The ideal candidate will have a strong background in Sentinel, Infrastructure as Code (IAC), and Security Operations (SecOps). Key Responsibilities Security Monitoring and IncidentResponse Implement and manage security monitoring solutions using Microsoft Sentinel. Develop and maintain incidentresponse playbooks and procedures. Lead incidentresponse efforts, including investigation, containment, and remediation. Develop and maintain secure IAC templates using tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify more »
London, England, United Kingdom Hybrid / WFH Options
Sportradar
the central point of contact during critical situations, including but not limited to technology, financial, security, privacy, and people, to ensure swift and effective response, addressing people safety issues, minimizing addressing service downtime, and restoring normal operations in alignment with predefined service level agreements (SLAs). The role requires … experts, support functions, and business units, to investigate, diagnose, resolve major incidents efficiently, and ensure regulatory requirements are considered. Root Cause Analysis: Facilitate post-incident reviews and root cause analysis (RCA) sessions to identify the underlying causes of crises and issues and implement preventive measures to avoid recurrence. Drive … continuous improvement through post-incident review reports. Documentation and reporting: Maintain accurate records of crises and major incidents, including incident details, actions taken, resolutions, and post-incident analysis findings, adhering to regulatory and compliance requirements. Monitor key performance indicators (KPIs) and metrics related to incident management more »
scope of pentests and manage the process with engineering. Once issues are identified SecOps work closely with operations and engineering teams to resolve them. Incident management. The team manage our security incidentresponse activities, investigating alerts using tools such as Azure Sentinel. SecOps will coordinate the incidentresponse with resolving teams and engage with key stakeholders for updates. As the team works office hours, engaging a managed SOC provider who cover 24/7 incident management. Beyond close daily collaboration with other security teams, SecOps engages with all teams across the business at every more »
Best Practice Working with various other Security personnel Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incidentresponse and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will … will be a requirement to cover 7am-7pm on a shift basis to ensure that full coverage is achieved. The ideal candidate will have: Incidentresponse and security monitoring Understanding of threat modelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix more »
great training, but also a comprehensive package along side it. As a SOC Analyst, you will be playing a key role in monitoring threats, incidentresponse and day-to-day security operations. Responsibilities: Security Detection and Monitoring IncidentResponse Detection Engineering Malware Analysis (Static and Dynamic more »
to protect against web-based attacks. Ensure optimal performance and security of web applications through proper configuration and tuning of security controls. Monitoring and IncidentResponse: Establish and maintain monitoring and alerting mechanisms for web application security. Investigate and respond to security incidents, including coordinating with relevant teams … WAF technologies, providing training and knowledge sharing across the organization. Documentation and Reporting: Create and maintain detailed documentation of security architectures, configurations, processes, and incident reports. Prepare and present security metrics and reports to management and stakeholders. Continuous Improvement: Stay up-to-date with the latest security trends, vulnerabilities … In-depth understanding of security principles, protocols, and technologies (e.g., SSL/TLS, OWASP Top Ten, DDoS mitigation). Experience with security monitoring and incidentresponse tools. Relevant security certifications (e.g., CISSP, CEH, GIAC) are highly desirable. Excellent problem-solving skills and the ability to work independently and more »
Greater London, England, United Kingdom Hybrid / WFH Options
Trident Search
and allow them to offer the best service possible. This is a senior role, so plenty of experience within SecOps is vital, especially within incidentresponse and engaging with the wider business. This role will also see you have direct reports, so experience in a little leadership or … to further enhance capabilities Experience with malware analysis is essential as you will play a senior role in managing this process. Having ownership over incident management and ensuring incidents are closed out in a timely manner or escalated effectively. Risk analysis across multiple teams and technologies is also required … great internal security role, working with a reputable organisation and a talented team. If you have the right experience and are comfortable with your incidentresponse skills then please do go ahead and apply now. more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
with remote working flexibility. Job Title: Lead Security Analyst Job Type: Permanent Location: London, UK(Remote) Job details: Purpose of the Job Leading the Response: Acting swiftly and decisively during security incidents to mitigate risks. Incident Lifecycle Management: Overseeing incidents from the moment of detection, through the containment … and eradication stages, to the final resolution. Post-Incident Analysis: Conducting detailed investigations post-incident to understand the root cause and to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating … manage security incidents by analyzing alerts from diverse sources and collaborating with external monitors to identify and address potential threats. Serve as a primary incident responder, leading the containment and resolution process in line with established protocols to reduce risks. Enhance security procedures to improve the organization's monitoring more »
City of London, London, United Kingdom Hybrid / WFH Options
Akkodis
for the junior analysts in the team. You will aid in triaging threat intelligence from multiple sources and add contextual information to the security incident, perform additional analysis and based on the business impact will recommend the response actions and escalation path. You will also have the opportunity … L1 and L2 analysts, including objectives setting, performance management/reviews, training & development, and BAU activities including shift cover etc. Perform advanced event and incident analysis, including baseline establishment and trend analysis. Support on-call arrangements as part of a Rota, to support L1 Analysts working out of hours … Support Major IncidentResponse activity, from a Protective Monitoring perspective, including supporting teams in identification, containment, and remediation of security related threat. Provide timely advice and guidance on the response action plans for events and incidents based on incident type and severity. Identify, create and implement more »
