iBSC

4 job(s) at iBSC

iBSC
Mar 25, 2026
Contractor
Technical Lead/Solution Architect Will develop strategies to implement Qualtrics platforms and specific product features - both technically and strategically to maximize the value of the investment. They develop the plan for software system blueprints, integrations, or platforms that meet business goals, ensuring the solution is feasible, scalable, secure, and cost-effective. Focuses on problem-solving and data strategy, using technical expertise to activate and enhance client programs and drive measurable business outcomes. Supports delivery teams to ensure deliverables align with client expectations and goals, and provides comprehensive knowledge transfer and training to client teams for long-term program ownership. Directs the end-to-end setup and migration of client programs, ensuring projects meet established scopes, timelines, and quality standards using methodologies like Agile or Kanban. Technical Skills: Proficiency in Qualtrics CoreXM, CustomerXM, EmployeeXM, or BrandXM modules preferred Experience with APIs, JavaScript, HTML, CSS, and possibly SQL or Python Setup automated workflows within Qualtrics to trigger aligned actions across the tech stack Familiarity with data integrations (AEP, Salesforce), automation (event triggers), and analytics tools (like Tableau or Power BI)
iBSC
Mar 24, 2026
Full time
Palo Alto XSoar Developer Role Candidates in this role are responsible for the development and maintenance of the code and capabilities of the Security Orchestration, Automation and Response (SOAR) platform. Candidates will work with the Manager of Detection & Response Engineering and will work jointly with our detection engineering, threat detection and response teams to specify clear priorities, evaluate technical tradeoffs, and build high-impact features within the SOAR platform. The candidates' main responsibilities will be to: Focus on the development, maintenance, and delivery of new Security Orchestration and Automation content including custom SOAR Playbooks, Automations/Scripts, Jobs, dashboards, reports, widgets, RESTful API integrations, and code via Continuous Integration/Continuous Delivery pipelines adhering to an Agile development practice Reduce Incident Response efforts and increase quality leveraging XSOAR for Security Orchestration, Automation and Response (SOAR) Automate manual SOC procedures and develop, implement, and maintain playbooks Detail SOAR workflows, scripts, and develop, test and debug code and use established code repository for tracking. Use python/other Scripting languages to perform the customizations to develop the required automation. Work with the existing playbook framework and ensure the amendments are hooked accurately to the existing framework. Prioritize and coordinate backlog of SOAR integration and automation requests, making sure we have a healthy balance between defect resolution and new features. Work in partnership with the incident response team to craft find opportunities for improvement Qualifications Technical Skills 3+ year prior experience in a similar position Sophisticated knowledge of the Palo Alto Cortex XSOAR platform Ability to create documentation for Palo Alto Networks Cortex XSOAR playbooks Proficient in Python, JavaScript, and PowerShell are an asset Good understanding of REST/SOAP/WSDL/XML (Web services) Understanding of cybersecurity incident response procedures, experience as a Security Incident Responder or SOC analyst is a plus Strong understanding of cybersecurity technologies, protocols, and applications Soft Skills Strong analytical skills to evaluate complex multivariate problems and find a systematic approach to gain a quick resolution, often under stress! Strong problem solving, documentation, process execution, time management and interpersonal skills. Ability to communicate sophisticated information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. Passion and drive to work in start-up division with potential of significant growth in scope and services
iBSC
Mar 23, 2026
Contractor
Dotdigital Technical Admin/Integration Specialist Location: UK or EU-based Work pattern: Remote with occasional travel to London or Paris (2-3 days per month, expenses covered) Duration: 6 - 12 Months Rolling Contract Candidates MUST hold a British or EU Passport (due to travel) We are looking for a hands-on Dotdigital Technical Admin/Integration Specialist to support a major customer experience platform project. This is a technical, integration-focused role . It will suit someone with strong experience in Dotdigital administration, connectors, data flows, and platform integrations rather than campaign/content creation. This is a great opportunity for a technical Dotdigital specialist looking for a long-term project in a complex integration environment. Must-have skills Strong experience with Dotdigital administration and connectors Proven experience integrating Dotdigital with Salesforce Sales Cloud Strong understanding of data mapping , sync processes, and data quality Good knowledge of REST APIs, JSON, and Webhooks Experience troubleshooting and resolving integration/data flow issues Strong technical Scripting skills in Liquid, HTML/CSS, and JavaScript Experience with testing and validating integration changes Able to work independently and communicate with both technical and business teams Nice to have Experience with Magento/Adobe Commerce Experience with Power Automate or other Middleware tools C#/.NET knowledge
iBSC
Oct 01, 2025
Contractor
Job Title: Cyber Security Incident Response Specialist Location: London, Wokingham, or Warwick (2 days per week onsite - hybrid working) Contract Duration: 6months + initially, with high potential for extension (long-term programme) Clearance: SC required or eligible THIS PROJECT IS INSIDE IR35 Project Overview: We are looking for an experienced Cyber Security Incident Response Specialist to join a high-impact security programme supporting the resilience of UK critical national infrastructure (CNI) . You'll join a team responsible for responding to cyber threats across both cyber and physical domains - helping to manage the full incident life cycle, improve response maturity, and develop scalable IR documentation and exercises. This is a specialist role for someone with real-world IR experience and the ability to assess, escalate, and coordinate technical and business responses. Key Responsibilities: Lead or support incident response (IR) activities across the full life cycle: detection, triage, containment, eradication, recovery, and lessons learned Develop and maintain IR playbooks, plans, and post-incident reports Support post-incident reviews , including root cause analysis (RCA) and lessons learned sessions Design and deliver incident response exercises (eg tabletop simulations) Act as a subject matter expert (SME) for incident response processes and frameworks Collaborate with SOC teams, technical SMEs, and non-technical stakeholders Communicate IR outcomes effectively via reports, presentations, and briefings Build working relationships across internal security functions and external CNI/regulatory stakeholders Mandatory Requirements (Must-Have): Strong, recent experience in cybersecurity incident response Ability to make informed decisions during incidents (triage, escalate, communicate) Experience working in Critical National Infrastructure (CNI) sectors - eg utilities, energy, telco, banking, health, defence, or transport Working knowledge of NIST, MITRE ATT&CK , or equivalent frameworks Proven ability to communicate IR findings to technical and non-technical audiences Experience contributing to or owning IR playbooks, SOPs, or RCA documentation Must hold current SC clearance or have been previously cleared within the last 12-18 months Desirable Skills (Nice-to-Have): Experience within the energy or utilities sector Exposure to OT/ICS environments (eg SCADA, PLCs, DCS) Experience delivering or supporting tabletop IR exercises Familiarity with tools like Microsoft Sentinel, Defender, Splunk, QRadar, Tenable, CrowdStrike, etc. Industry certifications such as CISSP, GCFA, GEIR, CCIM, CISM, CEH , or equivalent What We're Not Looking For: Junior SOC analysts (L1/L2 triage only) Generalist cyber roles without deep IR exposure Candidates without experience in CNI or enterprise-scale IR