招聘
The Incident Response Analyst is part of the front line of our Cyber Threat Intelligence and Incident Response team, responsible for providing Endava with high fidelity, actionable cyber threat intelligence and specialist incident response capabilities.
Strong knowledge of the latest security threats, industry standard incident response methodologies, and investigation techniques is expected. Candidates should also demonstrate adaptability, knowledge of both incident response and cyber threat intelligence, and an eagerness to learn emerging threat actor tactics, tools and techniques.
Responsibilities:
· Act as a key responder during security incidents, supporting containment, eradication and recovery activities.
· Perform detailed investigation and analysis of security alerts, intrusions and malware using EDR, SIEM and forensic tooling.
· Support post-incident reviews, identifying root cause, control gaps and lessons learned.
· Coordinate with SOC, CTI, IT, legal and third-party providers during incidents to ensure timely and effective response
· Support evidence collection and documentation to meet legal, regulatory and internal reporting requirements.
In periods without active incident response activity, the analyst will actively support Cyber Threat Intelligence operations and initiatives
Qualifications:
· Degree in Cyber Security, Computer Science, Information Technology or a related discipline, or equivalent practical experience.
· Relevant incident response, blue team or security operations certification (for example GCIH, GCED, or equivalent).
· Demonstrated experience responding to security incidents, labs or realistic tabletop exercises.
Experience:
6-10 years experience with Incident management
· 3+ years in cybersecurity, with at least 2 years in SOC/CTI/Incident Response.
· Hands-on experience in malware analysis, memory forensics, and log analysis.
· Strong understanding of network protocols, secure configurations, and common attack techniques (MITRE ATT&CK).
· Experience supporting or participating in security incident response activities, including investigation and containment.
· Familiarity with SOC tooling such as SIEM, EDR, Threat Intelligence Platforms and alerting platforms.
· Experience analysing security alerts, logs and endpoint telemetry to identify malicious activity.
· Experience documenting incidents, investigations and lessons learned in a clear and structured manner.
Technical Skills:
