2,576 Incident Responder jobs in the United Kingdom

Critical Incident Responder

Plymouth, South West HealthHero

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Permanent

Calling all CISM trained Counsellors – join our Critical Incident Response team as an Affiliate at HealthHero

  • Are you a BACP/UKCP/NCS registered Counsellor?
  • Are you CISM trained?
  • Are you looking to balance your current private practice/work commitments with a Critical Incident Responder role with a leading UK EAP Provider?
  • Do you want to be part of a network of Freelance Clinicians working together and supporting each other to create the highest quality, largest and most innovative mental health service in the UK?

We would like to take this opportunity to give you a brief overview of HealthHero and our services; we are an EAP and offer a range of psychological solutions to customer ranging from Banks to Railways to Insurance companies. We work with a network of experienced clinicians across the UK; our service is bespoke to corporate customers. We would require Critical Incident Stress Management (CISM) training.

Requirements

  • Face to face Counselling
  • BACP/ UKCP/NCS (or equivalent) registered Counsellor
  • CISM trained
  • Provided Onsite and or Remote Support for other companies and/or EAPs
  • Recognised Diploma qualification in Counselling (Level 4 minimum)
  • Minimum 450 hours post-qualification, supervised client hours
  • Experienced in a similar role providing contracted counselling and managing own caseload
  • IT Skills including proficiency using Microsoft Systems as well as electronic clinical record systems

Benefits

  • Valuable experience working with a diverse range of corporate customers
  • Regular debriefs post- delivery of onsite and remote support
  • Competitive fees include your travel expenses and subsistence
  • Full on-boarding training provided
Your fees will be agreed at recruitment stage. HealthHero now uses exclusively the BACS automated payment system on a monthly payment run: (We will aim to action all payments for invoices within 45 days of receipt)
This advertiser has chosen not to accept applicants from your region.

Critical Incident Responder

Exeter, South West HealthHero

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Permanent

Calling all CISM trained Counsellors – join our Critical Incident Response team as an Affiliate at HealthHero

  • Are you a BACP/UKCP/NCS registered Counsellor?
  • Are you CISM trained?
  • Are you looking to balance your current private practice/work commitments with a Critical Incident Responder role with a leading UK EAP Provider?
  • Do you want to be part of a network of Freelance Clinicians working together and supporting each other to create the highest quality, largest and most innovative mental health service in the UK?

We would like to take this opportunity to give you a brief overview of HealthHero and our services; we are an EAP and offer a range of psychological solutions to customer ranging from Banks to Railways to Insurance companies. We work with a network of experienced clinicians across the UK; our service is bespoke to corporate customers. We would require Critical Incident Stress Management (CISM) training.

Requirements

  • Face to face Counselling
  • BACP/ UKCP/NCS (or equivalent) registered Counsellor
  • CISM trained
  • Provided Onsite and or Remote Support for other companies and/or EAPs
  • Recognised Diploma qualification in Counselling (Level 4 minimum)
  • Minimum 450 hours post-qualification, supervised client hours
  • Experienced in a similar role providing contracted counselling and managing own caseload
  • IT Skills including proficiency using Microsoft Systems as well as electronic clinical record systems

Benefits

  • Valuable experience working with a diverse range of corporate customers
  • Regular debriefs post- delivery of onsite and remote support
  • Competitive fees include your travel expenses and subsistence
  • Full on-boarding training provided
Your fees will be agreed at recruitment stage. HealthHero now uses exclusively the BACS automated payment system on a monthly payment run: (We will aim to action all payments for invoices within 45 days of receipt)
This advertiser has chosen not to accept applicants from your region.

Critical Incident Responder

Bournemouth, South West HealthHero

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Permanent

Calling all CISM trained Counsellors – join our Critical Incident Response team as an Affiliate at HealthHero

  • Are you a BACP/UKCP/NCS registered Counsellor?
  • Are you CISM trained?
  • Are you looking to balance your current private practice/work commitments with a Critical Incident Responder role with a leading UK EAP Provider?
  • Do you want to be part of a network of Freelance Clinicians working together and supporting each other to create the highest quality, largest and most innovative mental health service in the UK?

