CrawlJobs Logo

Information Security Incident Response Analyst

nttdata.com Logo

NTT DATA

Location Icon

Location:
United Kingdom , London

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Information Security Incident Response Analyst supports clients during security incidents by performing technical investigations, analyzing digital forensic evidence, and assisting with containment and remediation activities. This role focuses on identifying indicators of compromise, reconstructing attacker activity, and communicating clear, actionable findings. The analyst works as part of a global DFIR team, handling a variety of incident types across diverse environments. They contribute to process improvements, maintain strong client communication, and continue building advanced DFIR skills through hands‑on investigations and internal project work.

Job Responsibility:

  • Investigates security incidents by performing host, disk, memory, network, and cloud forensic analysis under established processes and guidance
  • Analyzes artifacts across Windows, Linux, and macOS systems, helping reconstruct timelines and determine root cause
  • Supports clients through containment and recovery efforts by providing technical recommendations and clear communication
  • Participates in the team’s on‑call rotation for urgent incident response needs
  • Completes internal and client tasks such as tabletop exercises, IR readiness assessments, basic forensic reviews, and environment hardening support
  • Identifies observable gaps and risks within client environments and recommends improvements to strengthen security posture
  • Produces accurate documentation—including investigation notes, status updates, and final reports
  • Collaborates with global DFIR and other teams and stays current on threats, attacker techniques, and emerging forensic tools

Requirements:

  • Proven experience in incident response and digital forensics, with capability in host‑based, image, and log analysis
  • Experience using SIEM, EDR, IDS/IPS, and other security tools to triage, investigate, and respond to incidents
  • Ability to perform network analysis using tools such as Wireshark, tcpdump, and other tools
  • Experience in cybersecurity operations, consulting, DFIR services, or related technical security roles
  • Bachelor’s degree or equivalent experience in Information Technology, Computer Science, Cybersecurity, or a related discipline (preferred)
  • Relevant cybersecurity certifications such as SANS GIAC Security Essentials (GSEC) or equivalent preferred
  • SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred
  • SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred
  • Additional DFIR‑related certifications are considered a plus
  • Active UK Security Clearance is required
  • Background and hands‑on experience in OT environments
  • Experience investigating ICS/SCADA systems and industrial sectors such as manufacturing, energy, utilities, or critical infrastructure
  • Ability to collect and analyze OT forensic artifacts, interpret OT protocols and system behavior, and assess the impact of cyber incidents on physical processes
  • SANS OT/ICS certifications such as GICSP or GRID, IEC 62443 or equivalent required

Additional Information:

Job Posted:
March 26, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Information Security Incident Response Analyst

Principal Incident Response Analyst

At Atlassian, the Principal Incident Response Analyst plays a vital role in main...
Location
Location
United States , San Francisco; Austin; Mountain View; New York
Salary
Salary:
183800.00 - 295200.00 USD / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or a related field
  • At least 5 years of experience in a security incident response role
  • Strong understanding of various security technologies and systems, including firewalls, intrusion detection systems, anti-virus software, and authentication systems
  • Experience building and maintaining tools to assist with incident response and other security tasks
  • Ability to write basic programs in a scripting or programming language
  • Demonstrated ability to coordinate incident response among multiple teams and departments
  • Excellent written and oral communication skills
  • Ability to work under high pressure and fast-paced conditions
  • Experience with cloud technologies including GCP and network protocols
  • Expertise in creating and maintaining incident response playbooks
Job Responsibility
Job Responsibility
  • Lead the region's incident response team to ensure timely and effective response to security incidents
  • Coordinate across various teams within Atlassian during a security incident to facilitate effective communication and response
  • Coach and mentor team members in day-to-day activities
  • Build tools, systems, and programs of work to uplift Atlassian's security posture
  • Create regular training and drills for the incident response team to ensure readiness in the event of a security incident
  • Conduct post-incident analysis to identify areas for improvement in the incident response process
  • Communicate effectively with management and other stakeholders about the status of security incidents and the steps being taken to resolve them
  • Work with other security teams within Atlassian to develop strategies and plans to prevent future security incidents
  • Produce threat intelligence that is specific to Atlassian products and infrastructure
  • Own and manage the delivery of projects that advance the team's incident response capabilities
What we offer
What we offer
  • health coverage
  • paid volunteer days
  • wellness resources
  • Fulltime
Read More
Arrow Right

