Information Security Analyst

  • United Kingdom
  • GBP 75,000
  • Permanent
  • Discipline: Cyber Security
  • Ref: 49150

Information Security Analyst

Information Security Analyst (Incident Response & Monitoring) – Up to £75,000 – London (Hybrid)

We are seeking an experienced Information Security Analyst (AVP-level) to join a growing Cyber Security team in London. This is a hands-on technical role within the Security Operations and Incident Response function, responsible for threat detection, incident handling, and improving the effectiveness of the security monitoring landscape.

This role is based in London and offers hybrid working, flexible hours, and a supportive working environment.

 

Key Responsibilities

 

Incident Response & Security Operations

  • Detect, analyse, and investigate security incidents across infrastructure and application layers.
  • Coordinate incident response, containment, and remediation efforts across business and technical teams.
  • Develop threat detection use-cases and optimise alerting within SIEM and IR tooling.
  • Perform deep-dive forensic analysis of network traffic, logs, and endpoint telemetry.
  • Enhance the security incident lifecycle through established frameworks (MITRE ATT&CK, Kill Chain, Diamond Model).

 

Threat Detection & Security Monitoring

  • Improve monitoring coverage across systems through custom detections, threat intelligence feeds, and IOC integration.
  • Lead the development of threat hunting and behavioural analytics capabilities.
  • Review and improve control effectiveness across the security tech stack (SIEM, EDR, DLP, IDS/IPS, etc.).
  • Contribute to internal vulnerability management processes and security hardening efforts.

 

Security Governance & Stakeholder Engagement

  • Support penetration testing coordination and risk remediation with application and infrastructure teams.
  • Contribute to the implementation and refinement of standard operating procedures for incident handling.
  • Assist in security risk assessments, reporting, and internal security awareness initiatives.

 

Essential Skills & Experience

  • Experience in incident response, threat hunting, and forensic analysis.
  • Strong understanding of SIEM platforms (e.g. Splunk, QRadar, etc.) and detection engineering.
  • Familiarity with security frameworks such as MITRE ATT&CK, NIST, and cyber kill chain methodologies.
  • Ability to analyse network traffic (Wireshark or equivalent), logs, and host-based artifacts.
  • Strong working knowledge of operating systems (Windows, Linux), and enterprise infrastructure (networking, cloud, VPN, etc.).
  • Knowledge of vulnerability management processes and secure configuration benchmarking (e.g., CIS).
  • Hands-on experience with security monitoring tools, packet inspection, and advanced threat detection.

 

Desirable Certifications

  • GIAC certifications such as GCIH, GCIA, GCFA (or equivalent).

 

Additional Information

  • Salary: Up to £75,000 (depending on experience)
  • Location: London-based with hybrid working
  • Hours: Standard business hours with flexibility (occasional coverage between 7am–7pm as needed)

Apply for this job

We are an inclusive organisation and actively promote equality of opportunity for all with the right mix of talent, skills, and potential. We welcome all applications from a wide range of candidates. Selection for roles will be based on individual merit alone.

Latest Jobs by Aaron

Information Security Analyst

  • United Kingdom
  • GBP 75,000
  • Permanent

Information Security Analyst

Information Security Analyst (Incident Response & Monitoring) – Up to £75,000 – London (Hybrid)

We are seeking an experienced Information Security Analyst (AVP-level) to join a growing Cyber Security team in London. This is a hands-on technical role within the Security Operations and Incident Response function, responsible for threat detection, incident handling, and improving the effectiveness of the security monitoring landscape.

This role is based in London and offers hybrid working, flexible hours, and a supportive working environment.

 

Key Responsibilities

 

Incident Response & Security Operations

  • Detect, analyse, and investigate security incidents across infrastructure and application layers.
  • Coordinate incident response, containment, and remediation efforts across business and technical teams.
  • Develop threat detection use-cases and optimise alerting within SIEM and IR tooling.
  • Perform deep-dive forensic analysis of network traffic, logs, and endpoint telemetry.
  • Enhance the security incident lifecycle through established frameworks (MITRE ATT&CK, Kill Chain, Diamond Model).

