Senior Incident Response Specialist
This job is brought to you by Jobs/Redefined, the UK's leading over-50s age inclusive jobs board.
Company Description
We're the world's leading sports technology company, at the intersection between sports, media, and betting. More than 1,700 sports federations, media outlets, betting operators, and consumer platforms across 120 countries rely on our know-how and technology to boost their business.
Job Description
LOCATION: Work onsite in London
WORK TYPE: Hybrid remote and onsite (3 days office, 2 days remote)
Job Description:
The Senior Incident Response Specialist will serve as a senior member of the Security Operations Center within the Information Security team, leading incident response and proactive threat hunts. This position requires a hands-on, expert-level professional responsible for proactively detecting, investigating, and responding to complex threats against the organization's environment, particularly with applications and cloud infrastructure.
The Senior Incident Response Specialist will work closely with a diverse range of stakeholders to ensure any threats are quickly and effectively contained and any incident is brought to a rapid resolution. They will be responsible for managing incidents in strict alignment with relevant frameworks, such as NIST or ISO, and any applicable regulatory requirements, maintain adherence to organizational standards and compliance mandates. This role is critical in protecting the organization's assets and improving its overall threat detection and response capabilities.
THE CHALLENGE:
- Act as the primary point of contact for incident response within the SOC, taking ownership of incidents from detection through to remediation.
- Collaborate with threat intelligence teams to incorporate emerging threat data and integrate relevant indicators of compromise into hunting and detection practices.
- Perform forensic analysis on systems, applications, and cloud environments to trace the origin, scope, and impact of incidents.
- Develop and refine detection rules, incident response playbooks, and investigation workflows to strengthen SOC capabilities and improve incident response effectiveness.
- Ensure comprehensive documentation of threat hunting and incident response activities, providing detailed reporting on investigative findings, lessons learned, and recommended remediation steps.
- Lead proactive threat hunting activities, identifying and investigating potential threats and vulnerabilities within the organization's environment.
- Stay current on new threats, vulnerabilities, and attack techniques, especially those targeting web applications and cloud services, and incorporate this knowledge into SOC processes.
YOUR PROFILE:
- 5+ years of experience in a SOC, with a strong focus on incident response and threat hunting.
- Proven experience investigating and mitigating threats targeting web applications and cloud infrastructure (specifically AWS).
- Deep experience conducting analysis of data from a diverse range of data sources using a SIEM.
- Demonstrated expertise in performing forensic investigations and root cause analyses for complex incidents.
- Experience with SIEM platforms, endpoint detection and response tools, and network traffic analysis.
- Strong understanding of attack frameworks (e.g. MITRE ATT&CK) and the ability to apply them to threat hunting and incident response.
- Experience creating detection rules, playbooks, and workflows to improve SOC detection and response efficiency.
Desired Experience:
- Applying the results of previous incidents and threat hunting activities to creating new detection use cases.
- Hands-on experience with AWS security services, such as GuardDuty, Security Hub, CloudTrail, and IAM configurations.
- Familiarity with securing web applications, including common vulnerabilities (e.g. OWASP Top 10) and mitigation techniques.
- Proficiency in scripting languages like PowerShell and Python.
- Experience working within agile or continuous improvement environments.
Desired Qualifications:
- Strong analytical skills, with the ability to handle high-pressure situations and manage complex security incidents from start to finish.
- Effective communication skills, with the ability to produce clear, concise documentation and interact effectively with both technical and non-technical stakeholders.
- Certifications in relevant fields, such as GCIH, GIAC, GCFA, AWS Certificated Security, CISSP, or equivalent.
OUR OFFER:
- A collaborative environment with colleagues from all over the world (Offices in Europe, Asia and US).
- Involvement in shaping your own workday and career through high degree of freedom to choose technology and your personal development.
- The opportunity to work and develop within an inspiring and fast-growing company.
- The possibility to help shaping the future of Sportradar. All developers are directly contributing to products used by our clients in the global sports business.
- A company culture that promotes kindness, sports, physical exercise and teamplay.
- Innovative and cross-team challenges like Ship-It, office sports tournaments in Darts, Table Tennis and Table Football.
- Competitive salary and benefits (e.g. retirement pension and insurance plan)
- Possibility to work from home office when needed.
- Vibrant Women in Tech community and Sportradar Pride group inside the company inclusive for everyone to participate in
Qualifications
Additional Information
Sportradar is an Equal Opportunity Employer. We are committed to encourage diversity within our teams. All qualified applicants will receive consideration without regard to among other things, your background, status, or personal preferences