Information Security Analyst

Robert Half is the world’s first and largest specialized talent solutions firm t...
Location
Location
United States , Ashland
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Information Security, Computer Science, or related field
  • 3-5+ years of experience in information security, with specific expertise in risk assessments, compliance, and strategic security planning
  • Strong working knowledge of NIST, ISO/IEC 27001, and other industry standards
  • Experience conducting security-focused business impact analyses
  • Familiarity with regulatory requirements such as GDPR, HIPAA, and PCI DSS
  • Strong communication skills with the ability to translate technical concepts for non-technical audiences in consultative settings
  • Industry certifications such as CISSP, CISM, CRISC, or CISA are highly preferred
Job Responsibility
Job Responsibility
  • Develop and implement comprehensive information security strategies and programs that align with the business’s overall goals
  • Facilitate consultative discussions across departments to identify security needs and integrate them into long-term planning processes
  • Apply and customize NIST Cybersecurity Framework (CSF) and ISO/IEC 27001 standards to create secure systems, processes, and environments
  • Conduct gap analyses to benchmark current security processes against established frameworks and recommend improvements
  • Perform and document risk assessments, evaluating potential vulnerabilities and threats
  • Conduct business impact analyses to prioritize assets and ensure appropriate allocation of security resources to critical areas
  • Evaluate the organization’s compliance with relevant regulatory standards, such as GDPR, HIPAA, CCPA, and PCI DSS, and provide remediation plans to address deficiencies
  • Partner with internal and external auditors to perform compliance-related audits and assessments
  • Act as a point of consultative support for business leaders and departments regarding information security risks, requirements, and best practices
  • Collaborate with IT teams, project managers, and other stakeholders to ensure security is embedded into new system implementations and upgrades
What we offer
What we offer
  • medical
  • vision
  • dental
  • life and disability insurance
  • 401(k) plan
Read More
Arrow Right

Security Incident Management Analyst

The Security Incident Management Analyst is an intermediate level position respo...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant professional certifications issued by GIAC, AWS, etc., preferably GCCC, GCIH, CEH, ECSA
  • General Industry knowledge of reporting obligations pertaining to local and national laws and regulatory bodies such as OCC, SEC, ECB, MAS
  • Working knowledge of common security models (Defense-in-Depth) and frameworks (MITRE Attack, Cyber Kill Chain, STIX)
  • Working knowledge of VERIS taxonomy
  • Working knowledge of OSI model
  • Working knowledge of security and/or incident response in cloud environments
  • Working knowledge of software development best practices, including agile methods
  • Familiar with Atlassian tools
  • Previous experience working in highly regulated environment
  • Previous experience in a fusion center and/or exposure to large scale incident response
Job Responsibility
Job Responsibility
  • Work as part of a best in class ‘follow the sun’ security incident response team
  • Lead and manage incident response activities to ensure that requisite triage, containment, and eradication are completed within targeted timeframes
  • Ensure that the security incident record is complete, accurate and fit for purpose
  • Collect and analyze evidence including investigative findings and prepare to coordinate with internal and external compliance and audit personnel
  • Execute incident response meetings and communicate complex security topics
  • exhibit good judgment and discretion when initiating escalations to all levels of the organization
  • Ensure that controls are utilized daily and that non-compliance remediation is addressed by appropriate selection
  • Provide IS consulting services, including interpreting and/or clarifying information security policy, procedures, standards or concepts
  • Assist with defining and implementing information security standards to align procedures and practices in pursuit of compliance with Citigroup standards
  • Validate compliance with information security policies, practices, and procedures, and resolve a variety of information security related issues in coordination with the relevant business(es)
  • Fulltime
Read More
Arrow Right

