Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailThese roles will perform analysis and investigations of cyber security incidents often malicious to remediate networks and provide mitigation advice to protect and secure systems. Level 2 and 3 incident response.
Key duties and responsibilities
Identify analyse and resolve information and cyber security incidents.
Contribute to digital forensic investigations.
Communicate technical findings and recommendations.
Create manage review and analyse automated reports and alerts following up on any issues that arise from activity identified in the reports
Manage incident response activities assisting in or leading response and investigation work to progress/resolve security incidents
Provide assistance with the development of technical remediation plans.
Develop use cases identifying and building new use cases (detections alerts etc.) into the departments SIEM technologies.
Review outcomes of incidents and make recommendations including
working with stakeholders to make improvements.
Provide cyber advice to both internal teams or stakeholders in the branch as well as external providers.
Provide assistance to and gather requested information to allow completion of both internal and external audits.
Provide cyber advice and mentoring to staff.
Technical skills
Demonstrated experience with: Incident Response Azure Sentinel Defender XDR Splunk Active Directory Ticket management systems
Full Time