Central London, London, United Kingdom Hybrid / WFH Options
Client Server
the appropriate SIEM platform and then once it's embedded ensuring BAU and leading security monitoring, carrying out indepth investigations and actively participating in incident response. This is a high profile role where you'll establish Security Operations Centre procedures and processes from the ground up, collaborating with senior more »
organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world. Your Role and Responsibilities As an IncidentResponse Consultant for the IBM Security X-Force IncidentResponse (X-Force IR) team, you will be responding to high profile … IBM stakeholders to provide integrated solutions to our clients’ most challenging problems. In this role you will have demonstrated skills in various elements of IncidentResponse, conducting computer intrusion investigations, and have a strong foundation in cyber security policy, operations and best practices, ideally in large enterprise environments. … CyberReason, Carbon Black, CrowdStrike and ReaQta as well as familiarity with forensic analysis tools such as X-Ways, EnCase Forensic or FTK and live response analysis. Furthermore, familiarity with Windows and Linux enterprise environments and systems such as Active Directory, Office 365, FWs, IPS/IDS, SIEMs, etc. is more »
operations team and the quality of third party services and deliverables, reviewing performance.Take the lead management responsibility for all cyber security event monitoring and incidentresponse services received from all partner organisations with a focus on our Managed Security Service relationship (MSS).Manage the search for cyber threats … that may go undetected in our environment that have evaded our automated security tools and defences.Accountable for Cyber Security incidentresponse management including the establishment, maintenance and improvement of cyber security incidentresponse plans, procedures, and playbooks.Promote security orchestration, automation, and response (SOAR) solutions for … systems and operational playbooks to enable efficient discovery of security events and response actions.Ideal experience:Minimum 5 years+ experience leading Cyber Security Operations teams.Practical experience of incidentresponse governance (lifecycles, frameworks, incident handling) and developing incidentresponse playbooks/processes, Security Orchestration, Automation and more »
Cyber Incident Manager with excellent stakeholder and team management skills as well as a technical mindset. This role will require you in the office at least twice a week and be on-call one in every four weeks. You will be required to go through SC clearance so need … to have been a UK resident for the past five years, unfortunately we will not be able to provide sponsorship. The Cyber Incident Manager role will be working in the Cyber Response Services (CRS) Team within our Risk Consulting practice, reporting directly into the head of cyber response. … threat. Responsibilities Manage and co-ordinate cyber security incidents for our clients, working closely with the head of cyber response. Digital forensics of relevant incident data (disk, volatile memory, network packets, log files). Maintaining a current view of the cyber threat, and being able to advise clients on more »
reference: 40942/PG I’m working with a boutique consultancy, who are seeking to grow to their existing cyber function with another dedicated incidentresponse/threat hunting specialist.This role is varied, offering the incumbent an opportunity to conduct incidentresponse and threat hunting engagements. … but not limited to APT tracking and malware analysis.In order to be successful in your application, you will need:At least 3 years cyber incidentresponse experience.Certifications such as GCIH, GCIA or GCFA/E.Ideally, consultancy experience however, strong regulated exposure is also welcomed.Strong baseline threat hunting skills … and ideally, an interest in research focused tasks.This is an exciting role for an incident responder, looking for a step up from basic cases to truly partner with organisations across the globe.Please contact pg@barclaysimpson for immediate consideration.IND123We seek individuals from a diverse talent pool and encourage applicants from more »
are seeking a conscientious and hardworking claims professional with experience in cyber and technology claims. This role will work with the CFC Claims and IncidentResponse team, along with a number of incidentresponse vendors including forensic, legal, and PR ensure that CFC delivers a cost … effective, but high quality response to our Insureds. The role will also involve working with Underwriting, Finance, IT and Products teams whilst being subject to all relevant legal and statutory (FCA and Lloyd’s) requirements and obligations. About the Role: The Cyber Claims Adjuster will work closely with CFC … s internal IncidentResponse Team to guide clients and triage incidents with the appropriate external response partners to deliver high quality response to cyber incidents. Proactively handle cyber and technology claims on behalf of CFC’s capacity providers from first notification of loss to settlement within more »
