More jobs:
Security Incident Specialist
Job in
Edinburgh, City of Edinburgh Area, EH1, Scotland, UK
Listed on 2025-11-07
Listing for:
The Nadara group
Full Time
position Listed on 2025-11-07
Job specializations:
-
IT/Tech
Cybersecurity, Security Manager
Job Description & How to Apply Below
Lisbona:
Milano - Martesana:
Madrid:
London:
Edinburgh time type:
Full time posted on:
Posted 30+ Days Agojob requisition :
R0001210R0001210 Security Incident Specialist (Open)
* We’re Nadara. We work harmoniously with the power of nature and the communities around us to power lifetimes to come. We call our approach ‘living energy’.
** We don’t just produce renewable energy, we live it – recognising our relationship with the people touched by our business and supporting social, educational, cultural, and environmental initiatives that contribute to the development of the communities we work alongside.
** Discover more about our business here:
** Nadara is an innovative place to work. We work in a stimulating and challenging environment, where every day we explore the unknown with curiosity, make decisions with quality and take action and deliver with courage. For us diversity is a real value, and we encourage in connecting different perspectives with respect.
** Discover more about our culture and approach here:*##
** Job Description
Summary:
** The Security Incident Specialist is responsible for ensuring robust incident management by investigating and addressing security incidents reported by or assigned to the SOC. This role involves leading incident response efforts, escalating issues to designated owners when necessary, and coordinating the implementation of Azure Security Solutions, including Azure DLP, Defender, and Defender for Cloud. Additionally, the specialist will support the development and refinement of policies and procedures to enhance Security Incident Management and Cybersecurity practices.##
*
* Job Description:
** The
** Security Incident Specialist
** is responsible for ensuring robust incident management by investigating and addressing security incidents reported by or assigned to the SOC. This role involves leading incident response efforts, escalating issues to designated owners when necessary, and coordinating the implementation of Azure Security Solutions, including Azure DLP, Defender, and Defender for Cloud. Additionally, the specialist will support the development and refinement of policies and procedures to enhance Security Incident Management and Cybersecurity practices.
Reporting to the Cybersecurity Manager, the Security Incident Specialist is responsible for maintaining, measuring, and improving the overall Incident Management process within the assigned scope, budget, and timeline.
Key responsibilities include:
* Demonstrating familiarity with Microsoft Security Solutions (Defender, Sentinel, Azure, Entra, etc.).
* Implementing Azure Security Solutions to strengthen the organization's security posture and optimize incident handling processes.
* Maintaining and developing the company’s security monitoring systems and ensuring efficient SIEM ingestion (Sentinel).
* Ensuring the proper collection of logs, alerts, and incidents for effective monitoring and response.
* Reviewing and developing analytics and playbooks for incident classification, assignment, and response automation.
* Reporting the status and outcomes of incidents and investigations to company stakeholders.
* Writing clear and comprehensive incident reports, combining logs and evidence, tailored for both C-level executives and technical teams.
* Coordinating the Incident Management process with Vulnerability Management to ensure cohesive security operations.
* Supporting initiatives to enhance secure architectures, reducing the potential threat landscape.
* Aligning the Incident Management process with organizational policies, procedures, and security guidelines.
** Key Requirements
** Master/Bachelor Degree on cybersecurity or computer science and 3y+ as SOC analyst, or undergraduate and 5y+ as SOC analyst
Excellent practice on
* SIEM/SOAR (Sentinel) maintenance and development
* Log collection, analysis and correlation
* Incidents investigations and response
* Malware analysis
* Phishing analysis
* File system checks and memory dump
* Ioc editing and searching
** Good practice on:
*** Evidence acquisition and retention
* Secops scripting (bash, vbscript,…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×