We would like to take this opportunity to give you a brief overview of HealthHero and our services; we are an EAP and offer a range of psychological solutions to customer ranging from Banks to Railways to Insurance companies. We work with a network of experienced clinicians across the UK; our service is bespoke to corporate customers. We would require Critical Incident Stress Management (CISM) training.

Requirements

  • Face to face Counselling
  • BACP/ UKCP/NCS (or equivalent) registered Counsellor
  • CISM trained
  • Provided Onsite and or Remote Support for other companies and/or EAPs
  • Recognised Diploma qualification in Counselling (Level 4 minimum)
  • Minimum 450 hours post-qualification, supervised client hours
  • Experienced in a similar role providing contracted counselling and managing own caseload
  • IT Skills including proficiency using Microsoft Systems as well as electronic clinical record systems

Benefits

  • Valuable experience working with a diverse range of corporate customers
  • Regular debriefs post- delivery of onsite and remote support
  • Competitive fees include your travel expenses and subsistence
  • Full on-boarding training provided
Your fees will be agreed at recruitment stage. HealthHero now uses exclusively the BACS automated payment system on a monthly payment run: (We will aim to action all payments for invoices within 45 days of receipt)
This advertiser has chosen not to accept applicants from your region.

Security Operations Analyst

London, London Microsoft Corporation

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft's mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers' heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.
We are seeking for a passionate cybersecurity professionals to join our growing team of Defenders. In this role, you will proactively detect, investigate, and respond to advanced threats across enterprise environments using cutting-edge and AI enabled security tools and threat intelligence. The ideal candidate combines strong security expertise with a curious mindset and skills to conduct deep threat analysis.
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
**Responsibilities**
**Responsibilities**
+ Monitor, triage, and respond to security incidents using alerts and incidents from Microsoft Defender products (MDE, MDI, MDO, MDA, MDC etc.)
+ Perform proactive threat hunting using hypothesis, and telemetry from endpoints, identities, cloud and network.
+ Develop hunting queries using Kusto Query Language (KQL) or similar to uncover suspicious patterns and behaviors.
+ Investigate security incidents across hybrid environments and contribute to root cause analysis and containment strategies.
+ Collaborate with internal teams (defender, threat intelligence, engineering) to enhance detection logic, develop automations, and improve incident response workflows.
+ Contribute to incident documentation, detection playbooks, and operational runbooks.
+ Stay current with evolving threat landscapes, cloud attack vectors, and advanced persistent threats (APT).
**Qualifications**
**Required Qualifications:**
+ Graduate degree in engineering or equivalent discipline.
+ Experience in cybersecurity (SOC, IR, Threat Hunting, Red Team).
+ Hands-on experience with SIEM, EDR, and cloud-native security tools (Microsoft XDR, Sentinel, CrowdStrike, etc.).
+ Experience with at least one cloud platform (Azure, AWS, GCP) and its associated security services and configurations.
+ Proficiency in KQL, Python, or similar scripting languages for data analysis and automation.
+ Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and adversary TTPs.
+ Familiarity with operating system internals (Windows, Linux) and endpoint/network forensics.
+ Certifications like CISSP, OSCP, CEH, GCIH, AZ-500, SC-200 or similar/equivalent are a plus.
**Preferred Qualifications:**
+ Strong problem-solving and analytical mindset.
+ Excellent communication skills, able to explain technical risks to non-technical stakeholders.
+ Collaborative, team-first approach with ability to influence without direct authority.
+ Continuous learner with a passion for security.
#CISOOrg #RegulatedIndustries
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
This advertiser has chosen not to accept applicants from your region.