The ideal candidate will have a strong background in Sentinel, Infrastructure as Code (IAC), and Security Operations (SecOps). Key Responsibilities Security Monitoring and IncidentResponse Implement and manage security monitoring solutions using Microsoft Sentinel. Develop and maintain incidentresponse playbooks and procedures. Lead incidentresponse efforts, including investigation, containment, and remediation. Develop and maintain secure IAC templates using tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify more »
of security solutions impact business strategies Create documentation of findings and recommendations (root cause and risk analysis as needed Assist with forensic investigations and incidentresponse team (CIRT) activities. Assign work to Cyber SOC for remediation Escalate pertinent findings in a timely manner Leverage vendors and internal resources … to interface various security tools to automate critical response tasks Support Compliance managers in providing Cybersecurity artifacts Align information cybersecurity operations with NIST, and ISO 27001 requirements Establish role as a local presence and focal point for business and IT contact. Create the relationships. As the local Cyber management … controls, processes, and policies to improve security posture and identify gaps in existing controls. Assist with Cyber security awareness initiatives and events Assist with incidentresponse planning and activities Essential Qualifications and Education: Bachelor’s Degree in Information Technology (minimum) or equivalent experience and certifications 7 or more more »
seeking expressions of interest for passionate cybersecurity professionals to join our dynamic team. Initially we will be seeking experience with Managed Extended Detection and Response (MXDR) services. At Sekuro we leverage cutting-edge technologies and strategic partnerships to provide top-tier security solutions to our global clientele. Job Description … our MXDR services. Key Responsibilities: Design and Implementation: Architect and deploy advanced MXDR solutions using CrowdStrike and AWS to protect client environments. Monitoring and Response: Conduct continuous monitoring, threat hunting, and incidentresponse activities to identify and mitigate security threats. Integration: Integrate MXDR solutions with clients’ existing … security infrastructure and workflows. Automation: Develop and implement automation scripts and tools to enhance threat detection and response capabilities. Client Support: Provide expert-level support and guidance to clients, including conducting security assessments and providing recommendations. Collaboration: Work closely with other cybersecurity experts, analysts, and engineers within Sekuro to more »
new tools and techniques to enhance the security posture Administer and mature tool configurations, optimize performance, and feature utilization Integrate tools to automate critical response tasks. Evaluate TVM tool and patches, updates, and perform maintenance Develop detailed documentation on TVM implementation, configuration, and processes Plan, develop, and implement new … security devices or services for TVM as needed Identify, create and mature cybersecurity operations processes. Assist with forensic investigations and incidentresponse team (CIRT) activities.as needed Assist with security awareness activities (communications, posters, events, assessments) as needed Participate in incident runbook development Escalate pertinent findings in a … management expertise Experience executing attack defense tactics with security technologies including DNS, SMTP, firewall, and endpoint solutions. Experience and participation as needed with security incident and investigations Assist as needed with security awareness content such as communications, posters, presentations Experience with security management/configuration cloud tools and services more »
architecture, and integration with security control frameworks.Oversee the implementation and operation of controls to meet identified security control objectives.Advise operations teams supporting computer security incidentresponse activities related to intrusion detection monitoring, scanning, cyber threat reporting, and development/implementation of vulnerability mitigation strategies.Develop trusted advisor relationships for more »
and digital deployments. Continuously adjust cyber capabilities based on evolving cyber threat landscapes. Support and potentially lead NOC/SOC operational teams. Oversee Cyber incidentresponse, conduct post-incident reviews (PIRs), root-cause analysis (RCAs), and implement mitigating solutions. Manage capacity for cyber platforms proactively. Design data more »
be beneficial but equivalent experience or demonstratable equivalent knowledge will also be accepted. Cyber, Security, Information Security leadership, Technology, Management, Risk Management and Governance, IncidentResponse, Security Remediation, Security Policy Creation, Third Party Risk Management, Attack Surface Management Creation exposure and experience essential. The role holder will possess more »
