At a Glance
- Tasks: Strengthen incident response capabilities and improve cyber security playbooks.
- Company: Join SP Energy Networks, a leader in cyber resilience.
- Benefits: Flexible working, competitive pay, and opportunities for professional growth.
- Other info: Collaborative environment with opportunities to shape cyber security strategy.
- Why this job: Make a real impact on cyber security and help protect essential services.
- Qualifications: Experience in incident response and strong documentation skills required.
The predicted salary is between 50000 - 60000 £ per year.
Scottish Power HQ, Glasgow
Flexible & Hybrid working pattern
Negotiable rate, Inside IR35, PAYE and UMB options available
Help us create a better future, quicker. SP Energy Networks (SPEN) has kicked off an ambitious security transformation programme to transparently reduce risk, achieve compliance with NIS regulations and deliver a cyber resilient business. The Incident Response Analyst is essential in achieving our goals. This role will be integrated into an active and ambitious global cyber security function, contributing to SPEN's cyber security purpose of delivering cyber resilient OT and IT, to enable a safe and reliable electricity supply to customers.
What you'll be doing:
- You will play a central role in strengthening SPEN's incident response capability by developing, maintaining, and continuously improving cyber security playbooks, procedures, and associated documentation.
- You'll work closely with incident responders, detection engineers, and wider cyber teams to ensure processes are clear, repeatable, and aligned with best practice.
- You'll support the full incident lifecycle - from preparation through to post incident review - ensuring lessons learned are captured, documented, and fed into future improvements.
- As part of this, you will contribute to the maturity of SPEN's cyber response framework, ensuring playbooks are operationally effective, compliant with NIS regulations, and tailored to our evolving OT and IT environments.
- You will also be responsible for developing and delivering an incident response exercise plan covering a range of scenarios designed to test team readiness, validate playbooks, and ensure operational effectiveness.
- These exercises may include tabletop scenarios, technical simulations, cross team coordination drills, and lessons learned reviews that contribute directly to capability uplift.
- Building strong working relationships across the business will be key. You'll engage with operational, engineering, legal, risk, communications, and technology stakeholders to understand their requirements, coordinate incident response activities when required, and ensure that documentation and processes reflect real world operational needs.
- You will also have the opportunity to help shape the wider strategy of the Incident Response function - identifying capability gaps, contributing to team roadmaps, supporting cross industry collaboration, and driving continual service improvement within SPEN's cyber resilience programme.
What you'll bring:
- Experience developing, maintaining, or executing incident response playbooks, runbooks, or procedures within a cyber security environment.
- Strong documentation skills - with the ability to translate complex technical activities into clear, structured, and usable operational guidance.
- Ability to plan, deliver, and evaluate incident response exercises - such as tabletop scenarios, simulation based drills, or cross team coordination activities - with a focus on validating playbooks and improving operational readiness.
- Demonstrable experience building effective relationships with technical and non-technical stakeholders, with the ability to collaborate, influence, and communicate clearly during both day to day operations and during security incidents.
- A good understanding of the incident response lifecycle, common attack techniques (MITRE ATT&CK), and how incident response processes integrate with threat detection, monitoring, and wider security operations.
Incident Response Analyst in Paisley employer: Morson Edge
Contact Detail:
Morson Edge Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Incident Response Analyst in Paisley
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cyber security scene. Attend meetups, webinars, or even local events. The more people you know, the better your chances of landing that Incident Response Analyst gig.
✨Tip Number 2
Show off your skills! Create a portfolio or a personal blog where you can share your insights on incident response, playbooks, or any cool projects you've worked on. This not only showcases your expertise but also makes you memorable to potential employers.
✨Tip Number 3
Practice makes perfect! Get involved in online simulations or capture-the-flag challenges related to incident response. This hands-on experience will not only boost your confidence but also give you real-world scenarios to discuss in interviews.
✨Tip Number 4
Apply through our website! We’ve got loads of opportunities waiting for you. Tailor your application to highlight your experience with incident response playbooks and your ability to collaborate with diverse teams. Let’s get you that job!
We think you need these skills to ace Incident Response Analyst in Paisley
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Incident Response Analyst role. Highlight your experience with incident response playbooks and any relevant cyber security projects you've worked on. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how you can contribute to SPEN's goals. Be sure to mention your ability to build relationships across teams, as that's key for us.
Showcase Your Documentation Skills: Since strong documentation skills are a must-have for this role, include examples of how you've translated complex technical activities into clear guidance. We love seeing how you can make things understandable for everyone!
Apply Through Our Website: Don't forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen to join our team at StudySmarter!
How to prepare for a job interview at Morson Edge
✨Know Your Incident Response Playbooks
Make sure you’re familiar with the incident response playbooks and procedures relevant to the role. Be ready to discuss how you've developed or improved these in past roles, and think about specific examples where your contributions made a difference.
✨Showcase Your Documentation Skills
Prepare to demonstrate your ability to translate complex technical activities into clear operational guidance. Bring examples of documentation you've created or improved, and be ready to explain how they helped teams during incidents.
✨Engage with Stakeholders
Highlight your experience in building relationships with both technical and non-technical stakeholders. Think of examples where you successfully collaborated across teams, especially during incident response situations, and be prepared to discuss how you navigated those interactions.
✨Understand the Incident Response Lifecycle
Brush up on your knowledge of the incident response lifecycle and common attack techniques, like those in the MITRE ATT&CK framework. Be ready to discuss how these concepts integrate with threat detection and monitoring, and how you’ve applied them in real-world scenarios.