Information Security Technology Analyst - Governance

The Information Security Technology Analyst is an intermediate level position re...
Location
Location
Philippines , City of Taguig, Metro Manila
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5-8 years of relevant experience
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor's degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Assist Security Incident Response Teams with incident investigations and aid in technical risk assessments
  • Coordinate with system development and infrastructure units to identify Information Security (IS) risks and the appropriate controls for development, day-to-day operation, and emerging technologies
  • Perform regular assessments based on changes in the threat landscape
  • Monitor vulnerability assessments and ethical hacks, ensuring that issues are addressed for the applications that they support
  • Provide information security support with related activities during systems development (e.g. authentication, encryption)
  • Identify and develop new and improved technical procedures and process control manuals
  • Identify significant IS threats and vulnerabilities
  • Assume informal/formal mentorship role within teams and assist with the coaching and training of new team members
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients and assets
  • Fulltime
Read More
Arrow Right

Information Security Analyst

The Information Security Analyst will play a key role in safeguarding the organi...
Location
Location
United States , Atlanta
Salary
Salary:
Not provided
oceanbluecorp.com Logo
Ocean Blue Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in information security, Cybersecurity, IT, or related field
  • or equivalent 1 year
  • or Preference will be given to candidates with relevant State of Georgia Experience
  • Hands-on experience with Splunk, CrowdStrike Falcon, and Tenable Nessus/Tenable.sc.
  • Strong understanding of CUI protection requirements and compliance frameworks (NIST, FISMA, IRS Pub 1075, CMS, SSA)
  • Experience with incident response, vulnerability management, and risk assessments
  • Strong analytical, documentation, and communication skills
Job Responsibility
Job Responsibility
  • Conduct continuous monitoring of enterprise systems using CrowdStrike (EDR), Splunk (SIEM), and Tenable (Vulnerability Management)
  • Detect, investigate, and respond to potential threats and incidents impacting CUI and overall system security
  • Maintain dashboards, alerts, and reports to ensure proactive detection and escalation of risks
  • Perform ongoing vulnerability assessments with Tenable, track remediation efforts, and validate closure of findings
  • Support patch management and configuration management processes to reduce the attack surface
  • Deliver metrics and risk posture updates to leadership
  • Maintain and update System Security Plans (SSPs) to document the implementation of security controls
  • Support external and internal audits (IRS, CMS, SSA, NIST, FISMA) by providing required evidence, documentation, and remediation tracking
  • Assist in compliance with evolving frameworks (e.g., NIST SP 800-53 Rev. 5)
  • Triage, analyze, and document security incidents across enterprise systems
Read More
Arrow Right

Senior Information Security Compliance Analyst

We're looking for a technically grounded Senior IS Compliance Analyst who speaks...
Location
Location
United States , Chicago
Salary
Salary:
90000.00 - 130000.00 USD / Year
blumeglobal.com Logo
Blume Global
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Hands-on experience in technical security roles such as Security Operations, Incident Response, Security Analysis, penetration testing, or similar
  • Practical knowledge of security tools, SIEM platforms, vulnerability management, and security monitoring
  • and ability to read and understand security logs, configurations, and technical documentation
  • 6+ years of total experience with significant time in GRC
  • Working knowledge of ISO 27001, NIST frameworks, SOC 1/2, and GDPR requirements
  • Experience developing and implementing information security policies and controls
  • ISO 27001:2022 Lead Implementer and Lead Auditor certification
Job Responsibility
Job Responsibility
  • Lead technical security assessments and integration of acquired companies, mapping their security architectures and controls to our GRC frameworks, identifying gaps, and building remediation roadmaps that address both technical security and compliance alignment
  • Bridge technical security and business stakeholders by evaluating risks through a technical lens, working alongside security engineering teams to translate GRC requirements into practical security measures, and communicating effectively across technical and non-technical audiences
  • Develop and harmonize security policies and control frameworks across acquired entities, ensuring they're both audit ready and operationally sound, while translating between technical security requirements and governance documentation
  • Own customer security questionnaire responses by leveraging your hands-on security background to provide detailed, accurate answers and collaborating with infrastructure, application security, and operations teams to gather technical evidence
  • Drive continuous improvement of our GRC program through technical security enhancements, meaningful security and compliance metrics, and process improvements that increase both control effectiveness and operational efficiency
What we offer
What we offer
  • health and welfare benefits
  • tuition assistance
  • 401K savings and other retirement programs
  • employee assistance programs
Read More
Arrow Right