Cyber Security Operations Analyst

Transport for London

Posted today

Job Viewed

Tap Again To Close

Job Description

Location:
North Greenwich, London/ Remote working

2 positions Available

Salary £36,500 - £42,000 plus fantastic benefits

About Us
As cyber threats continue to diversify and grow, so too does TfL's need to develop our cyber security culture and capabilities to ensure we continue to protect the services and systems which keep London moving. TfL's cyber security professionals play a critical and ever-increasing role in protecting these services and systems, safeguarding our customers as they travel across London's Transport network

About The Role
The purpose of this role is to deliver technical cyber security support. This support includes the security of TfL's fixed, mobile and virtual environments and associated data contained in these environments. The role will be responsible and accountable for the initial investigation and triaging of Cyber Security events escalating where necessary to senior analysts in the security operations team.

You will Identify, track and document existing and emerging threats for their capabilities and risk which will be used to inform TFL's threat detection capabilities, threat hunting and internal customers. Your role will ensure that all TfL functions are informed about their risks to cyber threats and that TFL are well positioned to identify attacks.

Key Accountabilities

  • Responsible for proactively monitoring TfL systems for malicious activity and intrusions using real time data and alerting from various data sources measured against agreed SLAs.
  • Responsible for ensuring processes and operational documentation is maintained, fit for purpose and updated regularly to reflect changing business needs.
  • Responsible for implementing the TfL Incident Response process for Cyber Security Incidents, in collaboration with key stakeholder across the organisation
  • Responsible for the triaging and investigation of notable events before elevating them to an incident and executing the incident response process.
  • Responsible for investigating and handling escalated events and incidents in collaboration with key stakeholders and seeing them through to closure
  • Responsible for tuning detection and monitoring tooling to provide high fidelity alerting worthy of further investigation and mitigating false positives.
  • Responsible for keeping up to date with current cyber developments and trends, and maintaining your skills through continuous personal development and working collaboratively with colleagues, both internal and external to the team.

Skills

  • Demonstrable skills in using security tooling to provide contextual data to allow for a thorough assessment of an event.
  • Ability to communicate effectively written and verbally and influence others in order to minimise TfL's Cyber Risk through effective monitoring, detection and where necessary mitigation
  • Ability to effectively use a SIEM solution to identify events that warrant further investigation
  • Ability to prioritise tasks according to the risk posed to the TfL environment.
  • Ability to use Threat Intelligence to aid the detection of potential cyber security events and incidents.
  • Ability to work under pressure.

Knowledge

  • Educated to Degree level or equivalent - industry recognised qualifications such as CEH, GCIH, GPEN, GDAT, CISSP
  • Knowledge of cyber security and information security controls best practice with supporting qualifications where possible - such as Security+, Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), CPNI 10 and SANS 20.
  • Knowledge of relevant legislation and government standards - including Security Policy Framework, Information Assurance Maturity Model, Security Essentials, Data Protection Act, Freedom of Information Act, EU Procurement Directives.
  • A broad understanding of network and computer system architecture, operations and protocols.
  • Understanding of information security management concepts to support solutions and processes.

Experience

  • Experience of implementing and managing security monitoring and response in a complex organisation
  • Experience of working in an operational environment such as a SOC, CSIRT or CERT function.
  • Experience on leading the response to a Cyber Security incident or event
  • Experience of mentoring junior analysts
  • Knowledge of the Mitre ATTA&CK and NIST framework and how this can used to further improve security monitoring and detection.
  • Knowledge of the Cyber Kill Chain
  • Technical knowledge of computer network and systems and the necessary controls that can be used to prevent unauthorised access.

Advert closes Wednesday 10th September 2025 at 23.59
Excellent Benefits Include

  • Final salary pension scheme
  • Free travel for you on the TfL network
  • Reimbursement of 75% of the cost of a standard class Ticket for National Rail travel from home or 75% reimbursement on a 28-day flexi ticket
  • 30 days annual leave plus public and bank holidays
  • TfL is committed to work-life balance, operating a hybrid working approach where business and role requirements allow
  • Private healthcare discounted scheme (optional)
  • Tax-efficient cycle-to-work programme
  • Retail, health, leisure and travel offers
  • Discounted Eurostar travel

Additional Information
Please apply supplying your CV preferably in ".docx" format. This document should be A4, in Arial 12 font, and a maximum of 2 pages per document.

