Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

Incident Response Analyst

Pentest People
Birmingham
6 months ago
Applications closed

Related Jobs

View all jobs

Cyber Security Analyst

Senior SOC Analyst

Senior SOC Analyst

Lead SOC Analyst

Information Security Analyst

Cyber Security Analyst

Pentest People is a UK-based security consultancy specialising in providing Penetration Testing as a Service to all its clients. Our innovative approach to security testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. This provides clients with a continuous, living threat management system throughout the duration of the contract, rather than a single point-in-time assessment.


We’re expanding our Incident Response team and looking for a Incident Response Analyst to join us in tackling some of the most challenging cybersecurity threats. The role requires analytic thinking, problem solving skills and the ability to work in a fast-paced environment.


As part of our dynamic team, you will play a critical role in reducing the impact of cyberattacks and enchanting our clients security posture to prevent future attacks.


Key responsibilities include:


  • Conducting initial incident assessments and contribute to Incident Response management.
  • Participate in live Incident Response operations including digital forensics.
  • Perform security assessments, threat intelligence gathering and OSINT analysis.
  • Collaborating with other departments to facilitate a holistic cybersecurity service.
  • Engaging with clients on day-to-day basis and getting access to relevant logs and access to clients infrastructure for performing digital forensics.
  • Document incidents thoroughly, including timelines, affected systems, actions taken, and recommendations for future improvements.
  • Prepare comprehensive reports for clients.


Technical skills:


  • Demonstrated experience in responding to and investigating incidents whilst utilizing various monitoring, detection and investigation tooling – SIEM, SOAR, EDR etc.
  • Proficiency in log analysis of Networking, Windows, Mac and Linux and Cloud.
  • Understanding of evidence collection process based on priority.
  • Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases.
  • Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols.
  • Should have an understanding of tabletop exercises, and IR planning.
  • Should have an understanding of Technical Frameworks such as MITRE Attack, Lockheed Martin kill chain or Diamond model.
  • Should be able to perform dynamic malware analysis.


Qualifications:


  • Certifications such as ECIH, Security +, BTL1, Cysa+, SC-200 are good to have
  • Knowledge of open-source IR tools, such as Velociraptor, Eric Zimmerman Tools, Chainsaw, Volatility, SOF-elk, DFIR IRIS.
  • Experience in python or bash or Go.


About you:


  • Experience in managing stakeholders during live incidents to minimise impacts.
  • Strong communication skills, with the ability to manage and coordinate various incidents whilst remaining calm under pressure.
  • Ability to align client deliverables with industry best practices.
  • Experience in threat intelligence and analysis to support proactive IR.
  • Capable of taking ownership of tasks, ensuring quality delivery and supporting the IR's team growth.


While this role is advertised as remote, it will require occasional visits to client sites and the office as needed. Candidates must be based in the UK and have the right to work, as we are unable to provide sponsorship at this time. If you do not have SC eligibility, you must meet the requirements for SC, as this may be a necessary criterion.


Please send your resume and a cover letter to


We understand that job descriptions offer only a glimpse of the role. For more details, please feel free to reach out or apply, and we will be happy to provide additional information. Pentest People is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Neurodiversity in Cyber Security Careers: Turning Different Thinking into a Superpower

Cyber security is all about thinking like an attacker, spotting unusual patterns, protecting systems & responding calmly when everything looks like it’s on fire. It’s a discipline built on curiosity, persistence & noticing things other people miss. That’s exactly why it can be such a good fit for many neurodivergent people. If you live with ADHD, autism or dyslexia, you may have been told your brain is “too distracted”, “too literal” or “too disorganised” for a security role. In reality, the traits that can make traditional office work tough often line up beautifully with cyber security work – from hyperfocus in incident response to meticulous analysis in threat hunting. This guide is written for cyber security job seekers in the UK. We’ll look at: What neurodiversity means in a cyber context How ADHD, autism & dyslexia strengths map to different security roles Practical workplace adjustments you can ask for under UK law How to talk about neurodivergence during applications & interviews By the end, you’ll have a clearer sense of where you might thrive in cyber security – & how to turn “different thinking” into a genuine superpower.

Cyber Security Hiring Trends 2026: What to Watch Out For (For Job Seekers & Recruiters)

As we move into 2026, the cyber security jobs market in the UK is changing fast. Attackers are scaling up with automation & AI, cloud estates are more complex, & regulators are tightening expectations around resilience & data protection. At the same time, budgets are under pressure & some organisations are consolidating their tech teams. Despite all this, demand for cyber security skills remains strong. Skilled defenders, engineers & leaders are still hard to find, & the stakes are only getting higher. Whether you are a cyber security job seeker planning your next move, or a recruiter building security teams, understanding the key cyber security hiring trends for 2026 will help you make better decisions.

Cyber Security Recruitment Trends 2025 (UK): What Job Seekers Must Know About Today’s Hiring Process

Summary: UK cyber security hiring has shifted from title‑led CV screens to capability‑driven assessments that emphasise incident readiness, cloud & identity security, detection engineering, governance/risk/compliance (GRC), measurable MTTR/coverage gains & secure‑by‑default engineering. This guide explains what’s changed, what to expect in interviews, & how to prepare—especially for SOC analysts, detection engineers, blue/purple teamers, penetration testers, cloud security engineers, DFIR, AppSec, GRC & security architecture. Who this is for: SOC & detection engineers, security operations leads, DFIR analysts, penetration testers/red teamers, purple teamers, AppSec/DevSecOps engineers, security architects, cloud security engineers, identity/IAM engineers, vulnerability managers, GRC/compliance specialists, product security & security programme managers targeting roles in the UK.