Digital Forensics & Incident Response Analyst

Maersk
Maidenhead
4 days ago
Create job alert

Join Maersk’s Groundbreaking Cyber Team: Redefining Incident Management & Response

Imagine a career where you're not just responding to security incidents—you’re revolutionising how it’s done. At Maersk, one of the world’s largest and most respected logistics and shipping companies, our Cyber team is pioneering a whole new approach to incident response. This isn’t your typical DFIR role: our combined fire team approach is built on cutting-edge research and designed to drive change, resilience, and agility in ways the industry has never seen before.

Here, you’ll be part of a dynamic team that works together to defend, adapt, and innovate with freedom and purpose.

You won’t just work on Digital Forensics, you’ll help improve how it’s done. Dive into purple teaming, create and refine world-class detections, shape change projects, and push the boundaries of what’s possible—all during the workday with no overnight shifts. Plus, we champion continuous learning and growth through Capture the Flag (CTF) exercises and direct opportunities to bring your ideas to life.

Are you ready to be part of something transformational at Maersk and join a team that’s setting a new standard in cybersecurity?

  • Join a World-Class Cyber Team: Be part of an elite cyber operation at one of the globe’s most renowned logistics companies, where your contributions truly make a difference.
  • Further develop forensic capabilities in Traditional and modern cloud, OT and AI driven space.
  • Conduct threat hunting by analysing data to identify existing threats on the network and support proactive content analysis.
  • Support the continuous improvement of Maersk’s capability to detect and respond to incidents by collaborating with other teams across Cyber Operations.
  • Work on key Cyber Security uplift projects, representing the Respond delivering results and embedding new capabilities into BAU.
  • Provide an out-of-hours incident on-call technical/forensic response on a rota basis.
  • Provide detailed forensic RCA to key stakeholders, supporting Cyber Security Incident team during deep dive investigations and PIR.
  • Fulfil a key role within the Incident Management team to support Senior Technical Leads in investigation, resolution and recovery objectives.
  • Support the 24/7 team when required in monitoring security alert feeds to detect, triage and investigate security events and classify them as incidents where appropriate.

Key responsibilities

  • Provide detailed forensic RCA to key stakeholders, supporting Cyber Security Incident team during deep dive investigations and PIR.
  • Further develop forensic capabilities in Traditional and modern cloud, OT and AI driven space.
  • Conduct threat hunting by analysing data to identify existing threats on the network and support proactive content analysis.
  • Support the continuous improvement of Maersk’s capability to detect and respond to incidents by collaborating with other teams across Cyber Operations.
  • Work on key Cyber Security uplift projects, representing the Respond delivering results and embedding new capabilities into BAU.
  • Provide an out-of-hours incident on-call technical/forensic response on a rota basis.
  • Fulfil a key role within the Incident Management team to support Senior Technical Leads in investigation, resolution and recovery objectives.
  • Support the 24/7 team when required in monitoring security alert feeds to detect, triage and investigate security events and classify them as incidents where appropriate.

Services Overseen

Rotation around the following:

  • Protective Systems Monitoring
  • Malicious Compromise Forensic investigation
  • Threat & Behavioural Analytics
  • Threat Hunting
  • Security Incident Management
  • Project Engagement and Delivery
  • Strategic Planning Input to evolve Forensics Capability

Required experience & skills

  • Technical Forensic capability across Endpoint, Cloud and Operational Technology (OT) infrastructure.
  • Experience in conducting Digital Forensic investigations for Windows and Linux operating systems, preferably at Enterprise scale.
  • Excellent Digital Forensic knowledge including Event Log analysis, Registry, Browser based artefacts and knowledge of various File Systems as well as where to find evidence of access, execution and lateral movement.
  • The ability to learn a previously unknown artefact and to actively apply this knowledge to an ongoing investigation.
  • Investigation skills to expose Persistence mechanisms and File-less techniques in Windows, Linux, MacOS.
  • Conduct thorough host and network investigations to analyse and highlight ways to mitigate malicious activities.
  • Hands on exposure to memory forensic investigations (preferred but not essential).
  • Knowledge around Cloud based Digital Forensics key artefacts and best practice.
  • Good knowledge of Digital Forensic tooling such as X-Ways, EnCase, Autopsy, TimeSketch, Plaso.
  • Outstanding critical reasoning and problem-solving skills.
  • Excellent written and verbal communication skills and able to be understood by both technical and non-technical stakeholders.
  • Stakeholder management and interpersonal skills (at both a technical and non-technical level).
  • Ability to provide rapid and concise summaries of complex situations.
  • Ability to work under pressure and autonomously or under general direction as required.
  • Ability to manage conflicting priorities and multiple tasks.
  • The role holder will have proven experience working in a Security Operations Centre (SOC) and/or Computer Emergency Response Team (CERT) within a team of other analysts and engineers.
  • Experience in Threat Hunting.
  • Experience in Incident Response (preferred but not essential).
  • Excellent knowledge of typical security devices such as SIEM, firewalls, etc.
  • Experience of working in fast-paced, high-pressure environments.
  • Previous project engagement and execution of delivery.
  • Contribute to cyber incident Response management and engage in the CSIRT process for high-priority incidents.
  • Serve as an escalation point for junior analysts.
  • Deliver exceptional quality in Incident Response.

