedures, and more! Main responsibilities:Serve as the primary subject matter expert on Azure security, including Azure … Azure Sentinel, Azure Firewall, and other relevant Azure security tools and services. Design and implement security controls across our clients Azure platform.Develop and maintain incidentresponse procedures and play a key role in incident detection, analysis, containment, and recovery. Investigate security incidents, perform root cause analysis, and … considered for this role, you should have: Prior experience in a security engineering role, with a strong focus on Azure cloud security.Proven experience in incidentresponse management, including incident detection, analysis, and remediation.In-depth knowledge of network security principles, protocols, and technologies.Experience working with standards such as more »
be beneficial but equivalent experience or demonstratable equivalent knowledge will also be accepted. Cyber, Security, Information Security leadership, Technology, Management, Risk Management and Governance, IncidentResponse, Security Remediation, Security Policy Creation, Third Party Risk Management, Attack Surface Management Creation exposure and experience essential. The role holder will possess more »
Role : Head of Incident Management & Service Operations Location : West London – hybrid Salary : £110,000 – 125,000 + car allowance + bonus + benefits We have a great opportunity with one of our FTSE100 clients looking for a Head of Head of Incident Management & Service Operations to join them … during an exciting period of transformation. You’ll oversee the operational aspects of IT services with a particular focus on incident management. You’ll be responsible for leading and managing the processes, teams, and technologies that ensure effective incident resolution, the delivery of high-quality IT services, and … across service operations. The role: Define the IT Operation Centre standards and patterns for managing incidents, problems, events, change and release management Ensure major incident management procedures are ready-to-deploy Lead on root cause analysis activities for major incidents Be the driver of problem resolution Provide insight into more »
About Us Outbreach provides specialist Cyber IncidentResponse and Crisis Management services to our midsize clients spread across the world. With offices in London, Dubai, and New York we are different to most other security companies in that we assume our clients will experience a security breach and … company as consultants that can be called on to supplement our permanent teams when our clients experience incidents and engage Outbreach. Role Description The Incident Responder (IR) is the main person responsible for the technical operational tasks necessary to provide our clients with a high quality, rapid and comprehensive … response to a breach. They will be at the forefront of all incidents and absolutely critical to the successful resolution. They will be intimately familiar with a wide variety of attacks from Ransomware to BEC, insider threat and DDoS to name just a few examples. The IR will be more »
About Us Outbreach provides specialist Cyber IncidentResponse and Crisis Management services to our midsize clients spread across the world. With offices in London, Dubai, and New York we are different to most other security companies in that we assume our clients will experience a security breach and … company as consultants that can be called on to supplement our permanent teams when our clients experience incidents and engage Outbreach. Role Description The Incident Manager (IM) is the glue who holds together all other teams and stakeholders in a cyber incident. You can think of this role like … for their activities. The IM with be extremely detail orientated and comfortable with ensuring processes are appropriately followed and progressed as needed during the incident and quickly raising any challenges to the relevant owner. IMs will generally only be working on one incident at a time though in more »
and availability of global IT corporate infrastructure. * Own operations documentation of monitoring and logging for global IT production infrastructure. * Participate in rotating on-call incidentresponse on the weekdays and on the weekends. * Improve operational efficiencies via scripting, bots and integrations. * Participate cross functionally with vendors and other more »
are seeking a conscientious and hardworking claims professional with experience in cyber and technology claims. This role will work with the CFC Claims and IncidentResponse team, along with a number of incidentresponse vendors including forensic, legal, and PR ensure that CFC delivers a cost … effective, but high quality response to our Insureds. The role will also involve working with Underwriting, Finance, IT and Products teams whilst being subject to all relevant legal and statutory (FCA and Lloyd’s) requirements and obligations. About the Role: The Cyber Claims Adjuster will work closely with CFC … s internal IncidentResponse Team to guide clients and triage incidents with the appropriate external response partners to deliver high quality response to cyber incidents. Proactively handle cyber and technology claims on behalf of CFC’s capacity providers from first notification of loss to settlement within more »
Ensure secure handling of application secrets (API keys, passwords, etc.) throughout their lifecycle. Participate in on-call rotation, providing 24x7 escalation capabilities Participation within incidentresponse efforts as Incident Commander. Other duties as assigned or directed. Education, Experience, and Skills required Proven experience as a Senior Active … commercial orchestration tools. Experience with creating and reviewing workflow processes and technical documentation. Comfortable with mentoring other team members, providing guidance and direction during incidentresponse and engineering efforts. Familiarity with regulations and frameworks such as NIST, PCI, SOC, HIPAA, SSAE 16/SOC 1, SOC 2, ISO more »
