Jobs

Incident Response Analyst


Job details
  • Thrive
  • Nottingham
  • 1 week ago

About Us  Thrive is a rapidly growing technology solutions provider focusing upon Cloud, Cyber Security, Networking, Disaster Recovery and Managed Services.  Our corporate culture, engineering talent, customer-centric approach, and focus upon “next generation” services help us stand out amongst our peers.  Thrive is on the look-out for individuals who don’t view their weekdays spent at “a job”, but rather look to develop valuable skills that ignite their passion and lead to a CAREER.  If you’re attracted to a “work hard, play hard” environment, seeking the guidance, training and experience necessary to build a lucrative career, then welcome to THRIVE!!  Position Overview  With a growing client base, Thrive is continuing to build out its security team.  We are looking to hire an Incident Response Analyst to take a role within our Security Operation Center. The analyst will assist with continuously monitoring and improving our customers' security posture, while preventing, detecting, analyzing, and responding to cybersecurity incidents utilizing technology and well-defined processes and procedures. The ideal candidate will have a passion for information security and will value what a properly managed Security monitoring solution can bring to our client needs.   Primary Responsibilities  Process investigation requests from SOC Analysts who perform security event monitoring using Security Information and Event Management (SIEM) from multiple sources, including but not limited to, events from network and host-based intrusion detection/prevention systems, network infrastructure logs, systems logs, applications, and databases  Investigate intrusion attempts, differentiate false positives from true intrusion attempts, and perform in-depth analysis of exploits  Lead incident response and threat hunting efforts for confirmed High Priority security incidents and follow through until resolution  Utilize threat intelligence to identify and investigate potential security threats  Develop playbooks for incident response and incident management processes, including threat triage, incident investigation, and incident resolution  Conduct regular reviews of playbooks to ensure they are current and effective  Work with cross-functional teams to ensure that playbooks are aligned with the overall security strategy and goals  Participate in tabletop exercises and drills to test and validate playbooks  Monitor and evaluate security incidents to identify opportunities for improving playbooks  Keep up-to-date with current security threats and trends to ensure that playbooks are relevant and effective  Actively investigate the latest security vulnerabilities, advisories, incidents, and TTPs (tactics, techniques, and procedures) and work with the Security Engineering team to recommend use cases  Proactive monitoring, threat hunting, and response of known and/or emerging threats  Carry out Thrive’s information security strategy both internally and externally for 400+ clients  Analyze data from our SOC, SIEM and EDR platforms and determine if further analysis is needed  Work within Thrive’s security standards and best practices and recommend future enhancements  Stay abreast of security events and techniques to keep our clients protected  Qualifications  Demonstrates comprehension of best security practices  Has advanced knowledge of the following systems and technologies:   SIEM (Security Information and Event Management)   TCP/IP, computer networking, routing, and switching   IDS/IPS, penetration and vulnerability testing   Firewall and intrusion detection/prevention protocols   Windows, UNIX, and Linux operating systems   Network protocols and packet analysis tools   EDR, Anti-virus, and anti-malware   Content filtering    Email and web gateway.   Malware, Network, or System Analysis  Professional experience in a system administration role supporting multiple platforms and applications  Ability to collaborate and communicate security issues to clients, peers and management.  Strong analytical and problem-solving skills  Adaptability and resilience in rapidly evolving situations  Ability to be a part of an on-call rotation, occasionally working nights and weekends to support High Priority Security Incidents  Required Skills  Technical proficiency in networking, operating systems, and security technologies  Familiarity with security tools like SIEM, IDS/IPS, EDR, and forensic analysis tools  Understanding of incident response procedures and methodologies  Understanding of frameworks such as MITRE ATT&CK and the Cyber Kill chain,   Familiarity with TCP/IP network protocols, application layer protocols (e.g., HTTP, SMTP, DNS, etc.)  Experience in responding to and investigating cloud, system or network intrusions  Excellent Written and Verbal Communication Skills  Expertise in forensics, malware analysis, and network intrusion response  Preferred Skills  Knowledge of common Windows and Linux/Unix system calls and APIs  Knowledge of programming languages  Knowledge of internal file structures for file formats commonly associated with malware (e.g. OLE, RTF, PDF, EXE, etc.)  Knowledge or experience in Detection Engineering  Powered by JazzHR

Sign up for our newsletter

The latest news, articles, and resources, sent to your inbox weekly.

Similar Jobs

Incident Response Analyst Team Lead

About Us  Thrive is a rapidly growing technology solutions provider focusing upon Cloud, Cyber Security, Networking, Disaster Recovery and Managed Services.  Our corporate culture, engineering talent, customer-centric approach, and focus upon “next generation” services help us stand out amongst our peers.  Thrive is on the look-out for individuals who don’t...

Thrive Nottingham

Security Analyst - 12 Month University Placement

Are you ready to Take On your Placement?Working as part of the Security Incident Response Team the Placement Security Analyst will learn how to respond to and investigate events generated by our security controls. You will help ensure that Security Incidents are promptly identified, contained and eradicated, working closely with...

Next Leicester

Analyst, Cybersecurity Operations (Detection & Response) L2

As a L2 Response Analyst within the Security Operations Center (SOC), your responsibilities include using defensive measures and information gathered from various sources to identify, analyse, and report cybersecurity events, ensuring the protection of McDonald's information assets. You play a crucial role in supporting the Incident Response process, responding to...

McDonald's London

Analyst, Cybersecurity Operations (Detection & Response) L3

As a L3 Response Analyst within the Security Operations Center (SOC), your responsibilities include using defensive measures and information gathered from various sources to identify, analyse, and report cybersecurity events, ensuring the protection of McDonald's information assets. You play a crucial role in supporting the Incident Response process, responding to...

McDonald's London

SOC Analyst

TWX have partnered with a Cyber Security technology and service provider headquartered in Gloucestershire. They are looking to add multiple SOC Analysts to their current team, with the primary aim being to undertake and support the response to a cybersecurity event or incident as well as support other cyber services...

Manchester

Cryptography Analyst

Join us as a Cryptography Analyst at Barclays, where you'll play a critical role in fortifying cryptography infrastructure by supporting the design, configuration, implementation, and maintenance of robust PKI & HSM solutions, to support encryption, authentication, and digital signing processes across global operations. Alongside this you will also be responsible...

Knutsford