Job Search and Career Advice Platform

Enable job alerts via email!

Security Incident Specialist

The Nadara group

City of London

On-site

GBP 50,000 - 70,000

Full time

30+ days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A renewable energy company based in London seeks a Security Incident Specialist to manage and respond to security incidents. The role involves coordinating Azure security solutions and working closely with various teams. Ideal candidates should have a degree in cybersecurity and several years of relevant experience. This position offers growth opportunities in a diverse international environment.

Benefits

Stimulating international environment
People-centric approach
Growing opportunities

Qualifications

  • 3+ years as SOC analyst or 5+ years with undergraduate degree.
  • Ability to analyze threat vectors and propose necessary actions.
  • Excellent written and verbal communication skills.

Responsibilities

  • Lead incident response efforts and escalate as necessary.
  • Maintain and develop security monitoring systems.
  • Review analytics and develop incident playbooks.

Skills

Familiarity with Microsoft Security Solutions
Incident investigations and response
Log collection analysis
Malware analysis
Phishing analysis
Secops scripting (bash, vbscript, Powershell, python)

Education

Master/Bachelor Degree in cybersecurity or computer science

Tools

SIEM/SOAR (Sentinel)
Job description

Nadara Greater London, England, United Kingdom

Get AI-powered advice on this job and more exclusive features.

R0001210 Security Incident Specialist (Open)

We’re Nadara. We work harmoniously with the power of nature and the communities around us to power lifetimes to come. We call our approach ‘living energy’. We don’t just produce renewable energy, we live it – recognising our relationship with the people touched by our business and supporting social, educational, cultural, and environmental initiatives that contribute to the development of the communities we work alongside. Discover more about our business here: https://nadara.com/about/ Nadara is an innovative place to work. We work in a stimulating and challenging environment, where every day we explore the unknown with curiosity, make decisions with quality and take action and deliver with courage. For us diversity is a real value, and we encourage in connecting different perspectives with respect. Discover more about our culture and approach here: https://nadara.com/living-the-company/

Job Description Summary

The Security Incident Specialist is responsible for ensuring robust incident management by investigating and addressing security incidents reported by or assigned to the SOC. This role involves leading incident response efforts, escalating issues to designated owners when necessary, and coordinating the implementation of Azure Security Solutions, including Azure DLP, Defender, and Defender for Cloud. Additionally, the specialist will support the development and refinement of policies and procedures to enhance Security Incident Management and Cybersecurity practices.

Job Description

The Security Incident Specialist is responsible for ensuring robust incident management by investigating and addressing security incidents reported by or assigned to the SOC. This role involves leading incident response efforts, escalating issues to designated owners when necessary, and coordinating the implementation of Azure Security Solutions, including Azure DLP, Defender, and Defender for Cloud. Additionally, the specialist will support the development and refinement of policies and procedures to enhance Security Incident Management and Cybersecurity practices.

Responsibilities

Reporting to the Cybersecurity Manager, the Security Incident Specialist is responsible for maintaining, measuring, and improving the overall Incident Management process within the assigned scope, budget, and timeline. Key responsibilities include:

  • Demonstrating familiarity with Microsoft Security Solutions (Defender, Sentinel, Azure, Entra, etc.).
  • Implementing Azure Security Solutions to strengthen the organization's security posture and optimize incident handling processes.
  • Maintaining and developing the company’s security monitoring systems and ensuring efficient SIEM ingestion (Sentinel).
  • Ensuring the proper collection of logs, alerts, and incidents for effective monitoring and response.
  • Reviewing and developing analytics and playbooks for incident classification, assignment, and response automation.
  • Reporting the status and outcomes of incidents and investigations to company stakeholders.
  • Writing clear and comprehensive incident reports, combining logs and evidence, tailored for both C-level executives and technical teams.
  • Coordinating the Incident Management process with Vulnerability Management to ensure cohesive security operations.
  • Supporting initiatives to enhance secure architectures, reducing the potential threat landscape.
  • Aligning the Incident Management process with organizational policies, procedures, and security guidelines.
Key Requirements

Master/Bachelor Degree in cybersecurity or computer science and 3y+ as SOC analyst, or undergraduate and 5y+ as SOC analyst

  • SIEM/SOAR (Sentinel) maintenance and development
  • Log collection, analysis and correlation
  • Incidents investigations and response
  • Malware analysis
  • Phishing analysis
  • File system checks and memory dump
  • Ioc editing and searching
Good Practice On
  • Evidence acquisition and retention
  • Secops scripting (bash, vbscript, Powershell, python)
  • Threat intelligence and OSINT
  • Support the cybersecurity policies and procedures definition (especially Security Incident Management)

Eager to learn, curious mind to find threats, discover backdoors, find attack vectors, talented to build and show samples for scratch

Highly effective communication skills and be capable of presenting data clearly to various audience

Excellent written and verbal English

Ability to work within complex teams and in an international environment.

Desirable Requirements

Certifications: Blue Team Level 1 (BTL1), Blue Team Level 2 (BTL2), eCTHP, eCIR, GCIH, SC-200, AZ-500, AZ-900, Certified CyberDefender (CCD) or similar.

Experience in cybersecurity governance, including the development and alignment of policies, frameworks and compliance strategies.

What do we offer?
  • A stimulating international environment. You will never get bored!
  • People - centric approach. This is our one and only way of thinking!
  • Stimulating challenges and growing opportunities
  • The possibility to work in a team where people are passionate about their job
Location

Lisbona

Time Type

Full time

Worker Subtype

Regular

Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Other, Information Technology, and Management

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.