Cyber Security Incident Response Analyst Forensics

CHEP UK Limited
Weybridge
4 days ago
Create job alert

CHEP helps move more goods to more people in more places than any other organization on earth via our 347 million pallets crates and containers. We employ approximately 13000 people and operate in 60 countries. Through our pioneering and sustainable shareandreuse business model the worlds biggest brands trust us to help them transport their goods more efficiently safely and with less environmental impact.

What does that mean for you Youll join an international organization big enough to take you anywhere and small enough to get you there sooner. Youll help change how goods get to market and contribute to global sustainability. Youll be empowered to bring your authentic self to work and be surrounded by diverse and driven professionals. And you can maximize your worklife balance and flexibility through ourHybrid Work Model.

Job Description

Position Purpose

This position reports to the SOC Manager Cyber Security Operations and is responsible for ensuring that the response to Cyber Security events and incidents are timely appropriate thorough and meet the highest security standards.

This will be achieved through 2 main factors:

1. Lead their region coverage to respond to investigate resolve/isolate and support remediation for Brambles SOC driving the accuracy timeliness and quality of detection and response measures including reviewing and refining playbook documentation SLA measurement and adhoc deepdives of incident enrichment.

2. Lead the adhoc investigations related to misuse inappropriate access or similar cases where deepdive forensic type assessments are required in order to review available datasources and produce a final report of activity. For example emails sent websites visited files shared etc.

This role is key in supporting Brambles Cyber Security threat analysis and incident response program and is responsible for ensuring that security events are effectively analyzed and appropriate response measures are taken in support of the corporate Cyber program

Major / Key Accountabilities

  • Serve as the primary escalation point for L3 security incidents from the SOC ensuring thorough review escalation and resolution processes.
  • Lead the identification triage and remediation of security incidents driving efforts to reduce TimetoFix through process improvements telemetry tuning and automation.
  • Provide thought leadership for incident response forensic analysis including evidence capture chain of custody and reporting.
  • Actively participate in the Security Incident Response Team (SIRT) to manage the full lifecycle of security incidents: identification containment eradication and resolution.
  • Review and analyze logs alerts and telemetry from security tools and IT systems to identify investigate and respond to threats.
  • Perform advanced threat hunting and realtime incident handling collecting and analyzing evidence (e.g. digital media logs malware) to contain malicious activity.
  • Develop and refine incident response content processes workflows and detection methods to enhance monitoring and response capabilities.
  • Utilize OSINT Threat Intelligence and enrichment resources to analyze and mitigate threats while creating highfidelity detection content.
  • Facilitate global support by addressing requests from business contacts across time zones.
  • Stay updated on cybersecurity trends threat vectors and vulnerabilities to recommend and implement enhancements for enterprise security and defense in depth strategies.

Experience

  • Experience 4 years in IT security related roles; 12 years of Incident Response experience.
  • Strong understanding of forensic data capture and case handling techniques.
  • Familiarity with system monitoring assessment and reporting tools (e.g. SIEM).
  • Experience with security tools (IDS firewalls antivirus data loss prevention etc.
  • Proficient in email filtering URL filtering antivirus IDS vulnerability scanning 2factor authentication access control systems SIEM and VMware products.
  • Experience with core IT systems including Windows VMware Cisco UNIX and Linux environments Preferred experience in the Supply Chain or Manufacturing environment.
  • Preferred experience in cloud environments.
  • Preferred understanding of active OT and IoT Security defence techniques and tooling.
  • Preferred roficiency in network security and monitoring tools.
  • Experience working with security governance frameworks (NIST ISO27001 COBIT).
  • Preferred knowledge of Cloud Security Operations (SaaS PaaS IaaS) Mobile Architecture Network and Application Security and/or Data Protection.

