2,576 Incident Responder jobs in the United Kingdom
Critical Incident Responder
Posted 1 day ago
Job Viewed
Job Description
Calling all CISM trained Counsellors – join our Critical Incident Response team as an Affiliate at HealthHero
- Are you a BACP/UKCP/NCS registered Counsellor?
- Are you CISM trained?
- Are you looking to balance your current private practice/work commitments with a Critical Incident Responder role with a leading UK EAP Provider?
- Do you want to be part of a network of Freelance Clinicians working together and supporting each other to create the highest quality, largest and most innovative mental health service in the UK?
We would like to take this opportunity to give you a brief overview of HealthHero and our services; we are an EAP and offer a range of psychological solutions to customer ranging from Banks to Railways to Insurance companies. We work with a network of experienced clinicians across the UK; our service is bespoke to corporate customers. We would require Critical Incident Stress Management (CISM) training.
Requirements
- Face to face Counselling
- BACP/ UKCP/NCS (or equivalent) registered Counsellor
- CISM trained
- Provided Onsite and or Remote Support for other companies and/or EAPs
- Recognised Diploma qualification in Counselling (Level 4 minimum)
- Minimum 450 hours post-qualification, supervised client hours
- Experienced in a similar role providing contracted counselling and managing own caseload
- IT Skills including proficiency using Microsoft Systems as well as electronic clinical record systems
Benefits
- Valuable experience working with a diverse range of corporate customers
- Regular debriefs post- delivery of onsite and remote support
- Competitive fees include your travel expenses and subsistence
- Full on-boarding training provided
Critical Incident Responder
Posted 1 day ago
Job Viewed
Job Description
Calling all CISM trained Counsellors – join our Critical Incident Response team as an Affiliate at HealthHero
- Are you a BACP/UKCP/NCS registered Counsellor?
- Are you CISM trained?
- Are you looking to balance your current private practice/work commitments with a Critical Incident Responder role with a leading UK EAP Provider?
- Do you want to be part of a network of Freelance Clinicians working together and supporting each other to create the highest quality, largest and most innovative mental health service in the UK?
We would like to take this opportunity to give you a brief overview of HealthHero and our services; we are an EAP and offer a range of psychological solutions to customer ranging from Banks to Railways to Insurance companies. We work with a network of experienced clinicians across the UK; our service is bespoke to corporate customers. We would require Critical Incident Stress Management (CISM) training.
Requirements
- Face to face Counselling
- BACP/ UKCP/NCS (or equivalent) registered Counsellor
- CISM trained
- Provided Onsite and or Remote Support for other companies and/or EAPs
- Recognised Diploma qualification in Counselling (Level 4 minimum)
- Minimum 450 hours post-qualification, supervised client hours
- Experienced in a similar role providing contracted counselling and managing own caseload
- IT Skills including proficiency using Microsoft Systems as well as electronic clinical record systems
Benefits
- Valuable experience working with a diverse range of corporate customers
- Regular debriefs post- delivery of onsite and remote support
- Competitive fees include your travel expenses and subsistence
- Full on-boarding training provided
Critical Incident Responder
Posted 1 day ago
Job Viewed
Job Description
Calling all CISM trained Counsellors – join our Critical Incident Response team as an Affiliate at HealthHero
- Are you a BACP/UKCP/NCS registered Counsellor?
- Are you CISM trained?
- Are you looking to balance your current private practice/work commitments with a Critical Incident Responder role with a leading UK EAP Provider?
- Do you want to be part of a network of Freelance Clinicians working together and supporting each other to create the highest quality, largest and most innovative mental health service in the UK?
We would like to take this opportunity to give you a brief overview of HealthHero and our services; we are an EAP and offer a range of psychological solutions to customer ranging from Banks to Railways to Insurance companies. We work with a network of experienced clinicians across the UK; our service is bespoke to corporate customers. We would require Critical Incident Stress Management (CISM) training.