across various Identity providers. Actively monitor emerging security technologies, trends, and solutions, assessing their applicability to business initiatives and strategies. Participate in Information Security IncidentResponse activities. Monitor compliance with information security policies and procedures among employees, contractors, and third parties. Collaborate with key stakeholders to create and more »
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Cyber Essentials Plus, and NIST CSF. Responsibilities: Deliver the technical and advisory aspects of our Managed Security Service across the customer base. Join security incidentresponse calls to provide advice and guidance. Run Cyber Essentials and NIST framework assessments of customer environments Work and coordinate with other teams more »
a deep understanding of information security technologies, you will aid in triaging threat intelligence from multiple sources and add contextual information to the security incident, perform additional analysis and based on the business impact will recommend the response actions and escalation path. You will be guided by Threat … completion of day-to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow up. Perform advanced event and incident analysis, including baseline establishment and trend analysis. Manage a number of analysts as part of a virtual team of L1 and L2 analysts, including … activities including shift cover etc Support on-call arrangements as part of a Rota, to support L1 Analysts working out of hours. Support Major IncidentResponse activity, from a Protective Monitoring perspective, including supporting teams in identification, containment, and remediation of security related threat. Identify opportunities for SOC more »
Key Responsibilities: Lead, implement, and manage key network security controls. Conduct audits, certifications, and provide consultancy support. Utilise automation to enhance security posture and response capabilities. Liaise with stakeholders to enforce network security policies. Utilise threat intelligence to proactively defend against threats. Mentor junior security professionals and support incidentmore »
Senior SOC Analyst, SIEM - Cloud based: Sentinel/ManageEngine Log360/QRadar, Splunk, IncidentResponse Management, Hybrid London 1-2 days per week. We are hiring a Senior SOC Analyst to help build a new SOC function. The role will initially be very hands on, responsible for monitoring … Investigation: Monitor SIEM tools to assure high security levels, analyse potential security incidents, conduct real-time analysis, support investigations, and document findings to improve incidentresponse procedures. Response: Lead and coordinate incidentresponse activities, develop and maintain incidentresponse plans, and escalate incidents … as necessary, ensuring adherence to major incident processes. Intelligence: Stay updated on cybersecurity threats, integrate threat intelligence into security monitoring processes, and contribute to the development of threat intelligence feeds. Tool Management: Manage and optimize SIEM tools, evaluate new security technologies, and recommend enhancements to the security infrastructure. Collaborate more »
analysis for the group. Providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management. Responsible for the level 2/3 operational Cyber incident response. Escalating in a timely manner any incidents and anomalies that are … Security Playbook. Operational On-Call Requirement This role has a shared, rotational 24/7 on-call requirement and forms part of information security incidentresponse capability. You will act as the single point of contact for all security related response actions and decisions, including management of … each incident from a security perspective, interaction with IM/MIM teams (where required) and recording of all key security decisions. more »
party monitoring tools to detect issues, perform root cause analysis, and implement remediation actions promptly. Develop comprehensive documentation, runbooks, and playbooks outlining procedures for incidentresponse, troubleshooting, and system maintenance. Qualifications: Bachelor's degree in Computer Science, Engineering, or related field (or equivalent experience). Strong experience with more »
code, perform threat modelling and security testing of applications, run SAST, DAST, SCA and secret scanning tools, manage the bug bounty program and lead incidentresponse for software bugs. Please apply if you're looking to take your career to the next level, happy to run you through more »
Cyber Security Management - IncidentResponse, Security Monitoring, Threat Modelling Frameworks, NIST, Kill Chain, Attack Lifecycle, MITRE, Windows, UNIX, Stratus, Networks, SIEM, IAM, DLP I am looking for a Cyber Security professional for my client who is a leading investment bank based in London. You will join the Information … controls to detect anomalies and incidents. Monitor and report suspicious activity, conduct IR investigations, and escalate security incidents. Utilize IR and Forensics tools for incident analysis. Security Engagement & Best Practice Collaborate with penetration testing programs and other departments to mitigate security risks. Develop IncidentResponse and Threat … Be available for coverage from 7 am to 7 pm on business days, with potential for ad-hoc coverage outside regular hours. Key Skills: IncidentResponse & Security Monitoring Threat modelling frameworks Experience in banking/Investment Banking Managing cyber security incidents NIST, Kill Chain, Attack life cycle, MITRE more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
