Incident Response Jobs in West Sussex

6 of 6 Incident Response Jobs in West Sussex

Incident Response (CSIRT) / SOC Level 3 Analyst

Crawley, Sussex, United Kingdom
Hybrid / WFH Options
Morson Edge
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … s network systems, operational technology, and customer data from emerging and sophisticated cyber risks. Key Responsibilities As a senior member of the Security Operations team, you will: Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and … enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation across cloud and on-prem environments. Support and develop the organisation's SOAR platform, creating automated workflows and improving response efficiency. Perform More ❯
Employment Type: Contract
Rate: GBP Annual
Posted:

Incident Response (CSIRT) / SOC Level 3 Analyst

Crawley, West Sussex, South East, United Kingdom
Hybrid / WFH Options
Morson Edge
Incident Response (CSIRT)/SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT)/Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … s network systems, operational technology, and customer data from emerging and sophisticated cyber risks. Key Responsibilities As a senior member of the Security Operations team, you will: Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats. Develop and … enhance SOC policies, playbooks, and incident response processes to align with industry best practices. Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation across cloud and on-prem environments. Support and develop the organisation's SOAR platform, creating automated workflows and improving response efficiency. Perform More ❯
Employment Type: Contract
Posted:

Senior SOC Analyst (Level 3)

Crawley, England, United Kingdom
Hybrid / WFH Options
InfoSec People Ltd
escalation role within a dedicated Security Operations Centre, working at the forefront of protecting high-value national assets. The successful candidate will act as a technical authority for advanced incident response, threat hunting, and security engineering, with a strong focus on the Microsoft security stack. Key Responsibilities Serve as the primary escalation point for complex incidents and lead … on incident response. Conduct in-depth threat hunting, forensic investigations, and root cause analysis. Develop, test, and optimise detection use cases, rules, and playbooks within Microsoft Sentinel and Defender. Provide mentorship and guidance to junior SOC analysts, enhancing team capability. Collaborate with IT and OT teams to address unique security requirements across CNI environments. Drive improvements in SOC operations … automation, and incident response processes. Monitor evolving threats and integrate threat intelligence into daily operations. Ensure adherence to industry standards and compliance frameworks (NIS2, CAF, ISO 27001). Skills & Experience Required Extensive background in SOC operations, incident response, and threat hunting. Expertise with the Microsoft security stack, including: Microsoft Sentinel (SIEM/SOAR) Microsoft Defender for More ❯
Posted:

Senior SOC Analyst (Level 3)

chichester, south east england, united kingdom
Hybrid / WFH Options
InfoSec People Ltd
escalation role within a dedicated Security Operations Centre, working at the forefront of protecting high-value national assets. The successful candidate will act as a technical authority for advanced incident response, threat hunting, and security engineering, with a strong focus on the Microsoft security stack. Key Responsibilities Serve as the primary escalation point for complex incidents and lead … on incident response. Conduct in-depth threat hunting, forensic investigations, and root cause analysis. Develop, test, and optimise detection use cases, rules, and playbooks within Microsoft Sentinel and Defender. Provide mentorship and guidance to junior SOC analysts, enhancing team capability. Collaborate with IT and OT teams to address unique security requirements across CNI environments. Drive improvements in SOC operations … automation, and incident response processes. Monitor evolving threats and integrate threat intelligence into daily operations. Ensure adherence to industry standards and compliance frameworks (NIS2, CAF, ISO 27001). Skills & Experience Required Extensive background in SOC operations, incident response, and threat hunting. Expertise with the Microsoft security stack, including: Microsoft Sentinel (SIEM/SOAR) Microsoft Defender for More ❯
Posted:

Information Security Engineer

Worthing, England, United Kingdom
Stratospherec Limited
regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for potential threats and unusual activity. • Responding to security incidents, investigating breaches, and leading root cause analyses. • Maintaining incident response … protection software EDR, Anti-Virus, DLP and securing mobile, tablet, laptop, desktop devices. • Familiar with Zero Trust security models • Proficient in using SIEM tools • Experience with log analysis and incident detection. • Familiarity with securing cloud-native applications, containers and microservices. • Incident detection, containment and mitigation through post-incident investigations and root cause analysis. • Data encryption and Data More ❯
Posted:

Information Security Engineer

Worthing, east anglia, united kingdom
Stratospherec Limited
regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for potential threats and unusual activity. • Responding to security incidents, investigating breaches, and leading root cause analyses. • Maintaining incident response … protection software EDR, Anti-Virus, DLP and securing mobile, tablet, laptop, desktop devices. • Familiar with Zero Trust security models • Proficient in using SIEM tools • Experience with log analysis and incident detection. • Familiarity with securing cloud-native applications, containers and microservices. • Incident detection, containment and mitigation through post-incident investigations and root cause analysis. • Data encryption and Data More ❯
Posted:
Incident Response
West Sussex
10th Percentile
£65,375
25th Percentile
£65,938
Median
£72,500
75th Percentile
£76,250
90th Percentile
£78,500