Requirements
- Face to face Counselling
- BACP/ UKCP/NCS (or equivalent) registered Counsellor
- CISM trained
- Provided Onsite and or Remote Support for other companies and/or EAPs
- Recognised Diploma qualification in Counselling (Level 4 minimum)
- Minimum 450 hours post-qualification, supervised client hours
- Experienced in a similar role providing contracted counselling and managing own caseload
- IT Skills including proficiency using Microsoft Systems as well as electronic clinical record systems
Benefits
- Valuable experience working with a diverse range of corporate customers
- Regular debriefs post- delivery of onsite and remote support
- Competitive fees include your travel expenses and subsistence
- Full on-boarding training provided
Security Operations Analyst
Posted 8 days ago
Job Viewed
Job Description
We are seeking for a passionate cybersecurity professionals to join our growing team of Defenders. In this role, you will proactively detect, investigate, and respond to advanced threats across enterprise environments using cutting-edge and AI enabled security tools and threat intelligence. The ideal candidate combines strong security expertise with a curious mindset and skills to conduct deep threat analysis.
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
**Responsibilities**
**Responsibilities**
+ Monitor, triage, and respond to security incidents using alerts and incidents from Microsoft Defender products (MDE, MDI, MDO, MDA, MDC etc.)
+ Perform proactive threat hunting using hypothesis, and telemetry from endpoints, identities, cloud and network.
+ Develop hunting queries using Kusto Query Language (KQL) or similar to uncover suspicious patterns and behaviors.
+ Investigate security incidents across hybrid environments and contribute to root cause analysis and containment strategies.
+ Collaborate with internal teams (defender, threat intelligence, engineering) to enhance detection logic, develop automations, and improve incident response workflows.
+ Contribute to incident documentation, detection playbooks, and operational runbooks.
+ Stay current with evolving threat landscapes, cloud attack vectors, and advanced persistent threats (APT).
**Qualifications**
**Required Qualifications:**
+ Graduate degree in engineering or equivalent discipline.
+ Experience in cybersecurity (SOC, IR, Threat Hunting, Red Team).
+ Hands-on experience with SIEM, EDR, and cloud-native security tools (Microsoft XDR, Sentinel, CrowdStrike, etc.).
+ Experience with at least one cloud platform (Azure, AWS, GCP) and its associated security services and configurations.
+ Proficiency in KQL, Python, or similar scripting languages for data analysis and automation.
+ Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and adversary TTPs.
+ Familiarity with operating system internals (Windows, Linux) and endpoint/network forensics.
+ Certifications like CISSP, OSCP, CEH, GCIH, AZ-500, SC-200 or similar/equivalent are a plus.
**Preferred Qualifications:**
+ Strong problem-solving and analytical mindset.
+ Excellent communication skills, able to explain technical risks to non-technical stakeholders.
+ Collaborative, team-first approach with ability to influence without direct authority.
+ Continuous learner with a passion for security.
#CISOOrg #RegulatedIndustries
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Cyber Security Operations Analyst
Posted today
Job Viewed
Job Description
Location:
North Greenwich, London/ Remote working
2 positions Available
Salary £36,500 - £42,000 plus fantastic benefits
About Us
As cyber threats continue to diversify and grow, so too does TfL's need to develop our cyber security culture and capabilities to ensure we continue to protect the services and systems which keep London moving. TfL's cyber security professionals play a critical and ever-increasing role in protecting these services and systems, safeguarding our customers as they travel across London's Transport network
About The Role
The purpose of this role is to deliver technical cyber security support. This support includes the security of TfL's fixed, mobile and virtual environments and associated data contained in these environments. The role will be responsible and accountable for the initial investigation and triaging of Cyber Security events escalating where necessary to senior analysts in the security operations team.
You will Identify, track and document existing and emerging threats for their capabilities and risk which will be used to inform TFL's threat detection capabilities, threat hunting and internal customers. Your role will ensure that all TfL functions are informed about their risks to cyber threats and that TFL are well positioned to identify attacks.
Key Accountabilities
- Responsible for proactively monitoring TfL systems for malicious activity and intrusions using real time data and alerting from various data sources measured against agreed SLAs.
- Responsible for ensuring processes and operational documentation is maintained, fit for purpose and updated regularly to reflect changing business needs.
- Responsible for implementing the TfL Incident Response process for Cyber Security Incidents, in collaboration with key stakeholder across the organisation
- Responsible for the triaging and investigation of notable events before elevating them to an incident and executing the incident response process.
- Responsible for investigating and handling escalated events and incidents in collaboration with key stakeholders and seeing them through to closure
- Responsible for tuning detection and monitoring tooling to provide high fidelity alerting worthy of further investigation and mitigating false positives.
