London, England, United Kingdom Hybrid / WFH Options
Sportradar
the central point of contact during critical situations, including but not limited to technology, financial, security, privacy, and people, to ensure swift and effective response, addressing people safety issues, minimizing addressing service downtime, and restoring normal operations in alignment with predefined service level agreements (SLAs). The role requires … experts, support functions, and business units, to investigate, diagnose, resolve major incidents efficiently, and ensure regulatory requirements are considered. Root Cause Analysis: Facilitate post-incident reviews and root cause analysis (RCA) sessions to identify the underlying causes of crises and issues and implement preventive measures to avoid recurrence. Drive … continuous improvement through post-incident review reports. Documentation and reporting: Maintain accurate records of crises and major incidents, including incident details, actions taken, resolutions, and post-incident analysis findings, adhering to regulatory and compliance requirements. Monitor key performance indicators (KPIs) and metrics related to incident management more »
scope of pentests and manage the process with engineering. Once issues are identified SecOps work closely with operations and engineering teams to resolve them. Incident management. The team manage our security incidentresponse activities, investigating alerts using tools such as Azure Sentinel. SecOps will coordinate the incidentresponse with resolving teams and engage with key stakeholders for updates. As the team works office hours, engaging a managed SOC provider who cover 24/7 incident management. Beyond close daily collaboration with other security teams, SecOps engages with all teams across the business at every more »
risks associated with software products and hardware. Develop and implement risk mitigation strategies and contingency plans. Ensure compliance with relevant industry standards and regulations. IncidentResponse: Establish and maintain an effective incidentresponse plan. Lead the investigation and resolution of cyber security incidents and breaches. Implement more »
Greater London, England, United Kingdom Hybrid / WFH Options
Trident Search
and allow them to offer the best service possible. This is a senior role, so plenty of experience within SecOps is vital, especially within incidentresponse and engaging with the wider business. This role will also see you have direct reports, so experience in a little leadership or … to further enhance capabilities Experience with malware analysis is essential as you will play a senior role in managing this process. Having ownership over incident management and ensuring incidents are closed out in a timely manner or escalated effectively. Risk analysis across multiple teams and technologies is also required … great internal security role, working with a reputable organisation and a talented team. If you have the right experience and are comfortable with your incidentresponse skills then please do go ahead and apply now. more »
Chester, England, United Kingdom Hybrid / WFH Options
Digital Gurus
robustness of IT security operations. The technical stack represents a blend of Azure, M365, IAM, Sentinel, Defender for Cloud and Log Monitoring. Responsibilities Security IncidentResponse: Assist in identifying, managing and resolving security incidents with the Security Operations Center (SOC). Ensure successful resolution and closure of these … security vulnerabilities. Ability to work effectively with cross-functional teams, particularly bridging IT operations and InfoSec. Scripting experience will be beneficial for automation and incidentresponse tasks. Tech Stack Azure M365 IAM RBAC Sentinel Defender for Cloud (Secure Score) Interested? Apply now to find out more more »
is an open-source framework developed by Fox-IT for collecting and analyzing large amounts of forensic data. It is a game-changer in incidentresponse, used by leading cybersecurity companies and government agencies. It enables data acquisition and analysis on thousands of systems in minutes, regardless of … the DFIR team to deliver innovative solutions. Your expertise in Python and contribution to the Dissect Framework are essential for the success of the incidentresponse services and directly contribute to a safer society. Fox-IT We are Fox-IT, or Fox. We stand for making the world more »
experience, knowledge, and desire to continuously improve. Deliver solutions within the appropriate framework and methodology whilst ensuring the supportability of services delivered. Experience with incident detection, incidentresponse, and forensics. Experience with Firewalls (functionality and maintenance), Microsoft Office 365 Security, XDR, and Endpoint Security. Proficiency in a more »
Key Accountabilities Perform forensic analysis and gather evidence Correlation monitoring using multiple SIEM technologies Assist in gathering forensic data and physical equipment Act as incident responder for potential incident identified Ability to work under pressure In-depth understanding of the cyber threat landscape and advances adversary tactics Conduct … counter the attack or improvise security standards. Keep the security systems up to date and contributing to security strategies. Document incidents to contribute to incidentresponse and disaster recovery plans. Perform internal and external security audits. In the case of third-party vendors, verify their security strength and … reporting Real Time attacks and vulnerabilities on the client network. Identification of incidents and subsequent analysis and investigation to determine their severity and the response required. Ensure that incidents are correctly reported and documented in accordance with the relevant policies and procedures. Be prepared to provide a Technical Escalation more »
week (Flexible) Multiple sites Core Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium Role duties - • Develop and integrate security event monitoring and incident management services. • Respond to security incidents as they occur as part of an incidentresponse team. • Implement metrics and dashboards to give more »
cyber security risks associated with software products and hardware.Develop and implement risk mitigation strategies and contingency plans.Ensure compliance with relevant industry standards and regulations.Incident Response:Establish and maintain an effective incidentresponse plan.Lead the investigation and resolution of cyber security incidents and breaches.Implement lessons learned to continuously more »
