Incident Response Senior Consultant
Incident Response Senior Consultant

Incident Response Senior Consultant

London Full-Time 48000 - 84000 £ / year (est.) Home office (partial)
C

At a Glance

  • Tasks: Lead incident response efforts, analyse threats, and resolve security incidents in real-time.
  • Company: CyberArk is a global leader in Identity Security, trusted by top organisations to protect critical assets.
  • Benefits: Enjoy a diverse workplace, flexible work options, and opportunities for professional growth.
  • Why this job: Join a dynamic team tackling real-world security challenges and make a significant impact.
  • Qualifications: 4+ years in incident investigations, strong communication skills, and experience with EDR systems required.
  • Other info: Diversity and inclusion are core values; all qualified applicants are encouraged to apply.

The predicted salary is between 48000 - 84000 £ per year.

About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk , visit our CyberArk blogs or follow us on X , LinkedIn or Facebook . Job Description CyberArk is seeking a highly skilled Digital Forensics and Incident Response (DFIR) Consultant to join our team. In this role you will be a hands-on technical leader and navigate complex technical incidents, forensics analysis, threat hunting, and malware analysis. You will assist customers in rapidly and effectively resolving security incidents at scale, providing comprehensive incident response, including investigation, containment, and crisis management. Responsibilities: Investigate and analyze incidents with EDR systems to respond to ongoing security incidents in real-time. Develop Incident Response initiatives that improve our ability to respond and remediate security incidents effectively. Tracing malware activity and patterns and understanding how to remove malware non-destructively. Recognize attacker Tools, Tactics, and Procedures (TTP) and Indicators of Compromise (IOC) and apply to future incident response events. Analyze binary files to determine the legitimacy and extract IOCs when possible Conducting forensic examinations on physical devices and performing analyses on live and collected memory. Create and refine detection and incident response playbooks. Collaborate with internal and customer teams to investigate and contain incidents. Produce high-quality written reports, presentations, and recommendations, to key stakeholders including customer leadership, and legal counsel. Establishing a collaborative environment for sharing data on machine timelines and suspicious events. Create operational metrics, key performance indicators (KPIs), and service level objectives to measure team competence. #LI-CB1 Qualifications 4+ years’ experience working with incident investigations and containment procedures 4+ years’ experience with network, disk, memory, and cloud forensics Minimum 1 year of experience leading Incident Response investigations and performing the following: network/log forensics, malware analysis, disk forensics, and memory forensics. Excellent time and project management skills with strong written and verbal communication abilities, capable of creating clear documentation and conveying complex technical concepts concisely. Skilled in building and maintaining effective relationships with customers, managing expectations, and ensuring seamless collaboration to achieve shared objectives Experienced deploying software within customer environments using tools such as Intune, SCCM, GPO, AWS System Manager, Azure Automation, Ansible, Puppet, JAMF, and scripts. Experienced with the following: EDRs such as CrowdStrike Falcon, SentinelOne, MDE Leading projects and debriefing customers Creating and modification of scripts Enterprise security architecture and security controls. Cloud incidents and forensic responses. Malware triage analysis and disk or memory forensics for Windows, macOS, or Linux Software deployment tools such as Intune, Jamf, Ansible, Puppet, SCCM, CPO, and AWS System Manager. Preferred experience: Collection tools such as Splunk, Kibana, or ELK Stack Familiarity with collection tools like Splunk, Kibana, or the ELK Stack. Preferred certifications: Additional Information We are proud to foster a diverse and inclusive workplace, where every individual\’s unique background, perspective, and contribution is celebrated. We believe that by embracing diversity, we drive innovation and create a stronger, more united team. Inclusion is at the heart of who we are and how we succeed. All qualified applicants will receive consideration for employment without regard to race, colour, age, religion, sex, sexual orientation, gender identity, or disability. Upon conditional offer of employment, candidates are required to complete a comprehensive background check as per our internal policy. CyberArk is an equal opportunities employer. If you would like any special arrangements made for your interview, please inform the EMEA Talent Acquisition team upon your application so that we may take steps to accommodate your needs. #J-18808-Ljbffr

Incident Response Senior Consultant employer: Cyberark Software

CyberArk is an exceptional employer, offering a dynamic work environment that prioritises innovation and collaboration in the field of Identity Security. With a strong commitment to employee growth, CyberArk provides extensive training opportunities and encourages team members to take on leadership roles in complex incident response scenarios. Located in a vibrant tech hub, employees benefit from a diverse and inclusive culture that values unique perspectives, fostering both personal and professional development.
C

Contact Detail:

Cyberark Software Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Incident Response Senior Consultant

✨Tip Number 1

Familiarise yourself with CyberArk's products and services, especially their privileged access management solutions. Understanding their offerings will not only help you in interviews but also demonstrate your genuine interest in the company.

✨Tip Number 2

Network with current employees or industry professionals who have experience in incident response. Engaging in conversations on platforms like LinkedIn can provide insights into the company culture and expectations for the role.

✨Tip Number 3

Stay updated on the latest trends and threats in cybersecurity, particularly in digital forensics and incident response. Being knowledgeable about current events can give you an edge during discussions and interviews.

✨Tip Number 4

Prepare to discuss specific incidents you've handled in the past, focusing on your problem-solving skills and technical expertise. Real-world examples will showcase your capabilities and how you can contribute to CyberArk's mission.

We think you need these skills to ace Incident Response Senior Consultant

Digital Forensics
Incident Response
Threat Hunting
Malware Analysis
EDR Systems
Network Forensics
Disk Forensics
Memory Forensics
Cloud Forensics
Technical Documentation
Project Management
Customer Relationship Management
Security Incident Containment
Tools, Tactics, and Procedures (TTP)
Indicators of Compromise (IOC)
Detection Playbook Development
Operational Metrics Creation
Software Deployment Tools
Collaboration Skills
Analytical Skills

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in incident investigations, forensics, and malware analysis. Use specific examples that demonstrate your skills in handling security incidents and your familiarity with EDR systems.

Craft a Compelling Cover Letter: In your cover letter, express your passion for cybersecurity and detail how your background aligns with CyberArk's mission. Mention any specific projects or achievements that showcase your ability to lead incident response initiatives.

Showcase Technical Skills: Clearly list your technical skills related to network, disk, memory, and cloud forensics. Highlight your experience with tools like CrowdStrike Falcon, Splunk, and any scripting languages you are proficient in.

Prepare for Technical Questions: Anticipate technical questions related to incident response and forensics during the interview process. Be ready to discuss your approach to investigating incidents and how you would handle specific scenarios.

How to prepare for a job interview at Cyberark Software

✨Showcase Your Technical Skills

Be prepared to discuss your hands-on experience with incident investigations, malware analysis, and forensics. Highlight specific tools you've used, such as EDR systems or collection tools like Splunk, and be ready to explain how you applied them in real-world scenarios.

✨Demonstrate Problem-Solving Abilities

CyberArk values candidates who can navigate complex technical incidents. Prepare examples of past incidents you've managed, detailing your approach to investigation, containment, and resolution. This will showcase your critical thinking and crisis management skills.

✨Communicate Clearly and Effectively

Strong written and verbal communication skills are essential for this role. Practice explaining complex technical concepts in a clear and concise manner. Be ready to discuss how you've created documentation or reports for stakeholders in previous roles.

✨Emphasise Collaboration and Relationship Building

Highlight your experience working with internal teams and customers. Discuss how you've managed expectations and fostered collaboration during incident response efforts. This will demonstrate your ability to work effectively in a team-oriented environment.

Incident Response Senior Consultant
Cyberark Software
C
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>