CERT Incident Responder

Middle Hulton
1 week ago
Create job alert

Bolton

The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs).

Salary: £50,000 - £60,000 depending on experience

Dynamic (hybrid) working: Minimum 2 days per week on-site due to workload classification

Security Clearance: British Citizen or a Dual UK national with British citizenship. Restrictions and/or limitations relating to nationality and/or rights to work may apply. As a minimum and after offer stage, all successful candidates will need to undergo HMG Basic Personnel Security Standard checks (BPSS), which are managed by the MBDA Personnel Security Team.

What we can offer you:
Company bonus: Up to £2,500 (based on company performance and will vary year to year)
Pension: maximum total (employer and employee) contribution of up to 14%
Overtime: opportunity for paid overtime
Flexi Leave: Up to 15 additional days
Flexible working: We welcome applicants who are looking for flexible working arrangements
Enhanced parental leave: offers up to 26 weeks for maternity, adoption and shared parental leave -enhancements are available for paternity leave, neonatal leave and fertility testing and treatments
Facilities: Fantastic site facilities including subsidised meals, free car parking and much more...
Healthcare Cash Plan: The Healthcare Cash Plan benefit provides the option to claim cash back on everyday healthcare expenses such as optical, dental, health and wellbeing and more . The opportunity:

The CERT Incident Responder is responsible for leading digital forensics and incident response (DFIR) readiness. While also advancing the organisation's Adversarial Exposure Validation (AEV)- including Red and Purple Team activities. The role ensures detection, response, and control validation against real-world threat actor tactics, techniques, and procedures (TTPs).

This is a Next step role for an experienced Analyst with a passion for Incident response and Threat mitigation.

Essentials:
Lead digital forensics and incident response (DFIR) activities, ensuring lab readiness, artefact management, and delivery of forensic objectives.
Maintain and enhance forensic tools and environments (e.g., Magnet Axiom, Autopsy) to ensure operational capability.
Conduct detailed forensic analysis, malware reverse engineering, and cyber investigation of complex incidents.
Ensure effective chain of custody, artefact preservation, and evidence handling processes.
Maintain accurate digital forensics documentation, incident playbooks, and readiness rehearsal materials.
Lead and execute tabletop exercises (TTEx) to test and improve incident response and forensic readiness.
Perform network and endpoint investigations, including AV scans, incident remediation, and validation of security alerts.
Collaborate with IM/DEx and Security Operations to enhance incident reporting, alerting, and notification services.
Deputise for CERT responders during major incidents or third-party attacks, coordinating with national and international partners (e.g., NCPC).
Develop and maintain enterprise security documentation, including policies, standards, baselines, and playbooks.Desirables:
Identify root causes of security incidents and recommend sustainable mitigation strategies.
Manage remediation and closure of security cases, ensuring timely implementation of corrective actions.
Develop and maintain threat scenarios to validate detection and response across SOC, EDR, SIEM, and XDR platforms.
Translate threat intelligence into testable hypotheses and simulation exercises in collaboration with Threat Intelligence teams.
Utilise adversarial emulation tools (Caldera, Atomic Red Team, AttackIQ, SCYTHE, Cobalt Strike, etc.) to replicate realistic attacker behaviours.
Research and integrate emerging threats and TTPs into adversary emulation and validation methodologies.
Produce detailed reporting and metrics on detection coverage, response performance, and control effectiveness.
Support the wider IM/DEx team by validating new or updated controls against advanced threat simulations.
Support SOC operations with investigation, alert triage, and implementation of lessons learned from adversarial validation and DFIR activities.
Research and evaluate emerging security tools, technologies, and methodologies; provide gap analysis and recommendations to influence investment.
Deliver metrics, dashboards, and reports demonstrating adversarial resilience and capability maturity.
Contribute to small-to-medium cyber projects enhancing threat detection, emulation, and response maturity.What we're looking for from you:
Demonstratable experience handling incidents, such as:
Ransomware containment + remediation
Business email compromise investigations
Cloud account takeover
Insider threat events
Large-scale phishing attacks
Leading incident response calls, advising leadership, and writing executive summariesOur company: Peace is not a given, Freedom is not a given, Sovereignty is not a given

MBDA is a leading defence organisation. We are proud of the role we play in supporting the Armed Forces who protect our nations. We partner with governments to work together towards a common goal, defending our freedom.

We are proud of our employee-led networks, examples include: Gender Equality, Pride, Menopause Matters, Parents and Carers, Armed Forces, Ethnic Diversity, Neurodiversity, Disability and more...

We recognise that everyone is unique, and we encourage you to speak to us should you require any advice, support or adjustments throughout our recruitment process.

Follow us on LinkedIn (MBDA), X (@MBDA_UK), Instagram (MBDA_UK) and Glassdoor or visit our MBDA Careers website for more information.

#LI-RM1

Related Jobs

View all jobs

Tutor of Digital (2 posts available)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.