If you are shortlisted you may be invited to take part in a Video interview. We endeavour to give candidates as much notice as possible however some interviews/ assessments will be organised at short notice and will require a degree of flexibility. We reserve the right to close the application window early if we receive a high volume of suitable applications.

Equality, diversity and inclusion
We are committed to equality, diversity and inclusion. We want to represent the city we serve, which will help us become a more innovative and efficient organisation. Our goal is to make our recruitment as inclusive as possible. We are a disability confident employer who guarantee an interview to any disabled candidate who meets all of the essential criteria. We also use anonymising software that removes identifying information from CVs and cover letters to make the process fair.

Many of our staff work flexibly in many different ways. Please talk to us at interview about the flexibility you need. We'll see what we can do.

We understand a confidence gap can get in the way of meeting spectacular candidates. So please don't hesitate to apply if you think you have what it takes even if you feel you don't meet all the criteria. We'd love to hear from you.

This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Analyst

London, London Pearson

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

About the Role:
Pearson is looking for an experienced Security Operations Center (SOC) analyst. This role is responsible for performing day-to-day security operations, continuous process improvement, detection engineering and project work related to SOC functions.
Responsibilities:
+ Identify, triage and contain security events, using automation and AI capabilities to reduce mean time to containment.
+ Perform in-depth investigation into the underlying root cause of issues.
+ Identify new detection opportunities and refine existing playbooks.
+ Implement and improve security processes and procedures within the SOC.
+ Ability and willingness to engage in a collaborative and high-performing team environment.
+ Maintain awareness and understanding of the current threat landscape. Analyze threat intelligence with an aim to mitigate emerging risks.
Qualifications:
+ Hands on experience and understanding of fundamental security concepts, SOAR, EDR, NDR and SIEM technologies.
+ Hands on experience with one or more Cloud Service Providers (AWS, Azure, GCP, etc).
+ Demonstrate the ability to multitask, adapt and thrive within a fast-paced environment.
+ Have excellent communication skills and stakeholder management.
+ SANS GCIH certification or equivalent.
+ +4 years' experience working in a Security Operations role.
**Who we are:**
At Pearson, our purpose is simple: to help people realize the life they imagine through learning. We believe that every learning opportunity is a chance for a personal breakthrough. We are the world's lifelong learning company. For us, learning isn't just what we do. It's who we are. To learn more: We are Pearson.
Pearson is an Equal Opportunity Employer and a member of E-Verify. Employment decisions are based on qualifications, merit and business need. Qualified applicants will receive consideration for employment without regard to race, ethnicity, color, religion, sex, sexual orientation, gender identity, gender expression, age, national origin, protected veteran status, disability status or any other group protected by law. We actively seek qualified candidates who are protected veterans and individuals with disabilities as defined under VEVRAA and Section 503 of the Rehabilitation Act.
If you are an individual with a disability and are unable or limited in your ability to use or access our career site as a result of your disability, you may request reasonable accommodations by emailing
**Job:** Security
**Job Family:** TECHNOLOGY
**Organization:** Corporate Strategy & Technology
**Schedule:** FULL_TIME
**Workplace Type:**
**Req ID:** 20801
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Analyst

AB10 1AB Aberdeen, Scotland £55000 Annually WhatJobs

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking an experienced Senior Security Operations Analyst to strengthen their cybersecurity defenses. This role offers a hybrid working arrangement, blending remote analysis with essential on-site collaboration and strategic planning. You will be responsible for monitoring security infrastructure, detecting and responding to threats, and continuously improving the organization's security posture. Your expertise will be crucial in protecting critical assets and ensuring business continuity.

Key Responsibilities:
  • Monitor security alerts and events from various sources, including SIEM, IDS/IPS, and endpoint detection systems.
  • Investigate security incidents, perform root cause analysis, and recommend effective mitigation strategies.
  • Develop and refine security monitoring rules and playbooks to enhance threat detection capabilities.
  • Respond to and manage security incidents, coordinating with relevant teams to contain and eradicate threats.
  • Conduct threat hunting activities to proactively identify emerging and sophisticated attack vectors.
  • Contribute to the development and implementation of security policies and procedures.
  • Perform vulnerability assessments and provide recommendations for remediation.
  • Collaborate with IT infrastructure teams to ensure secure system configurations and deployments.
  • Stay current with the latest cybersecurity threats, attack techniques, and defensive measures.
  • Mentor junior analysts and contribute to team knowledge sharing and training initiatives.