City of London, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Incident Responder - Cyber Security - Middle East BAE Systems Digital Intelligence has been contracted to deliver a National Cyber Security Programme in the Middle East as … for 12 months so there are no options for hybrid working as the majority of time will be spend on client site. As an Incident Responder you will be responsible for the Triage of cyber security incidents, determining and categorising which incidents cross the threshold becoming National cyber security … media releases. Manage Incidents on site and across multiple sites. Conduct on-site analysis and collection of data for depth support as part of incident investigation. Identify and propose remediation activities and identify security improvements to prevent future incidents. Direct client IR Teams and In-house malware and forensics more »
Responsibilities: Develop and implement comprehensive information security strategies, policies, and procedures. Conduct risk assessments and vulnerability analyses to identify and mitigate security threats. Lead incidentresponse efforts and manage security breaches efficiently. Collaborate with cross-functional teams to ensure security measures are integrated into all business operations. Stay more »
London, England, United Kingdom Hybrid / WFH Options
Client Server
the appropriate SIEM platform and then once it's embedded ensuring BAU and leading security monitoring, carrying out indepth investigations and actively participating in incident response. This is a high profile role where you'll establish Security Operations Centre procedures and processes from the ground up, collaborating with senior more »
London, England, United Kingdom Hybrid / WFH Options
Jobleads-UK
matters. This includes drafting and implementing privacy strategies, negotiating Data Processing Agreements (DPAs), Standard Contractual Clauses (SCCs), and other privacy-related documentation with clients. IncidentResponse: You’ll assist with incident reports and reviews, ensuring compliance with relevant regulations. DORA Expertise: As part of the escalation point more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
and managing automation scripts for deploying and configuring security agents across large environments. Experience in tuning and optimizing OpenSearch or Elasticsearch indexers. Experience with incidentresponse processes and forensic analysis to support investigations and improve threat detection. Experience with cloud-native security tools and services Desired Qualifications: Advanced more »
party monitoring tools to detect issues, perform root cause analysis, and implement remediation actions promptly. Develop comprehensive documentation, runbooks, and playbooks outlining procedures for incidentresponse, troubleshooting, and system maintenance. Qualifications: Bachelor's degree in Computer Science, Engineering, or related field (or equivalent experience). Strong experience with more »
London, England, United Kingdom Hybrid / WFH Options
Control Risks
to specific cyber threat incidents, data breaches and other cyber security incidents. Build knowledge of collection tools to support bespoke investigative projects and Cyber IncidentResponse engagements. Conduct research on topics which support other service lines, notably Global Risk Analysis, Compliance Forensics and Investigations, and Response. Develop knowledge more »
North West London, London, United Kingdom Hybrid / WFH Options
Client Server
analysing security logs and events, implementing security controls from the CIS security framework, configuring and managing security tools and technologies. You'll participate in incidentresponse activities and collaborate across teams to ensure security is integrated into all aspects of the organisation. You'll have continual learning and more »
London, England, United Kingdom Hybrid / WFH Options
Client Server Careers
analysing security logs and events, implementing security controls from the CIS security framework, configuring and managing security tools and technologies. You'll participate in incidentresponse activities and collaborate across teams to ensure security is integrated into all aspects of the organisation. You'll have continual learning and more »
dynamic code analysis, security scanning, investigation of security reports from InfoSec, our bug bounty program, or other trusted partners, and direct work with our incidentresponse team on product security issues and incidents. This role has wide-reaching impact, strong autonomy, and the resources and empowerment to make more »
function. You will be responsible for keeping their new technology platforms available 24/7/365 by monitoring the Performance, Reliability, Change Management, IncidentResponse, and Capacity Planning for a number of their core services. Some of their key technologies are: AWS Cloud, Dynatrace, Terraform, Biztalk, Kafka … system operations in Production. Collaborate with Client Services, Application Support, Product, Engineering, and Business Operations teams to ensure that for key services uptime, latency, response time, and availability targets are met. Work with the Architecture & Engineering, Product, Application Support, Service Management, Testing, and Security teams to uphold good operational more »
You will work closely with cross-functional teams to design, implement, and maintain robust and resilient systems, with a focus on automation, monitoring, and incident response. The role: • Working arrangements: Flexible – can be fully remote (UK residents only – unfortunately, Visa sponsorship is not offered for this role) Key Responsibilities … and performance in mind. Implement and maintain monitoring, alerting, and logging systems to proactively identify and resolve issues before they impact customers. Participate in incidentresponse and on-call rotations, diagnosing and resolving production issues to minimize downtime and ensure service reliability. Conduct performance analysis and capacity planning more »
engineering expertise including strong proficiency in Python, Go or other languages. • Consulting experience related to helping others gains platform engineering and software engineering skills. • Incidentresponse skills including platform and application problem diagnosis and resolution. • Experience with Terraform, Concourse. • Experience with monitoring systems such as Datadog, Splunk and more »
engineering expertise including strong proficiency in Python, Go or other languages. Consulting experience related to helping others gains platform engineering and software engineering skills. Incidentresponse skills including platform and application problem diagnosis and resolution. Experience with Terraform, Concourse. Experience with monitoring systems such as Datadog, Splunk and more »
Experience automating platform operations including deployment, upgrading, provisioning (onboarding) and maintenance activities. Software engineering expertise including strong proficiency in Python, Go or other languages. Incidentresponse skills including platform and application problem diagnosis/resolution. Experience with Terraform, Concourse. Experience with monitoring systems such as Datadog, Splunk and more »