Enable job alerts via email!

Cyber Incident Response Specialist

Morson Talent

United Kingdom

Hybrid

GBP 60,000 - 80,000

Full time

Today
Be an early applicant

Job summary

A leading recruitment agency seeks a Cybersecurity Incident Response Specialist to investigate and manage security incidents. The role offers a competitive daily rate and allows for remote work with occasional trips to London. Ideal candidates will have over 5 years of experience in IT Security and demonstrated skills in forensics and incident management.

Qualifications

  • At least 5 years' experience in Incident Management, SecOps or IT Security.
  • Experience of reviewing SIEM alerts and responding to them appropriately.
  • Capable of forensics to reverse-engineer malware.
  • Knowledge of cybersecurity best practices for Windows, Linux, and Mac systems.

Responsibilities

  • Investigate and analyze security incidents.
  • Support incident management and communicate with stakeholders.
  • Contribute to incident management playbooks.
  • Evaluate the resilience of cybersecurity controls post-incident.

Skills

Incident Management
Forensics
Cybersecurity
Threat Hunting
Splunk
SIEM Alert Review

Tools

Splunk
EDR Systems (Defender, Symantec)
KQL
SPL
Azure
AWS
Job description
Overview

Cybersecurity Incident Response Specialist - CONTRACT OPPORTUNITY

  • Remote with occasional trips to London (not expensed).
  • £750.00 per day.
  • 6 months.
  • ASAP start, ASAP interviews.
  • Right to work in the UK mandatory.

The Cybersecurity Incident Response Specialist will be responsible for investigating, analysing and providing specialist expertise for the resolution of security incidents / attacks aimed at the client.

Support the long-term strategic goals of Cyber Operations pillar support Senior Analysts and Analysts in managing incidents and liaise with SOC engineers to ensure appropriate security measures, technologies and processes are in place to avoid reoccurrence of incidents.

Incident detection
  • Demonstrate an ability to understand in detail how an incident has occurred without relying on alerts (e.g., reviewing logs and threat intelligence data).
  • Support the Analyst in prioritizing incidents for further analysis, response, or closure.
Incident management
  • Provide specialist knowledge on specific types of attacks.
  • Support Senior Analyst and Analyst in the management of an incident.
Objectives
  • Provide specialist input for the management of incidents where it is required. Identify, analyse, mitigate cybersecurity incidents. Minimise the overall effects of any incident.
  • Liaise with Incident Response Lead where specialist input is required for the approval of incident reports and mitigations. Provide reports and updates to the wider team on incident management.
  • Contribute to the development and maintenance of the Incident Management & Response playbooks.
  • Develop and implement procedures related to incident handling. Perform post-incident reviews.
  • Evaluate the resilience of the cybersecurity controls and mitigation actions taken after an incident.
  • Assist in cyber security and forensic investigations when they arise.
  • Demonstrate an ability to understand in detail how an incident has occurred without relying on alerts (e.g., reviewing logs and threat intelligence data). Support the Analyst in prioritizing incidents for further analysis, response, or closure.
  • Provide specialist knowledge on specific types of attacks. Support Senior Analyst and Analyst in the management of an incident.
  • Recommend mitigations for vulnerabilities of operating systems and APIs.Capable of forensics to reverse-engineer malware as well as support Senior Analysts in closing incidents when called upon
Desired Experience
  • Demonstrate understanding of vulnerabilities of operating systems and APIs and recommend mitigations.
  • Capable of forensics to reverse-engineer malware as well as support Senior Analysts in closing incidents when called upon.
  • Qualifications and Experience
  • At least 5 years' experience in Incident Management, SecOps or IT Security
  • Experience of reviewing SIEM alerts and responding to them appropriately
  • Experience working through cyber investigations independently
  • Proven experience of Splunk or Sentinel
  • Worked with EDR systems such as Defender or Symantec
  • Knowledge of KQL and SPL
  • Threat Hunting experience
  • Experience working with third-party suppliers and vendors
  • Familiarity with enterprise security controls and security best practices for Windows, Linux, and Mac systems or similar
  • Experience of working with and securing Azure & AWZ cloud workloads
  • Ideally have experience in:
  • AZ-500 or comparable level of knowledge
  • CCSP/CCSK ideal but not essential
  • CISSP ideal but not essential
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.