The ideal candidate will have a strong background in cybersecurity operations, with at least 5 years of experience in a similar role. A deep understanding of network protocols, security technologies (SIEM, firewalls, IDS/IPS, EDR), and threat intelligence is essential. Excellent analytical and problem-solving skills are required to effectively analyze complex security events and incidents. Strong communication and interpersonal skills are necessary to collaborate with internal teams and external stakeholders. Relevant security certifications such as CISSP, GSEC, or CEH are highly desirable. This role requires a proactive and vigilant individual who can work effectively in both remote and on-site settings, managing their time efficiently and contributing to a robust security culture. Our client is committed to providing a secure working environment and offers opportunities for professional development and career advancement within their cybersecurity team.
Location Highlight: This hybrid role is associated with operations in Aberdeen, Scotland, UK , requiring regular on-site presence.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Incident responder Jobs in United Kingdom !

Senior Security Operations Analyst

BS1 4AG Bristol, South West £55000 Annually WhatJobs

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a prominent player in the financial services sector, is seeking a highly motivated and experienced Senior Security Operations Analyst to join their dedicated Information Security team. This role is based in Bristol, South West England, UK , with a flexible hybrid working arrangement. You will be a key member of the Security Operations Center (SOC), responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats and incidents across the organization's diverse IT infrastructure.

This position requires a proactive approach to threat hunting, vulnerability management, and incident response. You will work with state-of-the-art security tools, including SIEM, IDS/IPS, EDR, and threat intelligence platforms, to safeguard the company's assets and data. The ideal candidate possesses a deep understanding of cyber threats, attack vectors, and defensive strategies, along with excellent analytical and communication skills.

Key Responsibilities:
  • Monitor security alerts and events from various security tools (SIEM, EDR, IDS/IPS, etc.) to identify potential security incidents.
  • Conduct in-depth analysis of security alerts, determine their severity, and initiate appropriate incident response procedures.
  • Perform threat hunting activities to proactively identify and neutralize advanced threats that may bypass automated security controls.
  • Investigate security breaches and other cybersecurity incidents, documenting findings and providing detailed reports.
  • Develop and refine detection rules, correlation logic, and threat intelligence feeds within the SIEM and other security platforms.
  • Assist in the management and tuning of security technologies to optimize performance and reduce false positives.
  • Participate in the development and execution of incident response playbooks and procedures.
  • Collaborate with IT and other departments to implement security best practices and remediation plans.
  • Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
  • Mentor junior SOC analysts and contribute to the continuous improvement of SOC processes and capabilities.
  • Participate in security awareness training and initiatives.
  • Contribute to vulnerability management efforts, working with relevant teams to prioritize and track remediation.

Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent practical experience.
  • Minimum of 5 years of experience in a Security Operations Center (SOC) environment, incident response, or threat analysis role.
  • Strong understanding of networking protocols, operating systems (Windows, Linux), and common attack vectors.
  • Proficiency with SIEM tools (e.g., Splunk, QRadar, LogRhythm), EDR solutions, and IDS/IPS technologies.
  • Experience with scripting languages (e.g., Python, PowerShell) for automation and analysis is highly desirable.
  • Knowledge of various security frameworks and standards (e.g., NIST CSF, ISO 27001).
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong written and verbal communication skills, with the ability to clearly articulate technical issues to both technical and non-technical audiences.
  • Relevant certifications such as CISSP, GCIH, GCIA, or CEH are a plus.
  • Ability to work effectively in a hybrid environment and contribute to a collaborative team.

