3 days ago Be among the first 25 applicants
Direct message the job poster from Stott and May
Helping Cyber Security Experts Secure Contracts & B2B Roles | CERT/CIRT, SOC, DFIR, Threat Intel, GRC, AppSec, IAM, OT & Cloud Security | Europe
As an Incident Response & Forensic Analyst, your primary responsibility will be to assist clients in managing and mitigating security incidents. You will analyze security breaches, conduct forensic investigations, and implement security measures to enhance overall resilience. Your role is crucial in ensuring clients are well-prepared for potential threats and capable of recovering effectively after an attack.
Key Responsibilities
* Monitor & Analyze: Continuously assess security alerts and incidents to identify potential threats
* Forensic Investigations: Perform detailed forensic analysis on hosts, logs, and networks to understand attack vectors and their impact
* Incident Response: Develop, implement, and execute incident response plans for effective threat mitigation
* Collaboration: Work closely with internal teams and external stakeholders to address security incidents
* Disaster Recovery: Assist in restoring client infrastructure post-incident to minimize downtime and operational disruptions
* Process Improvement: Contribute to refining security processes, procedures, and best practices
* Threat Intelligence: Conduct environmental assessments to proactively identify vulnerabilities and threats
* Recovery Measures: Evaluate and implement necessary recovery strategies and security reinforcements
* Availability & Adaptability: Be highly responsive during on-call rotations, manage pressure efficiently, and handle incident resolution with a calm, methodical approach
Must-Have Qualifications
* Minimum 3 years of experience in roles such as CSIRT Analyst/Engineer, SOC Analyst, Security Engineer, or similar
* Strong stress management skills and willingness to work outside office hours
* Proven analytical and problem-solving abilities
* Hands-on experience with forensic investigation tools and techniques
* Strong critical thinking, precision, and attention to detail
* Prior exposure to crisis management and writing forensic reports
* Deep understanding of network protocols, operating systems, and security technologies
* Excellent oral and written communication skills
Nice-to-Have Qualifications
* Industry-recognized cybersecurity certifications (e.g., CISSP, GCFA, GCIH, OSCP)
* Familiarity with offensive security techniques (Red Teaming)
* Interest in mentoring junior colleagues
* Passion for malware analysis and cybersecurity research
Seniority Level
Mid-Senior level
Employment Type
Contract
Job Function
Information Technology and Consulting
Industries
Information Services
#J-18808-Ljbffr