alerts - Analyse and respond to security events - Conduct root cause analysis and forensic investigations - Collaborate with IT and security teams to resolve incidents - Maintain incidentresponse procedures and documentation Desirable Skills: - Experience with Microsoft technologies (Windows Server, Active Directory, Azure) - Knowledge of Elasticsearch and Linux - Familiarity with SIEM more »
root cause analyses, and monitoring the implementation of corrective measures.Assess and contribute to the ongoing development of documentation concerning cloud security policies, procedures, and incidentresponse plans, including the delivery of management KPIs.Assist in creating and implementing security controls that align with regulatory requirements and business goals.Engage in more »
audiences, and a solid business acumen to deal with other senior stakeholders across the business.This role would suit those with an extensive history in IncidentResponse, Threat Hunting and Threat Intelligence services who are used to working in a high-pressure environment and managing geographically dispersed teams across … responsibilities will be: • Manage and develop a global team of L3 Threat Hunting, Forensic & Threat Intelligence specialists, providing expert assistance during a major cyber incident and for routine investigations escalated by the SOC.• Proactively analyse the WTW estate in a threat-led manner looking for signs of compromise, acting more »
capable of implementing secure rebuilds tailored to customer requirements.Conduct assurance assessments of Third-Party suppliers to uphold security standards.Provide expert technical support during incidents response engagements.Reviewing existing technical environment, propose and manage changes to improve IT Security.Take ownership and responsibility for accomplishing objectives across the team and department.Demonstrate steadfast … NIST, CIS Critical Controls.VMWare or Hyper-V and server integration knowledge and experience.Certified Information Systems Security Professional (CISSP) or equivalent.Exposure to ISO 27001, 9001.Any incidentResponse or rebuild after disasters experience is a plus.Knowing we’re right for youEmbracing uniqueness, the culture at Grant Thornton thrives on the more »
Fratton, England, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
SIEM/Incident SME (Active DV Clearance) ELK (Elastic, Logstash, Kibana) Tanium MITRE ATT&CK Cyber Kill Chain Location: Hybrid onsite in one of the following locations 2/3 days per week - Corsham, Portsmouth or Northallerton Duration: 6 months We are Global IT Recruitment specialist that provides support … including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incidentresponse team. Implement metrics and dashboards to give more »
Responsibilities: Develop and implement comprehensive information security strategies, policies, and procedures. Conduct risk assessments and vulnerability analyses to identify and mitigate security threats. Lead incidentresponse efforts and manage security breaches efficiently. Collaborate with cross-functional teams to ensure security measures are integrated into all business operations. Stay more »
London, England, United Kingdom Hybrid / WFH Options
Client Server
the appropriate SIEM platform and then once it's embedded ensuring BAU and leading security monitoring, carrying out indepth investigations and actively participating in incident response. This is a high profile role where you'll establish Security Operations Centre procedures and processes from the ground up, collaborating with senior more »
manage, upgrade, and improve a centrally managed infrastructure and provide customer support Demonstrated subject matter expertise with vulnerability and patch management, insider threat and incident response. Broad knowledge in risk analysis, threat mitigation, and other security domains. Understanding of various networking ports, protocols and services. Scripting experience (e.g. JavaScript more »
London, England, United Kingdom Hybrid / WFH Options
Jobleads-UK
matters. This includes drafting and implementing privacy strategies, negotiating Data Processing Agreements (DPAs), Standard Contractual Clauses (SCCs), and other privacy-related documentation with clients. IncidentResponse: You’ll assist with incident reports and reviews, ensuring compliance with relevant regulations. DORA Expertise: As part of the escalation point more »
Operations, supercharges SecOps by fusing Lightspeed Security Analytics, Industry-Leading Cyberthreat Intelligence (CTI), AI-based automated threat hunting, alert orchestration, automated threat detection and incidentresponse (TDIR) blocking, community intelligence sharing, exposure management, and dark web protection. Transforming CISOs into superheroes and analysts into SOC terminators. Anomali's more »
Security Center), and services. - Familiarity with security testing methodologies like penetration testing and vulnerability assessments. - Experience with SIEM tools (Splunk, ELK, Azure Sentinel) and incidentresponse/forensics. - Knowledge of security frameworks (NIST, ISO 27001, SOC 2) and relevant certifications (CISSP, CCSP). - Proficiency in Infrastructure as Code more »
Lincoln, England, United Kingdom Hybrid / WFH Options
Jobleads-UK
and demand forecasting. Refine and implement DevSecOps security practices. Architect systems for HA, Disaster Recovery, and Load Balancing decisions. Write playbooks and inform the incidentresponse practices. Participate in an on-call rotation for 24x7 support. Qualities and Skills Required Bachelor's Degree in Computer Science, Engineering, IS more »
security risks. Develop and enforce security policies, standards, and guidelines. Monitor and analyse security threats, identifying and mitigating potential risks. Security Operations: Lead the incidentresponse planning and investigation processes. Oversee the implementation of security measures and regularly review their effectiveness. Collaborate with IT teams to ensure secure more »
the realm of cyber security, offering a comprehensive range of services including Assessment Services, Pen Testing, CISOaaS, Certification Readiness, DPO services, Training and Awareness, Incidentresponse, and a 24/7 x 365 Managed Security Operations Centre. We work with both large enterprises and smaller boutique firms, providing more »
Warrington, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
Perform data profiling and analysis to identify patterns, trends, and insights. Conduct security assessments and vulnerability scanning. Respond to security incidents and participate in incidentresponse activities. Stay updated on evolving security threats and Microsoft security solutions. Act as a point of contact between SOC team and customer. more »