- Responsible for keeping up to date with current cyber developments and trends, and maintaining your skills through continuous personal development and working collaboratively with colleagues, both internal and external to the team.
Skills
- Demonstrable skills in using security tooling to provide contextual data to allow for a thorough assessment of an event.
- Ability to communicate effectively written and verbally and influence others in order to minimise TfL's Cyber Risk through effective monitoring, detection and where necessary mitigation
- Ability to effectively use a SIEM solution to identify events that warrant further investigation
- Ability to prioritise tasks according to the risk posed to the TfL environment.
- Ability to use Threat Intelligence to aid the detection of potential cyber security events and incidents.
- Ability to work under pressure.
Knowledge
- Educated to Degree level or equivalent - industry recognised qualifications such as CEH, GCIH, GPEN, GDAT, CISSP
- Knowledge of cyber security and information security controls best practice with supporting qualifications where possible - such as Security+, Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), CPNI 10 and SANS 20.
- Knowledge of relevant legislation and government standards - including Security Policy Framework, Information Assurance Maturity Model, Security Essentials, Data Protection Act, Freedom of Information Act, EU Procurement Directives.
- A broad understanding of network and computer system architecture, operations and protocols.
- Understanding of information security management concepts to support solutions and processes.
Experience
- Experience of implementing and managing security monitoring and response in a complex organisation
- Experience of working in an operational environment such as a SOC, CSIRT or CERT function.
- Experience on leading the response to a Cyber Security incident or event
- Experience of mentoring junior analysts
- Knowledge of the Mitre ATTA&CK and NIST framework and how this can used to further improve security monitoring and detection.
- Knowledge of the Cyber Kill Chain
- Technical knowledge of computer network and systems and the necessary controls that can be used to prevent unauthorised access.
Advert closes Wednesday 10th September 2025 at 23.59
Excellent Benefits Include
- Final salary pension scheme
- Free travel for you on the TfL network
- Reimbursement of 75% of the cost of a standard class Ticket for National Rail travel from home or 75% reimbursement on a 28-day flexi ticket
- 30 days annual leave plus public and bank holidays
- TfL is committed to work-life balance, operating a hybrid working approach where business and role requirements allow
- Private healthcare discounted scheme (optional)
- Tax-efficient cycle-to-work programme
- Retail, health, leisure and travel offers
- Discounted Eurostar travel
Additional Information
Please apply supplying your CV preferably in ".docx" format. This document should be A4, in Arial 12 font, and a maximum of 2 pages per document.
If you are shortlisted you may be invited to take part in a Video interview. We endeavour to give candidates as much notice as possible however some interviews/ assessments will be organised at short notice and will require a degree of flexibility. We reserve the right to close the application window early if we receive a high volume of suitable applications.
Equality, diversity and inclusion
We are committed to equality, diversity and inclusion. We want to represent the city we serve, which will help us become a more innovative and efficient organisation. Our goal is to make our recruitment as inclusive as possible. We are a disability confident employer who guarantee an interview to any disabled candidate who meets all of the essential criteria. We also use anonymising software that removes identifying information from CVs and cover letters to make the process fair.
Many of our staff work flexibly in many different ways. Please talk to us at interview about the flexibility you need. We'll see what we can do.
We understand a confidence gap can get in the way of meeting spectacular candidates. So please don't hesitate to apply if you think you have what it takes even if you feel you don't meet all the criteria. We'd love to hear from you.
Senior Security Operations Analyst
Posted 6 days ago
Job Viewed
Job Description
Pearson is looking for an experienced Security Operations Center (SOC) analyst. This role is responsible for performing day-to-day security operations, continuous process improvement, detection engineering and project work related to SOC functions.
Responsibilities:
+ Identify, triage and contain security events, using automation and AI capabilities to reduce mean time to containment.
+ Perform in-depth investigation into the underlying root cause of issues.
+ Identify new detection opportunities and refine existing playbooks.
+ Implement and improve security processes and procedures within the SOC.
+ Ability and willingness to engage in a collaborative and high-performing team environment.
+ Maintain awareness and understanding of the current threat landscape. Analyze threat intelligence with an aim to mitigate emerging risks.
Qualifications:
+ Hands on experience and understanding of fundamental security concepts, SOAR, EDR, NDR and SIEM technologies.