Soft Skills:

  • Operations Management & Issue Resolution: Ensure smooth operations and continuity by proactively identifying and addressing operational issues, team dynamics, and inefficiencies in ticket handling.
  • Report Writing:Ability to write reports that convey highly technical information whilst remaining accessible to a non-technical audience (including at executive level).
  • Communication:Exhibit excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
  • Mentorship:Training and guiding junior team members, promoting a culture of knowledge sharing and continuous learning.
  • Critical Thinking, Adaptability & Problem-Solving:Demonstrate strong analytical skills and flexibility to adapt to changing priorities and emerging cybersecurity threats while effectively solving problems.
  • Time Management & Organization:Prioritize tasks efficiently and maintain organized documentation and processes to enhance team productivity.
  • Teamwork & Positive Attitude:Foster a collaborative environment where team members feel supported, practicing active listening, motivating the team, and maintaining a positive demeanour, especially in high-pressure situations.

Qualifications

  • Minimum of 5+ years in a SOC/forensics role.
  • Relevant advanced certifications (e.g., GCIA, GSEC, CEH, GCDA, GCIH, GCFA) are highly desirable but not essential.
  • Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF.

Benefits of working with us

  • Flexible working arrangement:Remote working with occasional in person team building activities.
  • Collaborative Culture:Experience a supportive and inclusive work environment that values teamwork and innovation. We believe in open communication and knowledge sharing, ensuring that every team member feels empowered and valued.
  • Work-Life Balance:We understand the importance of maintaining a healthy work-life balance. Our flexible working arrangements and supportive policies enable you to excel in your role while enjoying your personal life.

#J-18808-Ljbffr

Related Jobs

View all jobs

Security Engineer, Incident Response

Senior Security Analyst

Senior Security Engineer

Digital Forensic Analyst

Digital Marketing Manager

Solutions Architect

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.

Cyber Security Programming Languages for Job Seekers: Which Should You Learn First to Launch Your Security Career?

Cyber security has become a top priority for companies of all sizes, public institutions, and governments. As cyber threats evolve—from sophisticated ransomware attacks to large-scale data breaches—employers are eager to recruit talent with the skills to detect, prevent, and respond to security incidents. If you’re exploring roles on www.cybersecurityjobs.tech, a key question inevitably arises: Which programming language should you learn first for a career in cybersecurity? Cyber security is a multifaceted domain encompassing network security, application security, reverse engineering, digital forensics, ethical hacking (penetration testing), and more. Each niche may have unique language preferences—like Python for scripting tasks, C/C++ for exploit development, or Rust for building secure low-level tools. In this article, we’ll: Highlight the top programming languages used across cyber security. Break down pros, cons, and key use cases for each language. Present a simple beginner’s project for hands-on learning. Share essential resources and tips, so you can stand out in the competitive cybersecurity job market.

UK Visa & Work Permits Explained: Your Essential Guide for International Cyber Security Talent

Cyber security is one of the fastest-growing fields in today’s digital age. As cyber threats proliferate—ranging from data breaches and ransomware attacks to sophisticated nation-state incursions—organisations worldwide are investing more than ever to protect their systems, networks, and customer data. The United Kingdom, in particular, is emerging as a hub for advanced cyber defence, AI-driven threat detection, and compliance consulting. For international cyber security professionals, the UK offers a wealth of career opportunities, spanning financial services, government contracts, tech start-ups, and global corporations. However, stepping into the UK’s cyber security job market requires a clear understanding of the country’s visa and work permit processes. If you are an international candidate with expertise in areas like intrusion detection, penetration testing, or security architecture, navigating these immigration pathways can be daunting. This article aims to demystify the visa process—highlighting key routes, eligibility criteria, and practical tips—to help you seamlessly transition into the British cyber security ecosystem.