At a Glance
- Tasks: Join our SIC Team to monitor security alerts and coordinate incident responses.
- Company: DXC Technology is a leading global IT services and consulting firm.
- Benefits: Enjoy flexible hours, remote work options, and opportunities for skill development.
- Why this job: Be part of a dynamic team tackling real-world security challenges and making an impact.
- Qualifications: Experience in cybersecurity incidents and strong analytical skills are essential.
- Other info: Must be willing to obtain security clearance and complete mandatory training.
The predicted salary is between 36000 - 60000 £ per year.
As part of the SIC Team, you will:
- Monitor security tooling, conduct triage and analysis of alerts, events, and security incidents.
- Validate, verify, and report on protective or countermeasure solutions, both technical and administrative.
- Coordinate and investigate security incidents through to resolution.
- Collaborate with resolver groups to respond to and investigate security incidents.
- Manage functional mailboxes and respond to email inquiries from the account and clients.
- Oversee security ticket queues and review and raise security incidents in ticketing systems.
- Assist in security reporting, ensuring timely and quality delivery.
- Prepare and present reports using Microsoft PowerPoint and Excel.
- Provide Critical Incident Response Reports and lessons learned to stakeholders.
- Handle legal and law enforcement-related issues as necessary.
- Review security incidents periodically for trend analysis and recommend improvements or sales opportunities to the Security Delivery Lead.
- Respond to incidents following playbooks and the Security Incident Management Process.
- Advise the account on Critical Security Advisories, including responses to Threat Advisories, ModCerts, Carecert, and emergency patches.
- Develop and maintain a vulnerability management system for zero-day vulnerabilities.
- Manage security information requests from clients.
- Lead on complex incidents and ensure lessons learned are documented and processes are updated.
- Review and update SIC Team processes regularly.
- Ensure all obligations, like monthly reporting, are met on time and to standard.
- Keep the Security Delivery Lead informed of relevant incidents and issues.
- Provide standby (on-call) coverage for high-severity incidents as per rota.
- Work flexible hours as required, e.g., 8am-4pm or 10am-6pm.
- Maintain current security clearance or willingness to obtain one.
Training:
- Complete mandatory training in line with enterprise requirements and deadlines.
- Stay informed on threat actors, advanced persistent threats, and zero-day exploits.
- Show enthusiasm and a desire to develop skills and knowledge.
Person Specifications:
- Experience in handling, responding, and investigating cybersecurity incidents.
- Good analytical skills and experience with log analysis.
- Knowledge of protective monitoring tools (e.g., ArcSight, Tanium, McAfee, Symantec, MS Defender, Microsoft 365, Azure, Azure Sentinel).
- Threat and vulnerability management experience.
- Experience reviewing malware alerts and working in SOCs, ticketing systems, and stakeholder interactions.
- Strong relationship-building skills with colleagues and stakeholders.
- Understanding of security best practices and relevant legislation.
- Self-motivated with up-to-date knowledge of security threats and trends.
- Excellent communication, influencing, negotiating, and engagement skills.
- Leadership skills in team interactions.
- Sound judgment, decision-making, and problem-solving skills; ability to remain calm under pressure.
- Ability to meet tight deadlines and work effectively in high-pressure situations.
- Experience in writing procedures and reports.
- Ability to work independently and as part of a team.
- Recognized security qualifications (e.g., CISSP, CISM) or willingness to obtain them.
- Proven security industry experience, preferably in public sector or armed services.
- Knowledge of tools, equipment, and forensic requirements for incident response and evidence collection.
Security Incident Coordination Analyst employer: DXC Technology
Contact Detail:
DXC Technology Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Incident Coordination Analyst
✨Tip Number 1
Familiarise yourself with the specific security tools mentioned in the job description, such as ArcSight and Tanium. Having hands-on experience or knowledge of these tools will give you an edge during interviews.
✨Tip Number 2
Stay updated on the latest cybersecurity threats and trends. Being able to discuss current incidents or vulnerabilities during your interview will demonstrate your passion and commitment to the field.
✨Tip Number 3
Practice your communication skills, especially in presenting reports. Since the role involves preparing and presenting findings, being articulate and confident will help you stand out.
✨Tip Number 4
Network with professionals in the cybersecurity field. Engaging with others can provide insights into the role and may even lead to referrals, increasing your chances of landing the job.
We think you need these skills to ace Security Incident Coordination Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cybersecurity incident handling and analysis. Emphasise your familiarity with protective monitoring tools and any recognised security qualifications you possess.
Craft a Compelling Cover Letter: In your cover letter, express your enthusiasm for the role and the company. Mention specific experiences that demonstrate your analytical skills and ability to manage security incidents effectively.
Showcase Your Communication Skills: Since the role requires excellent communication and relationship-building skills, provide examples in your application of how you've successfully collaborated with teams or stakeholders in past roles.
Highlight Continuous Learning: Mention any ongoing training or certifications related to cybersecurity that you are pursuing. This shows your commitment to staying informed about security threats and trends, which is crucial for this position.
How to prepare for a job interview at DXC Technology
✨Know Your Tools
Familiarise yourself with the protective monitoring tools mentioned in the job description, such as ArcSight and Microsoft Defender. Be prepared to discuss your experience with these tools and how you've used them in past roles.
✨Demonstrate Analytical Skills
Prepare to showcase your analytical skills by discussing specific incidents you've handled. Use examples that highlight your ability to conduct log analysis and respond effectively to security alerts.
✨Communication is Key
Since the role involves collaboration with various teams, practice articulating your thoughts clearly. Be ready to explain complex security concepts in a way that non-technical stakeholders can understand.
✨Show Enthusiasm for Learning
Express your eagerness to stay updated on security threats and trends. Mention any recent training or certifications you've pursued, and be open about your willingness to obtain recognised security qualifications.