Develop and maintain strong relationships with key stakeholders. Lead and manage a security pillar, ensuring the delivery of high-quality work. Document and maintain incidentresponse plans for various cybersecurity incidents. Maintain Business Continuity Policies and Plans to ensure uninterrupted operations. Prepare and maintain Disaster Recovery plans to … mitigate potential disruptions. Collaborate with teams for data center operations and backup, ensuring compliance and risk management. Manage crisis response professionals and conduct simulation exercises to test preparedness. Qualifications and Experience: Bachelor’s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH … CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data and identify threats. Ability to make considered decisions and ensure successful delivery in a fast-paced environment. Why Join more »
incorporated into the business Risk Register. Participate in supplier reviews, serving as the subject matter expert in cybersecurity. Provide support during the Bank's incidentresponse process involving suppliers. Contribute to the continuous monitoring of key third-party relationships. Enhance awareness of third-party cybersecurity risks through local more »
Ensure compliance with data privacy laws and regulations.Risk Management: Conduct risk assessments and take appropriate actions to mitigate the risks associated with data security.Incident Response: Respond to security incidents, conduct investigations, and implement solutions to prevent similar incidents in the future.Training and Development: Train and educate stakeholders about our more »
in all vendor and project activities. - Develop and maintain frameworks for security assessments. - Stay updated on emerging security threats and industry trends. - Participate in incidentresponse and investigations. - Collaborate with procurement to evaluate and manage vendor security. - Review vendor documentation to assess security posture. - Apply risk management principles more »
trends and tradecraft of Advanced Persistent Manipulators (APM) to drive action and response. The candidate must be able to craft formal intelligence and use incidentresponse best practices to participate in active investigations and document relevant findings of these activities.- Leverage knowledge of marketing and advertising strategies to … cross-functional teams and leadership as appropriate. Further, the candidate is expected to use communication skills to work closely with cross-functional partners in response to actions over a variety of security disciplines to disseminate information and reporting as appropriate in support of TikTok's critical business and operational more »
stakeholders across the organization. • Work closely with the broader security team to align application security efforts with overall security objectives and initiatives. • Participate in incidentresponse activities, including investigating and responding to security incidents and breaches related to applications. All About You • Proven experience in application security, including more »
party monitoring tools to detect issues, perform root cause analysis, and implement remediation actions promptly. Develop comprehensive documentation, runbooks, and playbooks outlining procedures for incidentresponse, troubleshooting, and system maintenance. Qualifications: Bachelor's degree in Computer Science, Engineering, or related field (or equivalent experience). Strong experience with more »
and documentation to support secure DevOps practices. Monitor security metrics and logs to detect and respond to security incidents. Lead and participate in security incidentresponse activities, including root cause analysis and remediation efforts. To be considered for this role, you should have: Must have hands on experience more »
state of MongoDB’s productsCoordinate responses to high-profile supply chain eventsRequirementsBasic understanding of the following security concepts: encryption, access controls, vulnerability management, SSDLC, incidentresponse, and business continuity/disaster recovery as they apply in a cloud environmentBasic understanding of the following cloud networking concepts: VPCs, security more »
for applications & infrastructure on a Sailpoint based project. Responsibilities: Applications deployment to AWS & Azure Managing code & configuration using Git Developing CI/CD pipelines Incident responses Monitoring of production systems Being part of/leading builds across systems Required skills Active HO SC Expert in Azure & AWS environments Skilled more »
Executive will be supporting the development and enforcement of data protection policies, providing assistance with compliance efforts, handling data subject requests, and contributing to incidentresponse and risk mitigation activities. The Data Protection Executive plays a vital role in helping the organization maintain trust with stakeholders and protect more »
dynamic code analysis, security scanning, investigation of security reports from InfoSec, our bug bounty program, or other trusted partners, and direct work with our incidentresponse team on product security issues and incidents. This role has wide-reaching impact, strong autonomy, and the resources and empowerment to make more »