At a Glance
- Tasks: Create engaging cyber security training content from real-world incident response experience.
- Company: Join the fastest-growing online cyber security training platform with a vibrant community.
- Benefits: Enjoy remote work, flexible hours, and a generous training budget for personal development.
- Why this job: Make a difference by teaching the next generation of cyber security professionals.
- Qualifications: Hands-on experience in incident response and strong communication skills required.
- Other info: Collaborative team environment with opportunities for career growth and annual company retreats.
The predicted salary is between 60000 - 80000 £ per year.
TryHackMe is the fastest-growing online cyber security training platform. Our mission is to make learning and teaching cyber security easier by providing gamified security exercises and challenges. Having only been around for a handful of years, we have grown to more than 7+ million community members and our growth isn’t slowing down!
We are looking for experienced incident responders and blue team practitioners to join our Content Engineering team. Your job is simple in concept: take what you know from real world IR work and turn it into world class training content. You’ll take your years of real world experience and teach your peers and the next generation.
Responsibilities
- Research, design, and develop defensive cyber security training material with supporting hands-on lab exercises (such as virtual machines and datasets for analysis).
- Draw on your real world IR experience to build realistic, scenario driven labs that reflect how attacks actually unfold in enterprise Windows environments.
- Develop and configure virtual machines and sample datasets for realistic cybersecurity labs.
- Collaborate closely with your team by sharing expertise, reviewing each other’s work, and raising the quality bar collectively.
- Take charge of planning and designing portions of the content development roadmap.
- Collaborate with the Head of Content Engineering to continuously improve the content development process.
- Analyse industry trends in tooling and techniques and recreate them as teachable content.
- Strategically plan, review, and schedule content with our blue team content engineering team.
Technical Skills & Experience
To be considered for this opportunity, you must have significant hands on relevant cyber security industry experience in roles such as Incident Responder, Threat Hunter, Digital Forensics Investigator or L3 SOC Analyst. You should also demonstrate:
- Proven, hands-on experience responding to real incidents in Windows environments. Triaging compromised endpoints, analysing forensic artefacts, and reconstructing attacker timelines from initial access through to impact.
- Solid grounding in Windows forensics and artefact analysis - event logs, registry hives, NTFS artefacts, and memory/disk forensics - with the ability to extract attacker activity from both live systems and forensic images.
- Working knowledge of offensive techniques used against Windows and Active Directory environments, including credential dumping, privilege escalation, Kerberos-based attacks, and lateral movement, and critically, how to detect them in forensic artefacts, contain them during live response, and prevent recurrence.
- Hands-on familiarity with attacker tooling and tradecraft - fileless execution, living-off-the-land techniques (LOLBins), common exfiltration methods, and ransomware deployment patterns - including the TTPs of active APT groups and ransomware-as-a-service operators.
- Experience with DFIR collection tooling such as EZ Toolset, Velociraptor, KAPE, or equivalent with an understanding of how to conduct IR at scale across enterprise environments.
- Strong verbal and written English communication skills, essential for conveying complex technical concepts.
Preferred Skills (nice-to-have)
- Any experience creating training content, writing documentation, or explaining technical concepts to others either formally or informally.
- Deeper expertise in one or more specialist areas: Active Directory attack paths (Kerberoasting, DCSync, ADCS), memory forensics (MemProcFS, Volatility), or advanced NTFS analysis.
- Creating challenges for capture the flags (CTFs).
- Experience leading, coaching, or mentoring others.
- Certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Enterprise Defender (GCED), Security Analyst Level 2 (SAL2), Certified Forensic Analyst (GCFA).
Benefits & Perks
- 100% Remote - In a fully digital world, work from anywhere you want!
- Flexi Time - Choose your own hours as long as you have at least 4 hours of overlap with the UK timezone (from 8am - 6pm).
- Tools - a dedicated work laptop + any accessories you need to do your best work.
- Swag Pack - start your TryHackMe journey with a branded swag bundle!
- Personal Development - £2,500 training budget to acquire certifications, and more.
- Company Retreat - an annual company retreat, fully paid for by us!
- Lunch on us - whether you’re a pizza-lover, salad obsessed or a big sushi fan, TryHackMe will cover the cost of your lunch order during our recurring company virtual lunches.
- Health Insurance - if you’re in a country that doesn’t have public health care.
- Enhanced Maternity & Paternity - an enhanced package on top of statutory requirements.
- 401k / Pension - TryHackMe makes it easy to save money for your retirement.
Our Hiring Process
- Stage 1: Short introduction call (30 mins)
- Stage 2: Technical Take Home Exercise (part 1 & 2)
- Stage 3: Interview with our Head of Content Engineering (one hour)
- Stage 4: Final call with a Co-Founder (30 mins)
At this time, we are unable to provide sponsorship.
Windows IR Practitioner | Cyber Security Training employer: TryHackMe Ltd
Contact Detail:
TryHackMe Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Windows IR Practitioner | Cyber Security Training
✨Tip Number 1
Get your networking game on! Connect with folks in the cyber security field, especially those who work at TryHackMe. Attend industry events or join online forums to make those valuable connections that could lead to job opportunities.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your incident response projects or any training content you've developed. This will give potential employers a taste of what you can bring to the table and set you apart from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on your technical knowledge and soft skills. Practice explaining complex concepts in simple terms, as communication is key in this role. We want to see how you can convey your expertise effectively!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, it shows you’re genuinely interested in joining the TryHackMe team and contributing to our mission of making cyber security training accessible.
We think you need these skills to ace Windows IR Practitioner | Cyber Security Training
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter to highlight your relevant experience in incident response and Windows forensics. We want to see how your skills align with the role, so don’t hold back on showcasing your expertise!
Show Off Your Teaching Skills: Since we’re all about creating training content, it’s a great idea to mention any experience you have in teaching or mentoring others. Whether it’s formal training or just helping a mate out, let us know how you can share your knowledge!
Be Clear and Concise: When writing your application, keep it straightforward and to the point. We appreciate clarity, especially when it comes to complex technical concepts. Use simple language to explain your experience and skills.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it gives you a chance to explore more about us and what we do!
How to prepare for a job interview at TryHackMe Ltd
✨Know Your Stuff
Make sure you brush up on your incident response experience, especially in Windows environments. Be ready to discuss specific cases where you triaged compromised endpoints or analysed forensic artefacts. Real-world examples will show that you can translate your hands-on experience into valuable training content.
✨Showcase Your Teaching Skills
Since the role involves creating training material, think about how you can demonstrate your ability to explain complex concepts clearly. Prepare to share any past experiences where you've taught others or created training content. This will highlight your capability to engage and educate future learners.
✨Stay Current with Trends
Familiarise yourself with the latest industry trends in cyber security, especially regarding offensive techniques and detection methods. Be prepared to discuss how these trends can be integrated into training content. Showing that you’re up-to-date will impress the interviewers and prove your commitment to continuous learning.
✨Collaborative Mindset
Emphasise your ability to work as part of a team. Discuss how you’ve collaborated with others in previous roles, particularly in content development or incident response scenarios. Highlighting your teamwork skills will resonate well, as collaboration is key in their Content Engineering team.