Enable job alerts via email!

Senior Incident Response Specialist

Sportradar

London

Hybrid

GBP 50,000 - 90,000

Full time

3 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player seeks a Senior Incident Response Specialist to join their Security Operations Center. This role is pivotal in managing and responding to complex security incidents while enhancing threat detection capabilities. You will collaborate with various stakeholders to ensure rapid resolution of incidents and maintain compliance with security frameworks. The position offers a hybrid work model, allowing you to balance onsite and remote work. Join a vibrant and inclusive community that values diversity and provides opportunities for professional growth in a fast-paced digital sports environment.

Benefits

Collaborative environment
Professional development plan
Opportunity to work with senior leadership
Vibrant and inclusive community
Hybrid work model

Qualifications

  • 5+ years of experience in a SOC focused on incident response.
  • Proven ability to investigate threats targeting web applications and cloud infrastructure.

Responsibilities

  • Lead incident response efforts and manage incidents from detection to remediation.
  • Collaborate with threat intelligence teams and perform forensic analysis.

Skills

Incident Response
Threat Hunting
Forensic Analysis
Cloud Security
Analytical Skills
Communication Skills

Education

Certifications in relevant fields (GCIH, GIAC, etc.)

Tools

SIEM platforms
AWS Security Services
Endpoint Detection and Response tools
Network Traffic Analysis tools
Scripting languages (PowerShell, Python)

Job description

This job is brought to you by Jobs/Redefined, the UK's leading over-50s age inclusive jobs board.

Company Description

We're the world's leading sports technology company, at the intersection between sports, media, and betting. More than 1,700 sports federations, media outlets, betting operators, and consumer platforms across 120 countries rely on our know-how and technology to boost their business.

Job Description

LOCATION: Work onsite in London, Vienna, Ljubljana, Sevilla, or Munich
WORK TYPE: Hybrid remote and onsite (3 days office, 2 days remote)

Job Description:

The Senior Incident Response Specialist will serve as a senior member of the Security Operations Center within the Information Security team, leading incident response and proactive threat hunts. This position requires a hands-on, expert-level professional responsible for proactively detecting, investigating, and responding to complex threats against the organization's environment, particularly with applications and cloud infrastructure.

The Senior Incident Response Specialist will work closely with a diverse range of stakeholders to ensure any threats are quickly and effectively contained and any incident is brought to a rapid resolution. They will be responsible for managing incidents in strict alignment with relevant frameworks, such as NIST or ISO, and any applicable regulatory requirements, maintaining adherence to organizational standards and compliance mandates. This role is critical in protecting the organization's assets and improving its overall threat detection and response capabilities.

THE CHALLENGE:

  1. Act as the primary point of contact for incident response within the SOC, taking ownership of incidents from detection through to remediation.
  2. Collaborate with threat intelligence teams to incorporate emerging threat data and integrate relevant indicators of compromise into hunting and detection practices.
  3. Perform forensic analysis on systems, applications, and cloud environments to trace the origin, scope, and impact of incidents.
  4. Develop and refine detection rules, incident response playbooks, and investigation workflows to strengthen SOC capabilities and improve incident response effectiveness.
  5. Ensure comprehensive documentation of threat hunting and incident response activities, providing detailed reporting on investigative findings, lessons learned, and recommended remediation steps.
  6. Lead proactive threat hunting activities, identifying and investigating potential threats and vulnerabilities within the organization's environment.
  7. Stay current on new threats, vulnerabilities, and attack techniques, especially those targeting web applications and cloud services, and incorporate this knowledge into SOC processes.

ABOUT YOU:

  1. 5+ years of experience in a SOC, with a strong focus on incident response and threat hunting.
  2. Proven experience investigating and mitigating threats targeting web applications and cloud infrastructure (specifically AWS).
  3. Deep experience conducting analysis of data from a diverse range of data sources using a SIEM.
  4. Demonstrated expertise in performing forensic investigations and root cause analyses for complex incidents.
  5. Experience with SIEM platforms, endpoint detection and response tools, and network traffic analysis.
  6. Strong understanding of attack frameworks (e.g. MITRE ATT&CK) and the ability to apply them to threat hunting and incident response.
  7. Experience creating detection rules, playbooks, and workflows to improve SOC detection and response efficiency.

Desired Experience:

  1. Applying the results of previous incidents and threat hunting activities to creating new detection use cases.
  2. Hands-on experience with AWS security services, such as GuardDuty, Security Hub, CloudTrail, and IAM configurations.
  3. Familiarity with securing web applications, including common vulnerabilities (e.g. OWASP Top 10) and mitigation techniques.
  4. Proficiency in scripting languages like PowerShell and Python.
  5. Experience working within agile or continuous improvement environments.

Desired Qualifications:

  1. Strong analytical skills, with the ability to handle high-pressure situations and manage complex security incidents from start to finish.
  2. Effective communication skills, with the ability to produce clear, concise documentation and interact effectively with both technical and non-technical stakeholders.
  3. Certifications in relevant fields, such as GCIH, GIAC, GCFA, AWS Certificated Security, CISSP, or equivalent.

OUR OFFER:

  1. A collaborative environment with colleagues from all over the world (Offices in Europe, Asia and US).
  2. Ability to shape your own workday and career via a clearly defined professional and personal development plan.
  3. Opportunity to work with senior leadership, develop yourself and build your career within an inspiring and fast-growing company and digital sports environment.
  4. Vibrant and inclusive community, including Women in Tech and Pride groups which welcome all participants.
  5. Hybrid work model.

OUR RECRUITMENT PROCESS:

  1. Initial Screening: A quick chat with our Talent Acquisition Partner to understand your background and expectations.
  2. Two technical Interviews: Meet with the Technical team and Hiring Manager to dive into your solution and your expertise, as also discuss team fit.
  3. Final Steps: Receive feedback and, if successful, an offer!

We keep it simple and aim to wrap up the process within 3 weeks.

Qualifications

Additional Information

At Sportradar, we celebrate our diverse group of hardworking employees. Sportradar is committed to ensuring equal access to its programs, facilities, and employment opportunities. All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. We encourage you to apply even if you only meet most of the requirements (but not 100% of the listed criteria) - we believe skills evolve over time. If you're willing to learn and grow with us, we invite you to join our team!

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.