with remote working flexibility. Job Title: Lead Security Analyst Job Type: Permanent Location: London, UK(Remote) Job details: Purpose of the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment … and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating … manage security incidents by analyzing alerts from diverse sources and collaborating with external monitors to identify and address potential threats. Serve as a primary incident responder, leading the containment and resolution process in line with established protocols to reduce risks. Enhance security procedures to improve the organization's monitoring more »
Responsibilities Platform Expertise: Maintain pipelines, Terraform code, and AWS stack for optimal platform performance. Automation Focus: Patch, update, and automate tasks for maximum efficiency. Incident Lead: Coordinate incidentresponse with L2 and SRE teams. Handover and Reviews: Facilitate daily SRE handovers and post-incident reviews. Reporting more »
Job DescriptionCyber Snr. IncidentResponse Specialist - London - £85/£95kMy client is a global consultancy who are adding to their incidentresponse & proactive threat-hunting team to further develop and polish the company's overall service offering. They are looking for a strong incidentresponse consultant who can independently investigate incidents, conduct threat hunting and engage with clients.Responsibilities of a Cyber Snr. IncidentResponse Specialist:Manage and coordinate cyber security incidentsAct as a lead for threat-hunting efforts to establish an attacker's spread through a system and network, anticipating further attacker … activity across endpoints, cloud, and network infrastructureWork closely with the CTI team and create playbooksDigital forensics of relevant incident data (disk, volatile memory, network packets, log files).Have the ability to advise clients on the threat landscape and attacks that may be relevant to themHave an understanding of incidentmore »
Cyber IncidentResponse A global bank is seeking a Cyber Security Analyst to join their Cyber Security team in London, with the team working across infrastructure, business and application risk, penetration testing, and vulnerability management. The cyber security practice is a mature function and this team member will … specifically work within the incidentresponse team, and will be expected to be well versed across technology control, EDR, and related tools and technology skills. This position has lots of capabilities for progression, access to different tools, and excellent opportunity to develop skills. You will be: Analysing, developing … infrastructure estate. Able to monitor activity upon specified information systems and devices. Proficient in identifying and reporting suspicious or harmful activity. part of the IncidentResponse investigations into internal and external threats or security incidents. Able to identify and escalate any security breaches and assess their impact. Utilise more »
I’m working with a boutique consultancy, who are seeking to grow to their existing cyber function with another dedicated incidentresponse/threat hunting specialist. This role is varied, offering the incumbent an opportunity to conduct incidentresponse and threat hunting engagements. Some of your … not limited to APT tracking and malware analysis. In order to be successful in your application, you will need: At least 3 years cyber incidentresponse experience. Certifications such as GCIH, GCIA or GCFA/E. Ideally, consultancy experience however, strong regulated exposure is also welcomed. Strong baseline … threat hunting skills and ideally, an interest in research focused tasks. This is an exciting role for an incident responder, looking for a step up from basic cases to truly partner with organisations across the globe. Hybrid role, London based opportunity. Please contact pg@barclaysimpson for immediate consideration. more »
Senior IncidentResponse Analyst – Cybersecurity - Up to £80k - Hybrid - up to 35% bonus - Excellent Benefits. My client one of the world’s most renowned aviation groups in the world is searching for a Senior IncidentResponse Analyst to join their team! Skills: Able to serve as … to all levels of hierarchy, including senior leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incidentresponse, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC more »
London, England, United Kingdom Hybrid / WFH Options
Sportradar
the central point of contact during critical situations, including but not limited to technology, financial, security, privacy, and people, to ensure swift and effective response, addressing people safety issues, minimizing addressing service downtime, and restoring normal operations in alignment with predefined service level agreements (SLAs). The role requires … experts, support functions, and business units, to investigate, diagnose, resolve major incidents efficiently, and ensure regulatory requirements are considered. Root Cause Analysis: Facilitate post-incident reviews and root cause analysis (RCA) sessions to identify the underlying causes of crises and issues and implement preventive measures to avoid recurrence. Drive … continuous improvement through post-incident review reports. Documentation and reporting: Maintain accurate records of crises and major incidents, including incident details, actions taken, resolutions, and post-incident analysis findings, adhering to regulatory and compliance requirements. Monitor key performance indicators (KPIs) and metrics related to incident management more »