Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITREATT&CK, and risk models to form hypotheses and validate them through structured hunts. Leverage Jupyter Notebooks and other tools to automate hunts, visualise results, and create reusable … have 3-5+ years of hands-on experience in Threat Hunting, Red Team, Blue Team, or Incident Response roles, with a deep understanding of the MITREATT&CK framework and a proven ability to detect and investigate advanced threats beyond signature-based solutions. Adept at leveraging Splunk for data analysis and detection development, they … you Minimum Requirements Minimum 3-5 + years of experience within a Threat Hunter, Red Team, Incident Response, or Blue Team role. Solid understanding of the MITREATT&CK framework, TTP analysis, and adversary emulation. Deep familiarity with hypothesis-driven threat hunting frameworks and methodologies. Ability to work autonomously while collaborating across security, engineering, and More ❯
using the ITIL framework. Ability to keep up to date with technology trends and to understand key technical drivers in the industry. Strong understanding of the MITREATT&CK and NIST Cybersecurity frameworks. Additional Information Your impact on Radius will be rewarded with the opportunity to develop and progress your career in many directions. You More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
their purpose in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape, advanced adversary tactics, and the MITREAttack Framework. Strong understanding of low-level concepts including operating systems, Active Directory, Windows and Linux server environments, alongside computer networking. Knowledge of cloud environments and SaaS applications such More ❯
gather and report threat intelligence, update detection rules and response playbooks, and collaborate across teams to improve security. You ll also track threat actor tactics using MITREATT&CK and assist with incident response and reviews. Key skills required: • 3+ years of experience in Security Operations, Threat Intelligence, or Incident Response roles • Proficient in analyzing More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Queen Square Recruitment
Strong understanding of log management (onboarding, parsing, retention strategies) Demonstrated ability to build and manage detection use cases aligned with evolving threats Familiarity with the MITREATT&CK framework and threat modeling Solid understanding of Windows, Linux, networking, and endpoint security Skilled in threat intelligence, digital forensics, and advanced incident handling Experience with SOAR platforms More ❯
Alexander Mann Solutions - Public Sector Resourcing
etc.) . Familiarity with cloud migration strategies and hybrid logging environments . Strong documentation skills and attention to detail . Experience with security frameworks such as MITREATT&CK, NIST, and CAF . Ability to troubleshoot complex ingestion or parsing issues and resolve at speed Essential Skills . Proven experience onboarding and managing log sources More ❯
with Microsoft Sentinel, including KQL, custom analytic rules, and automation. Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365. Strong knowledge of the MITREATT&CK framework, threat intelligence, and adversary TTPs. Solid understanding of Windows, Linux, and core network security principles. Skilled in incident response, digital forensics, and proactive threat hunting. More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks (NIST, NCSC, CIS, MITREATT&CK) Hands-on experience with security tools: SIEM, IDS/IPS, firewalls, endpoint protection Expertise in Azure security and securing cloud platforms A solid understanding of vulnerabilities More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Techwaka
penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks (NIST, NCSC, CIS, MITREATT&CK) Hands-on experience with security tools: SIEM, IDS/IPS, firewalls, endpoint protection Expertise in Azure security and securing cloud platforms A solid understanding of vulnerabilities More ❯
Bolton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Microsoft Sentinel (KQL, custom rules, automation, dashboards) Strong hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365 Proficient in handling incidents aligned with MITREATT&CK framework Solid understanding of Windows and Linux systems, networking, and endpoint security Skilled in digital forensics, threat intelligence, and advanced incident handling Familiarity with SOAR platforms More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Microsoft Sentinel (KQL, custom rules, automation, dashboards) Strong hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365 Proficient in handling incidents aligned with MITREATT&CK framework Solid understanding of Windows and Linux systems, networking, and endpoint security Skilled in digital forensics, threat intelligence, and advanced incident handling Familiarity with SOAR platforms More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Strong understanding of log management (onboarding, parsing, retention strategies) Demonstrated ability to build and manage detection use cases aligned with evolving threats Familiarity with the MITREATT&CK framework and threat modeling Solid understanding of Windows, Linux, networking, and endpoint security Skilled in threat intelligence, digital forensics, and advanced incident handling Experience with SOAR platforms More ❯