This is an excellent opportunity to advance your career in cybersecurity with a respected organization, working on challenging security problems and contributing to the protection of critical digital assets.
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Analyst

BN1 1AA East Sussex, South East £55000 Annually WhatJobs

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled and motivated Senior Security Operations Analyst to join their dynamic information security team. This role is pivotal in maintaining and enhancing the overall security posture of the organization, focusing on proactive threat detection, incident response, and continuous improvement of security controls. The ideal candidate will possess a deep understanding of cybersecurity principles, threat landscapes, and various security tools and technologies.

Responsibilities:
  • Monitor security alerts and events from various sources, including SIEM, IDS/IPS, endpoint detection and response (EDR) solutions, and cloud security platforms.
  • Investigate and analyze security incidents, determine root cause, and implement effective remediation strategies to minimize impact.
  • Develop and refine security monitoring rules, detection logic, and threat hunting methodologies.
  • Conduct regular vulnerability assessments and penetration testing to identify and address weaknesses in the IT infrastructure.
  • Participate in the on-call rotation for incident response, providing timely and effective support during critical events.
  • Collaborate with IT infrastructure, network, and application teams to implement security best practices and solutions.
  • Stay abreast of emerging threats, vulnerabilities, and security technologies, and provide recommendations for enhancing security measures.
  • Contribute to the development and maintenance of incident response playbooks and security policies.
  • Mentor junior security analysts and share knowledge within the team.
Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field; equivalent experience will be considered.
  • Proven experience (5+ years) in a Security Operations Center (SOC) or similar cybersecurity role.
  • Strong understanding of networking protocols, TCP/IP, common attack vectors, and defense mechanisms.
  • Proficiency with SIEM tools (e.g., Splunk, ELK Stack, QRadar) and EDR solutions.
  • Experience with cloud security (AWS, Azure, GCP) is highly desirable.
  • Excellent analytical, problem-solving, and critical-thinking skills.
  • Strong communication and interpersonal skills, with the ability to explain complex technical concepts to both technical and non-technical audiences.
  • Relevant security certifications (e.g., CISSP, GSEC, GCIH) are a plus.
This is an exciting opportunity for a seasoned security professional to make a significant impact in a challenging and rewarding environment. The role offers a hybrid working model, allowing for a blend of remote flexibility and in-office collaboration at our **Brighton, East Sussex, UK** office.
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Analyst

SR1 2AE Sunderland, North East £50000 Annually WhatJobs

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled and motivated Senior Security Operations Analyst to join their dynamic cybersecurity team. This role will involve a hybrid working arrangement, balancing remote flexibility with essential in-office collaboration and access to specialised equipment.

As a Senior Security Operations Analyst, you will be responsible for the day-to-day monitoring, detection, and response to security incidents across the organisation's IT infrastructure. This includes analysing security alerts from various sources such as SIEM, IDS/IPS, endpoint security solutions, and threat intelligence feeds. You will conduct in-depth investigations into potential security breaches, identify root causes, and recommend effective remediation strategies.

Key responsibilities include developing and refining security monitoring rules and use cases within the SIEM platform. You will also play a crucial role in threat hunting, proactively searching for indicators of compromise that may have bypassed existing security controls. The Senior Analyst will contribute to the development and maintenance of incident response playbooks, ensuring a rapid and effective response to security events. Mentoring junior analysts and contributing to the continuous improvement of the Security Operations Centre (SOC) capabilities will also be a key focus.

The ideal candidate will possess a Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience. A minimum of 5 years of experience in a Security Operations Centre (SOC) environment, with at least 2 years in a senior or lead capacity, is required. Strong technical skills in SIEM tools (e.g., Splunk, QRadar, ELK), network security concepts, malware analysis, and forensic techniques are essential. Experience with scripting languages (e.g., Python, PowerShell) for automation is highly desirable.

Possession of relevant certifications such as CISSP, GCIH, GCIA, or CEH is a significant advantage. Excellent analytical and problem-solving skills, coupled with the ability to work under pressure and make critical decisions during high-severity incidents, are vital. Strong communication and teamwork skills are necessary for effective collaboration with other IT teams and business stakeholders. This is a fantastic opportunity to join a growing security team and make a significant impact on the organisation's security posture. The role is based in Sunderland, Tyne and Wear, UK .
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Incident Responder Jobs