 

Threat Detection & Security Monitoring

  • Improve monitoring coverage across systems through custom detections, threat intelligence feeds, and IOC integration.
  • Lead the development of threat hunting and behavioural analytics capabilities.
  • Review and improve control effectiveness across the security tech stack (SIEM, EDR, DLP, IDS/IPS, etc.).
  • Contribute to internal vulnerability management processes and security hardening efforts.

 

Security Governance & Stakeholder Engagement

  • Support penetration testing coordination and risk remediation with application and infrastructure teams.
  • Contribute to the implementation and refinement of standard operating procedures for incident handling.
  • Assist in security risk assessments, reporting, and internal security awareness initiatives.

 

Essential Skills & Experience

  • Experience in incident response, threat hunting, and forensic analysis.
  • Strong understanding of SIEM platforms (e.g. Splunk, QRadar, etc.) and detection engineering.
  • Familiarity with security frameworks such as MITRE ATT&CK, NIST, and cyber kill chain methodologies.
  • Ability to analyse network traffic (Wireshark or equivalent), logs, and host-based artifacts.
  • Strong working knowledge of operating systems (Windows, Linux), and enterprise infrastructure (networking, cloud, VPN, etc.).
  • Knowledge of vulnerability management processes and secure configuration benchmarking (e.g., CIS).
  • Hands-on experience with security monitoring tools, packet inspection, and advanced threat detection.

 

Desirable Certifications

  • GIAC certifications such as GCIH, GCIA, GCFA (or equivalent).

 

Additional Information

  • Salary: Up to £75,000 (depending on experience)
  • Location: London-based with hybrid working
  • Hours: Standard business hours with flexibility (occasional coverage between 7am–7pm as needed)
Apply Now

VP – Digital Forensics & Incident Response (DFIR) Manager

  • United Kingdom
  • GBP 90,000
  • Permanent
VP – Digital Forensics & Incident Response (DFIR) Manager
Job Description

Role: VP – Digital Forensics & Incident Response (DFIR) Manager

Location: London (Hybrid working available)

Salary: Up to £90,000 + benefits

Sector: Cyber Security / Financial Services

 

Overview

A leading financial services organisation is seeking a VP-level DFIR Manager to lead its Digital Forensics and Incident Response (DFIR) team. This is a hands-on leadership role focused on incident response, threat detection, and forensics within a complex, regulated environment.

You'll be responsible for advancing the organisation’s incident response capabilities, leading investigations, and driving threat detection maturity through development of use cases, threat intelligence, and vulnerability management.

 

Key Responsibilities

  • Lead the DFIR function, overseeing incident detection, investigation, and response activities.
  • Develop and implement IR methodologies (MITRE ATT&CK, Kill Chain, Threat Modelling, Diamond Model).
  • Conduct forensic investigations on systems, networks, and endpoints.
  • Refine threat hunting and threat intelligence capabilities.
  • Support and mature security monitoring use cases (SIEM, packet inspection, IOCs).
  • Coordinate cross-functional security incident response with SOC, Threat Intelligence, and Red/Blue teams.
  • Engage with technical and business teams on cyber risk reduction strategies.
  • Contribute to vulnerability management and remediation plans.

 

Required Skills & Experience

  • Proven experience managing DFIR or cyber incident response teams.
  • Deep technical knowledge of IR and forensic analysis (e.g. Wireshark, packet capture, host-based artifacts).
  • Strong understanding of security monitoring frameworks (MITRE ATT&CK, NIST, etc.).
  • Experience working in financial services or a regulated environment preferred.
  • Hands-on experience with SIEM tools, network forensics, and endpoint detection.
  • Knowledge of CIS benchmarks, cloud security, IAM, DLP, and vulnerability management.
  • Familiarity with Windows, Linux/Unix, networking, and virtualisation (VMware).

 

Certifications (preferred):

GCIA, GCIH, GCFA or equivalent.

 

What’s on Offer

  • Up to £90,000 base salary
  • Hybrid/flexible working arrangements
  • Opportunity to build and lead a growing DFIR capability in a major enterprise setting
  • Supportive, inclusive culture with emphasis on work-life balance
Apply Now