Incident Response Analyst

Incident Response Analyst

Bournemouth Full-Time 36000 - 60000 Β£ / year (est.) No home office possible
J

At a Glance

  • Tasks: Join our team as an Incident Response Analyst tackling cybersecurity threats daily.
  • Company: Pentest People is a leading UK security consultancy specialising in Penetration Testing as a Service.
  • Benefits: Enjoy remote work flexibility, corporate perks, and a dynamic team environment.
  • Why this job: Make a real impact on cybersecurity while collaborating with clients and enhancing their security posture.
  • Qualifications: Experience in incident response, digital forensics, and relevant certifications like ECIH or Security + are preferred.
  • Other info: This role requires occasional client site visits; candidates must be UK-based.

The predicted salary is between 36000 - 60000 Β£ per year.

Pentest People is a UK-based security consultancy specialising in providing Penetration Testing as a Service to all its clients. Our innovative approach to security testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment. We’re expanding our Incident Response team and looking for an Incident Response Analyst to join us in tackling some of the most challenging cybersecurity threats.

The role requires analytic thinking, problem solving skills and the ability to work in a fast-paced environment. As part of our dynamic team, you will play a critical role in reducing the impact of cyberattacks and enhancing our clients' security posture to prevent future attacks.

Key responsibilities include:

  • Conducting initial incident assessments and contributing to Incident Response management.
  • Participating in live Incident Response operations including digital forensics.
  • Performing security assessments, threat intelligence gathering and OSINT analysis.
  • Collaborating with other departments to facilitate a holistic cybersecurity service.
  • Engaging with clients on a day-to-day basis and getting access to relevant logs and clients' infrastructure for performing digital forensics.
  • Documenting incidents thoroughly, including timelines, affected systems, actions taken, and recommendations for future improvements.
  • Preparing comprehensive reports for clients.

Technical skills:

  • Demonstrated experience in responding to and investigating incidents whilst utilising various monitoring, detection and investigation tooling – SIEM, SOAR, EDR etc.
  • Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud.
  • Understanding of evidence collection process based on priority.
  • Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases.
  • Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols.
  • Understanding of tabletop exercises, and IR planning.
  • Understanding of Technical Frameworks such as MITRE Attack, Lockheed Martin kill chain or Diamond model.
  • Ability to perform dynamic malware analysis.

Qualifications:

  • Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have.
  • Knowledge of open-source IR tools, such as Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-elk, DFIR IRIS.
  • Experience in Python or Bash or Go.

About you:

  • Experience in managing stakeholders during live incidents to minimise impacts.
  • Strong communication skills, with the ability to manage and coordinate various incidents whilst remaining calm under pressure.
  • Ability to align client deliverables with industry best practices.
  • Experience in threat intelligence and analysis to support proactive IR.
  • Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth.

While this role is advertised as remote, it will require occasional visits to client sites and the office as needed. Candidates must be based in the UK and have the right to work, as we are unable to provide sponsorship at this time. If you do not have SC eligibility, you must meet the requirements for SC, as this may be a necessary criterion.

Pentest People is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.

Incident Response Analyst employer: JR United Kingdom

Pentest People is an exceptional employer, offering a vibrant work culture that fosters innovation and collaboration within the cybersecurity field. With a strong commitment to employee growth, we provide ongoing training and development opportunities, ensuring our team members are equipped to tackle the evolving landscape of cyber threats. Located in the UK, our consultancy not only values diversity and inclusivity but also encourages a healthy work-life balance, making it an ideal place for professionals seeking meaningful and rewarding careers.
J

Contact Detail:

JR United Kingdom Recruiting Team

StudySmarter Expert Advice 🀫

We think this is how you could land Incident Response Analyst

✨Tip Number 1

Familiarise yourself with the NIST 800-61 guidelines, as they are crucial for incident response roles. Understanding these guidelines will not only help you in interviews but also demonstrate your commitment to best practices in cybersecurity.

✨Tip Number 2

Engage with online communities and forums related to incident response and digital forensics. Networking with professionals in the field can provide insights into the latest trends and challenges, making you a more attractive candidate.

✨Tip Number 3

Gain hands-on experience with open-source IR tools like Velociraptor or Volatility. Being able to discuss your practical experience with these tools during interviews will set you apart from other candidates.

✨Tip Number 4

Prepare to discuss real-world scenarios where you've managed stakeholders during incidents. Highlighting your communication skills and ability to remain calm under pressure will resonate well with the hiring team.

We think you need these skills to ace Incident Response Analyst

Analytic Thinking
Problem-Solving Skills
Incident Response Management
Digital Forensics
Log Analysis
Threat Intelligence Gathering
OSINT Analysis
Communication Skills
Stakeholder Management
Technical Frameworks (MITRE Attack, Lockheed Martin Kill Chain, Diamond Model)
Dynamic Malware Analysis
Evidence Collection and Chain-of-Custody Protocols
Knowledge of SIEM, SOAR, EDR Tools
Experience with Open-Source IR Tools
Proficiency in Python, Bash, or Go
Ability to Work Under Pressure
Documentation Skills
Report Preparation

Some tips for your application 🫑

Tailor Your CV: Make sure your CV highlights relevant experience in incident response, digital forensics, and any specific tools mentioned in the job description. Use keywords from the job listing to ensure your application stands out.

Craft a Strong Cover Letter: Write a cover letter that showcases your problem-solving skills and ability to work under pressure. Mention specific examples of past incidents you've managed or responded to, demonstrating your analytical thinking and communication skills.

Highlight Technical Skills: Clearly outline your technical skills related to incident response, such as familiarity with SIEM, EDR, and log analysis across different operating systems. Include any relevant certifications and experience with open-source IR tools.

Prepare for Potential Questions: Anticipate questions related to your experience with incident management and threat intelligence. Be ready to discuss how you would approach various scenarios, showcasing your understanding of NIST guidelines and incident response frameworks.

How to prepare for a job interview at JR United Kingdom

✨Showcase Your Technical Skills

Be prepared to discuss your experience with incident response tools like SIEM, SOAR, and EDR. Highlight specific instances where you've successfully used these tools in past roles, as this will demonstrate your hands-on expertise.

✨Understand the Incident Response Process

Familiarise yourself with the NIST 800-61 guidelines and be ready to explain how you would approach containment, eradication, and recovery during an incident. This shows that you have a solid grasp of industry standards.

✨Communicate Clearly and Confidently

Strong communication skills are crucial for this role. Practice articulating your thoughts clearly, especially when discussing complex technical concepts. This will help you convey your ideas effectively during the interview.

✨Prepare for Scenario-Based Questions

Expect to face scenario-based questions that assess your problem-solving abilities under pressure. Think through potential incidents you might encounter and how you would handle them, demonstrating your analytical thinking and calmness in crisis situations.

Incident Response Analyst
JR United Kingdom
J
  • Incident Response Analyst

    Bournemouth
    Full-Time
    36000 - 60000 Β£ / year (est.)

    Application deadline: 2027-06-17

  • J

    JR United Kingdom

Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>