capability. A keen interest in current cybersecurity developments, with awareness of emerging threats, attacker techniques, and known vulnerabilities. Working knowledge of industry recognized frameworks such as MITREATT&CK, and an understanding of key compliance requirements including ISO 27001 and Cyber Essentials Plus. Hands-on experience with Microsoft security technologies, particularly within Azure ecosystems, and More ❯
In-depth understanding of the cyber threat landscape and adversary tactics. Intermediate knowledge and experience of Linux, Windows, Azure, AWS, Elastic Stack, Tennable, Threat Intel gathering, MitreAtt&ck Framework, and Office 365 security centre. About the DCC: At the DCC, we believe in making Britain more connected, so we can all lead smarter, greener More ❯
and experiences: Essential: Experience of working within Security Operations or equivalent roles Demonstrable leadership in Operational Management Experience in the application of relevant industry standard frameworks (MITREATT&CK/D3FEND/ENGAGE etc.) in an operational environment A good level of knowledge and proficiency in the use of SIEM platforms, tools and analytical techniques. More ❯
personas. Significant experience of the SecOps arena and related disciplines, such as CTI & DFIR. Fully versed in relevant frameworks and standards, inc. but not limited to MitreATT&CK, CIS, NIST Be able to influence important business decisions, both in a client and local organisational environment. Demonstrate a coherent approach to the identification, validation and More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
Security within the organisation. Working very closely and building strong relationships with our Service Providers. Run advanced and predictive analyses and perform assessments based on the MitreATT&CK framework. Correlation monitoring using multiple SIEM technologies to ensure that the SOC achieves its objective of being a threat-led organisation. Work independently and provide guidance … In-depth understanding of the cyber threat landscape and advanced adversary tactics. Expert knowledge and experience of Linux, Windows, Azure, AWS, Elastic Search, Vulnerability management, and MitreATT&CK. Excellent experience with NW configuration, Routing, Transit Gateways, Private endpoints, and log collection specifically Cloud watch, Cloudtrail, and S3 buckets. About the DCC: At the DCC, we believe More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
working with just 1 day/week in the office Projects that span both UK and US markets Exposure to best-in-class tools and frameworks (MITREATT&CK, OWASP) Supportive culture with a learning mindset and room to grow Involvement in the full security lifecycle from audits to implementation Opportunity to shape how cloud More ❯
Active Directory and Windows Server Hands-on experience with SOC tools including SIEM, IDS, antivirus, vulnerability management platforms, and Microsoft Azure security solutions Familiarity with the MITREATT&CK framework Experience working in an ITIL-based service management environment How you’ll be rewarded: 26 days Annual Leave + Bank Holidays + Wellness days Private More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Maxwell Bond
Solid experience working with Microsoft Sentinel in a live SOC environment Strong knowledge and hands-on ability with KQL (Kusto Query Language) Understanding of attack techniques (MITREATT&CK, etc.) and incident response workflows Comfortable working across different client environments and adapting to varied threat landscapes Previous experience in an MSSP or managed services environment More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Maxwell Bond
Solid experience working with Microsoft Sentinel in a live SOC environment Strong knowledge and hands-on ability with KQL (Kusto Query Language) Understanding of attack techniques (MITREATT&CK, etc.) and incident response workflows Comfortable working across different client environments and adapting to varied threat landscapes Previous experience in an MSSP or managed services environment More ❯
Security Hub, CloudTrail, KMS), or ability to rapidly apply equivalent experience from other platforms in an AWS context • Familiarity with adversary behaviours and detection frameworks (e.g. MITREATT&CK, SIGMA) • Experience supporting enterprise customers across regulated or high-trust environments such as finance, energy, or government • Prior experience designing or contributing to security automation mechanisms More ❯
of offensive security specialists. Key Responsibilities Lead and execute complex penetration tests and adversary simulations Deliver red team engagements aligned with frameworks like TIBER, CBEST, and MITREATT&CK Develop custom tooling and exploits where required Create detailed, client-facing technical and executive reports Mentor junior testers and contribute to internal R&D Stay sharp … experience in penetration testing and red teaming (internal, external, app, cloud, etc.) Strong understanding of attacker TTPs and detection evasion Familiarity with frameworks such as OWASP , MITREATT&CK , and NIST Experience with C2 frameworks (e.g., Cobalt Strike, PoshC2, Sliver) Certifications such as OSCP, CRTO, OSEP, or CREST CRT preferred (but not required) Please note More ❯