Incident Analyst - NatWest Boxed

Cramond Bridge
10 months ago
Applications closed

Related Jobs

View all jobs

Associate SOC Analyst

SOC Analyst

SOC Cyber Analyst

Senior SOC Analyst Level 2

SOC Cyber Analyst

Cybersecurity Analyst/Engineer

Join us as an Incident Analyst - NatWest Boxed

You’ll be working collaboratively with business and wider Technology teams to provide first class support during and after incidents

We’ll look to you to make sure that the impact of any incident is managed and communicated in a way which reduces any impact on our customers and the business

Join a supportive and cooperative environment, where we take a real interest in your professional development

What you'll do

As an Incident Analyst, you’ll act as part of a team responsible for incident management across the business, promoting best practices and seeking to continually improve processes. With your support, your business area will receive a fit for purpose incident management service, which adheres to our policy standards and guidelines. Additionally, you’ll be building relationships outside of your business area, with internal partners and external suppliers, in order to resolve issues and incidents, support and influence outcomes and to meet business and customer needs.

You’ll also be:

Facilitating incidents by providing support for domain leaders, ensuring timely resolution of incidents, minimising impact on services,

Maintaining accurate records and ensuring timely and effective communication of status to clients and stakeholders

Facilitating the post incident review process including identification of root causes of incidents and implementation of solutions, ensuring continuous improvement

Supporting analysis of incident data by ensuring accurate records are gathered, reviewed and maintained

Providing insight and input on how to improve any incident management processes via automation

Handling high-pressure, time-critical situations in a calm, measured and constructive way, thinking critically to assess impact and communicating status to various stakeholders

The skills you'll need

We’re looking for someone with experience handling all types of incidents, including major incidents and be part of a shared 24/7 on-call rota.

Additionally, you’ll need:

Proven experience in a similar role within a technology organisation

Excellent communication and stakeholder management skills and experience dealing with clients, regulators, third-party vendors, and payment schemes

Strong analytical and problem-solving skills and ability to handle high-pressure situations and make critical decisions

Experience of technology monitoring observability tooling, automating tasks to improve performance and working in a regulated environment would be highly beneficial

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Penetration Tester Jobs in the UK: What Employers Actually Want in 2026

The demand for skilled professionals in cyber security has never been higher, and penetration testers sit at the very heart of this rapidly evolving industry. As organisations across the UK continue to digitise their operations, protect sensitive data, and defend against increasingly sophisticated threats, the need for ethical hackers has grown dramatically. If you are considering a career in this field—or looking to advance within it—it is essential to understand what employers are really looking for in 2026. This guide breaks down the current expectations, required skills, certifications, and practical experience that can help you stand out in a competitive job market.

SOC Analyst Jobs UK 2026: Salaries, Skills & How to Get Hired

Cyber security is one of the UK's fastest-growing career paths — and SOC analyst is where most people begin. It's in high demand, genuinely accessible, and you don't need a degree or years of experience to get started. But knowing what UK employers actually want in 2026 — what they pay, which certs matter, and how to stand out — is a different matter. This guide covers all of it.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.