Incident Response and SOC Analyst

The role supports the Cyber Security Operations Centre for the EU critical infra...
Location
Location
Belgium , Brussels
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong incident response methodology and hands-on experience in end-to-end incident handling in multinational settings
  • Advanced knowledge of XSOAR playbook creation and automation
  • Proficiency in designing and adapting automated workflows and enrichment
  • Python programming skills
  • Ability to present technical and business information effectively to diverse EC stakeholders
  • High standards for incident documentation, KPI reporting, and compliance with security frameworks
  • Familiarity with cloud-native services (AWS, Azure), EDR, SIEM-SOAR platforms, and container security
  • Excellent communication skills for working in multicultural teams and liaising with technical and non-technical audiences
  • Certifications or experience in relevant security technologies (e.g., Palo Alto Cortex XSOAR, Splunk, Microsoft SC-200, AWS Security Specialty)
  • Level 6 European Qualification Framework (Bachelor's degree or higher) for senior profiles
Job Responsibility
Job Responsibility
  • Define incident handling procedures, automation requirements, and playbook logic aligned with the needs
  • Prepare incident response workflows, automated enrichment steps, and technical documentation for standardized alert handling
  • Handle cybersecurity incidents from detection through escalation, containment, and resolution
  • Develop and maintain XSOAR playbooks, integrations, and automations across platforms such as Splunk, AWS, Azure Sentinel, Carbon Black Cloud, and Sysdig
  • Coordinate and review playbook updates, incident reports, and cross-team collaboration
  • Report key performance metrics, including FPTP rate, MTTH, escalation rate, automation coverage, time saved, and error reductions
  • Assist training analysts on playbook usage and incident response methods
  • Collaborate with CSIRC, CATCH analysts, infrastructure teams, and external stakeholders to validate playbook coverage and share threat intelligence.
What we offer
What we offer
  • Mobility options (including a company car)
  • Insurance coverage
  • Meal vouchers
  • Eco-cheques
  • Continuous learning opportunities through the Sopra Steria Academy
  • Participation in team events.
  • Fulltime
Read More
Arrow Right

Risk & Information Security Associate Analyst

We are looking for a highly organized, detail-oriented Risk & Information Securi...
Location
Location
Cyprus , Nicosia
Salary
Salary:
Not provided
www-ap.albourne.com Logo
Albourne
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2–3 years of professional experience
  • Excellent organizational skills with the ability to manage multiple workstreams and meet deadlines in a dynamic environment
  • Strong written and verbal communication skills, including the ability to prepare concise, well-structured documents and interact professionally across all levels of the business
  • Meticulous attention to detail, particularly in preparing audit materials, compliance documentation, and reviewing access controls
  • Proactive and self-motivated, able to work independently and across time zones without direct daily supervision
  • Comfortable handling sensitive and confidential information with discretion
  • Interest in technology, cybersecurity, and enterprise risk
  • Basic understanding of information security principles and frameworks (e.g., ISO 27001, NIST)
  • Ability to interpret and work with structured information (e.g., policies, risk registers, audit plans)
  • Capable of coordinating inputs from multiple stakeholders and compiling them into coherent outputs (e.g., committee papers, training summaries, client DDQs)
Job Responsibility
Job Responsibility
  • Monitor and report on the effectiveness of information security controls
  • Support the identification, tracking, and resolution of security incidents or weaknesses
  • Assist in maintaining security metrics and dashboards for internal reporting
  • Contribute to the assessment of operational, technology, and third-party risks
  • Assist in evaluating controls and proposing mitigation strategies aligned with risk appetite
  • Participate in internal audits and control testing, ensuring timely remediation of findings
  • Help maintain and enforce security and risk management policies and procedures
  • Support compliance with relevant data protection, privacy, and information security regulations
  • Coordinate periodic user access reviews and assist with awareness initiatives
  • Work across departments to gather risk-related information and support secure business operations
What we offer
What we offer
  • Support for professional qualifications (such as CFA and CAIA)
  • Career growth and tools for ongoing learning and development
  • Medical insurance for you and your dependents
  • Provident fund
  • Yearly bonus dependent upon performance and company growth
  • Opportunity for international travel (i.e., short periods of secondment to other Albourne offices)
  • 5 additional service recognition holidays in surplus to standard annual leave
  • Albourne Training Days (minimum of 40 hours per year)
  • Free office parking
  • A supportive, diverse, and multi-cultural work environment
  • Fulltime
Read More
Arrow Right