Skills and Knowledge

  • Ability to develop and maintain working relationships in a global environment.
  • Excellent analytical and problemsolving skills.
  • Outstanding verbal and written communications skills with all levels of management staff and vendors.
  • Escalates potential risk and internal control weaknesses to management.
  • Detailoriented with a focus on quality consistently seeking improvement and monitoring work for accuracy.
  • Selfmotivated with the ability to work independently prioritize tasks and manage time effectively.
  • Must be able to maintain confidentiality.
  • Must be able to demonstrate and promote a positive team environment.
  • Capable of staying composed and meeting goals in dynamic or timesensitive situations.
  • Must possess the ability to manage conflict and/or direct change delays or unexpected events appropriately.
  • Must be available to work outside of normal working hours or oncall as needed.

As an inclusive employer Brambles wants to see every candidate performing at their best throughout the job application process interview process and whilst at work. We therefore encourage you to inform your Talent Acquisition Partner of any reasonable adjustments you might need to enable this to happen.

Remote TypeHybrid RemoteSkills to succeed in the roleActive Learning Adaptability CrossFunctional Work Curiosity Digital Literacy Emotional Intelligence Empathy Initiative Problem Solving

We are an Equal Opportunity Employer and we are committed to developing a diverse workforce in which everyone is treated fairly with respect and has the opportunity to contribute to business success while realizing his or her potential. This means harnessing the unique skills and experience that each individual brings and we do not discriminate against any employee or applicant for employment because of race color sex age national origin religion sexual orientation gender identity status as a veteran and basis of disability or any other federal state or local protected class.

Individuals fraudulently misrepresenting themselves as Brambles or CHEP representatives have scheduled interviews and offered fraudulent employment opportunities with the intent to commit identity theft or solicit money. Brambles and CHEP never conduct interviews via online chat or request money as a term of employment. If you have a question as to the legitimacy of an interview or job offer please contact us at


Required Experience:

IC


Key Skills
Council,Downstream,Laboratory,Bakery,Corporate Development
Employment Type :Full-Time
Experience:years
Vacancy:1

Related Jobs

View all jobs

L3 Security Analyst

Principal Cyber Security Analyst

Security Analyst

Information Security Analyst

Cyber Security Response Analyst

Cyber Security Engineer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Contract vs Permanent Cybersecurity Jobs: Which Pays Better in 2025?

Cybersecurity has become one of the fastest-growing and most crucial fields in modern business. With high-profile breaches dominating headlines and the ongoing digital transformation exposing organisations to new threats, companies across the UK are competing to attract skilled cybersecurity professionals. Roles range from penetration testers (pen testers) and SOC (Security Operations Centre) analysts to compliance officers, cloud security architects, threat intelligence analysts, and CISOs (Chief Information Security Officers). As demand continues to surge, cybersecurity salaries have climbed accordingly, and businesses have turned to more flexible hiring practices. Alongside permanent employment, many professionals explore short-term day‑rate contracting or fixed-term contracts (FTCs), searching for the ideal balance of pay, job security, and growth opportunities. Which arrangement truly pays better in 2025—and which best aligns with your ambitions? In this article, we dive into the contract vs. permanent debate with a focus on cybersecurity roles. We will examine the current market, the structure of day‑rate vs. FTC vs. permanent positions, the pros and cons of each, and some hypothetical pay comparisons. By the end, you should have a clearer sense of which career path might suit your situation and goals—whether you are a seasoned specialist aiming for top rates, or an up-and-coming analyst seeking a stable environment to develop in.

Cyber Security Jobs for Non‑Technical Professionals: Where Do You Fit In?

Defence Needs More Than Hackers in Hoodies When headlines warn of ransomware crippling hospitals or deepfakes swaying elections, we picture hoodie‑clad hackers and elite penetration testers. Yet the reality of the UK’s cyber security sector is broader—and desperately short of talent. The Department for Science, Innovation & Technology (DSIT) estimates a shortfall of 11,200 cyber security professionals in 2024, while 43 % of advertised roles require governance, risk or communication skills rather than hands‑on technical exploits. Put plainly: if you can guide policy, manage projects, interpret regulations or inspire behaviour change, cyber security wants you. This guide highlights the fastest‑growing non‑technical roles, the transferable skills you already possess, and a concrete 90‑day plan to land a cyber security job—no packet sniffers required.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.