+ Hands on experience with one or more Cloud Service Providers (AWS, Azure, GCP, etc).
+ Demonstrate the ability to multitask, adapt and thrive within a fast-paced environment.
+ Have excellent communication skills and stakeholder management.
+ SANS GCIH certification or equivalent.
+ +4 years' experience working in a Security Operations role.
**Who we are:**
At Pearson, our purpose is simple: to help people realize the life they imagine through learning. We believe that every learning opportunity is a chance for a personal breakthrough. We are the world's lifelong learning company. For us, learning isn't just what we do. It's who we are. To learn more: We are Pearson.
Pearson is an Equal Opportunity Employer and a member of E-Verify. Employment decisions are based on qualifications, merit and business need. Qualified applicants will receive consideration for employment without regard to race, ethnicity, color, religion, sex, sexual orientation, gender identity, gender expression, age, national origin, protected veteran status, disability status or any other group protected by law. We actively seek qualified candidates who are protected veterans and individuals with disabilities as defined under VEVRAA and Section 503 of the Rehabilitation Act.
If you are an individual with a disability and are unable or limited in your ability to use or access our career site as a result of your disability, you may request reasonable accommodations by emailing
**Job:** Security
**Job Family:** TECHNOLOGY
**Organization:** Corporate Strategy & Technology
**Schedule:** FULL_TIME
**Workplace Type:**
**Req ID:** 20801
Senior Security Operations Analyst
Posted 3 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, and endpoint detection systems.
- Investigate security incidents, perform root cause analysis, and recommend effective mitigation strategies.
- Develop and refine security monitoring rules and playbooks to enhance threat detection capabilities.
- Respond to and manage security incidents, coordinating with relevant teams to contain and eradicate threats.
- Conduct threat hunting activities to proactively identify emerging and sophisticated attack vectors.
- Contribute to the development and implementation of security policies and procedures.
- Perform vulnerability assessments and provide recommendations for remediation.
- Collaborate with IT infrastructure teams to ensure secure system configurations and deployments.
- Stay current with the latest cybersecurity threats, attack techniques, and defensive measures.
- Mentor junior analysts and contribute to team knowledge sharing and training initiatives.
The ideal candidate will have a strong background in cybersecurity operations, with at least 5 years of experience in a similar role. A deep understanding of network protocols, security technologies (SIEM, firewalls, IDS/IPS, EDR), and threat intelligence is essential. Excellent analytical and problem-solving skills are required to effectively analyze complex security events and incidents. Strong communication and interpersonal skills are necessary to collaborate with internal teams and external stakeholders. Relevant security certifications such as CISSP, GSEC, or CEH are highly desirable. This role requires a proactive and vigilant individual who can work effectively in both remote and on-site settings, managing their time efficiently and contributing to a robust security culture. Our client is committed to providing a secure working environment and offers opportunities for professional development and career advancement within their cybersecurity team.
Location Highlight: This hybrid role is associated with operations in Aberdeen, Scotland, UK , requiring regular on-site presence.
Be The First To Know
About the latest Incident responder Jobs in United Kingdom !
Senior Security Operations Analyst
Posted 3 days ago
Job Viewed
Job Description
This position requires a proactive approach to threat hunting, vulnerability management, and incident response. You will work with state-of-the-art security tools, including SIEM, IDS/IPS, EDR, and threat intelligence platforms, to safeguard the company's assets and data. The ideal candidate possesses a deep understanding of cyber threats, attack vectors, and defensive strategies, along with excellent analytical and communication skills.
Key Responsibilities:
- Monitor security alerts and events from various security tools (SIEM, EDR, IDS/IPS, etc.) to identify potential security incidents.
- Conduct in-depth analysis of security alerts, determine their severity, and initiate appropriate incident response procedures.
- Perform threat hunting activities to proactively identify and neutralize advanced threats that may bypass automated security controls.
- Investigate security breaches and other cybersecurity incidents, documenting findings and providing detailed reports.
- Develop and refine detection rules, correlation logic, and threat intelligence feeds within the SIEM and other security platforms.
- Assist in the management and tuning of security technologies to optimize performance and reduce false positives.
- Participate in the development and execution of incident response playbooks and procedures.
- Collaborate with IT and other departments to implement security best practices and remediation plans.
- Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Mentor junior SOC analysts and contribute to the continuous improvement of SOC processes and capabilities.
- Participate in security awareness training and initiatives.
- Contribute to vulnerability management efforts, working with relevant teams to prioritize and track remediation.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent practical experience.
- Minimum of 5 years of experience in a Security Operations Center (SOC) environment, incident response, or threat analysis role.
- Strong understanding of networking protocols, operating systems (Windows, Linux), and common attack vectors.
- Proficiency with SIEM tools (e.g., Splunk, QRadar, LogRhythm), EDR solutions, and IDS/IPS technologies.
- Experience with scripting languages (e.g., Python, PowerShell) for automation and analysis is highly desirable.
- Knowledge of various security frameworks and standards (e.g., NIST CSF, ISO 27001).
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to clearly articulate technical issues to both technical and non-technical audiences.
- Relevant certifications such as CISSP, GCIH, GCIA, or CEH are a plus.
- Ability to work effectively in a hybrid environment and contribute to a collaborative team.
This is an excellent opportunity to advance your career in cybersecurity with a respected organization, working on challenging security problems and contributing to the protection of critical digital assets.
Senior Security Operations Analyst
Posted 4 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, endpoint detection and response (EDR) solutions, and cloud security platforms.
- Investigate and analyze security incidents, determine root cause, and implement effective remediation strategies to minimize impact.
- Develop and refine security monitoring rules, detection logic, and threat hunting methodologies.
- Conduct regular vulnerability assessments and penetration testing to identify and address weaknesses in the IT infrastructure.
- Participate in the on-call rotation for incident response, providing timely and effective support during critical events.
- Collaborate with IT infrastructure, network, and application teams to implement security best practices and solutions.
- Stay abreast of emerging threats, vulnerabilities, and security technologies, and provide recommendations for enhancing security measures.
- Contribute to the development and maintenance of incident response playbooks and security policies.
- Mentor junior security analysts and share knowledge within the team.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field; equivalent experience will be considered.
- Proven experience (5+ years) in a Security Operations Center (SOC) or similar cybersecurity role.
- Strong understanding of networking protocols, TCP/IP, common attack vectors, and defense mechanisms.
- Proficiency with SIEM tools (e.g., Splunk, ELK Stack, QRadar) and EDR solutions.
- Experience with cloud security (AWS, Azure, GCP) is highly desirable.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Strong communication and interpersonal skills, with the ability to explain complex technical concepts to both technical and non-technical audiences.
- Relevant security certifications (e.g., CISSP, GSEC, GCIH) are a plus.
Senior Security Operations Analyst
Posted 8 days ago
Job Viewed
Job Description
As a Senior Security Operations Analyst, you will be responsible for the day-to-day monitoring, detection, and response to security incidents across the organisation's IT infrastructure. This includes analysing security alerts from various sources such as SIEM, IDS/IPS, endpoint security solutions, and threat intelligence feeds. You will conduct in-depth investigations into potential security breaches, identify root causes, and recommend effective remediation strategies.
Key responsibilities include developing and refining security monitoring rules and use cases within the SIEM platform. You will also play a crucial role in threat hunting, proactively searching for indicators of compromise that may have bypassed existing security controls. The Senior Analyst will contribute to the development and maintenance of incident response playbooks, ensuring a rapid and effective response to security events. Mentoring junior analysts and contributing to the continuous improvement of the Security Operations Centre (SOC) capabilities will also be a key focus.
The ideal candidate will possess a Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience. A minimum of 5 years of experience in a Security Operations Centre (SOC) environment, with at least 2 years in a senior or lead capacity, is required. Strong technical skills in SIEM tools (e.g., Splunk, QRadar, ELK), network security concepts, malware analysis, and forensic techniques are essential. Experience with scripting languages (e.g., Python, PowerShell) for automation is highly desirable.
Possession of relevant certifications such as CISSP, GCIH, GCIA, or CEH is a significant advantage. Excellent analytical and problem-solving skills, coupled with the ability to work under pressure and make critical decisions during high-severity incidents, are vital. Strong communication and teamwork skills are necessary for effective collaboration with other IT teams and business stakeholders. This is a fantastic opportunity to join a growing security team and make a significant impact on the organisation's security posture. The role is based in Sunderland, Tyne and Wear, UK .