is just as well regarded. Strong working knowledge of SIEM, SOAR, EDR tooling is essential, as is an understanding of the MITREATT&CK framework. Experience in CNI/Defence sectors is also desirable.This is a fantastic opportunity for an experience, hands on professional, looking more »
level knowledge of information security principles and standardsExperience using frameworks such as the Lockheed Martin Cyber Kill Chain, Diamond Model, and MITREATT&CK to model & analyze threat activityFamiliarity with common approaches to automating processes to reduce manual effort and optimize workflowsSecurity certifications such as more »
a SOC environment.Experience in writing detection rules in particular using SPL or KQL.Strong understanding of security technologies and frameworks such as MITREATT&CK.Experience of agile methodologies and associated toolsets and code repositoriesCoding experience using languages such as Python particularly in relation to security use cases, Splunk more »
Corsham, England, United Kingdom Hybrid / WFH Options
Lawrence Harvey
security event monitoring and incident management services Ideally experience with ELK (Elastic, Logstash, Kibana) and Tanium Previous experience of utilising the MITREATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services Collaborate with SOC Engineers to maintain up to date dashboards more »
and Firewalls for IT/OT environments. Additional certifications such as GICSP, CISSP, or related to ISA/IEC 62443 and MITREATT&CK frameworks would be beneficial, but these aren't essential for you to apply. What else do I need to know? Alongside more »
by attackers, ranging from criminal to state affiliated groups and securing an IT system against common attacker techniques aligned to the MITREATT&CK framework; Developing cyber incident response plan, playbooks and processes that allow security operations team to rapidly and effectively respond to incidents more »
and managing major/complex cyber security incidents end-to-end Knowledge of adversarial tactics, techniques, procedures (TTPs) & industry standard frameworks (MitreAtt&ck, ISO27000, ISO27001) Strong working knowledge of security technologies including but not limited to SIEM, EDR/EPP, AV, IDS, IPS, AD more »
SIEM (Security Information and Event Management) technologies Experience in networking, routing, and switching Use of frameworks such as NIST, ISO 27001,MITREATT&CK and CIS. Familiarity with cybersecurity laws and regulations, e.g GDPR, CCPA, or HIPAA Please note: Any successful candidate MUST be pre more »
clear and practical solutions. Experience working with and maintaining a security controls coverage and maturity framework (such as NIST CSF, ISO27001, CSA-CCF, MITRE) and enterprise policies and standards. Professional qualifications in security and relevant technologies and practices, with a passion for continual improvement Experience of people management more »
with enterprise networks including next generation firwalls, network segmentation technology (Forescout preferred) and internet connectivity. Experience with EDR, M365 security, SIEM, Vulnerability management, MITREattack framework and Incident response. Experience of providing knowledge transfer to Service Delivery teams and developing other cybersecurity team members. Having an in-depth more »
SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerability management, MITREattack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous experience working with more »
creation, their deployment and tuning. • Experience as a mentor/coach to junior analysts Your profile • Previous experience of utilising the MITREATT&CK and Cyber Kill Chain frameworks • Skilled in maintaining Microsoft directory services. • Skilled in using virtualisation software. • Knowledge of key security frameworks more »
adversary tactics The role requires an intermediate knowledge and experience of Linux; Windows; Azure; AWS; Elastic Stack; Tennable; Threat Intel gathering; MitreAtt&ck Framework; Office 365 security centre; Endpoint manager as well as Carbon black Desirable Skills: Previous experience in energy sector more »
Fratton, England, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
SIEM/Incident SME (Active DV Clearance) ELK (Elastic, Logstash, Kibana) Tanium MITREATT&CK Cyber Kill Chain Location: Hybrid onsite in one of the following locations 2/3 days per week - Corsham, Portsmouth or Northallerton Duration: 6 months We are Global IT Recruitment more »
to security problems- A working knowledge of security control frameworks, such as NCSC, ISO 27001, NIST, CIS, PCI-DSS.- Familiarity with MITREATT&CK and D3FEND.- Proficiency in Linux, Windows, and MacOS operating systems.- Expertise in cyber security detection and prevention controls.- Experience with JavaScript more »
SSO/MFA, PAM, etc), as well as the ability to learn new ways of thinking and technologies (e.g., Zero Trust, MitreATT&CK). Expert understanding of IAM concepts, including federation, authentication, authorization, access controls, access control attacks, identity, and access provisioning life cycle. more »
response tooling, automating and fine-tuning wherever possible. Utilize and ingest relevant threat intel feeds mapped out against their estate and MITREATT&CK framework Perform hands-on security threat modelling, risk assessment and vulnerability remediation Work closely with Development teams to ensure secure software more »
ð¼ Senior Security Operations Managerð Telco/Fibre-Opticð London (Hybrid)ðµ 80k-100kð EDR, SIEM, UEBA, SOAR Integration, MITREATT&CK, TCP/IP, OSI Model, Linux/WindowsAre you looking for an exciting new MSP management opportunity, whilst also working with cutting edge more »
data ingest and telemetry requirements. Experience with SIEM platforms such as Splunk, Azure Sentinel, Qradar, Exabeam, etc. Python scripting MITRE Caldera and ATT&CK Atomic Red Team SOAR automation and enrichment Strong work ethic and postive can do attitude Bias for action and execution of more »
administer Cloud applications and the underlying services for Cloud. Experience with industry standard Cloud security frameworks (such as NIST, CSA and MITREATT&CK) and Cloud controls integration into DevSecOps toolchain Knowledge and experience of building Cloud security patterns aligned to industry best practice frameworks more »
IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics. Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks (MitreATT&CK). Experience working within a regulated environment, preferably Energy sector Critical National Infrastructure (CNI more »
London, England, United Kingdom Hybrid / WFH Options
Control Risks
an ability to make judgments on the value of research collected. Be technically aware and understand basic cyber security principals e.g. MITREATT&CK, the unified kill chain, the intelligence life cycle Be alert to the political implications of developments among cyber threat groups and more »
adversary tactics The role requires an intermediate knowledge and experience of Linux; Windows; Azure; AWS; Elastic Stack; Tennable; Threat Intel gathering; MitreAtt&ck Framework; Office 365 security centre; Endpoint manager as well as Carbon black Desirable Skills: Previous experience in energy sector more »
Corsham, England, United Kingdom Hybrid / WFH Options
J&C Associates Ltd
creation, their deployment and tuning. • Experience as a mentor/coach to junior analysts Your profile • Previous experience of utilising the MITREATT&CK and Cyber Kill Chain frameworks • Skilled in maintaining Microsoft directory services. • Skilled in using virtualisation software. • Knowledge of key security frameworks more »
by adversaries, especially those related to the financial sector. - knowledge of threat modeling frameworks, such as cyber kill chains or the MITREATT&CK™ framework and expertise in mapping procedural intelligence of threats to TTPs. - experience conducting investigations and analysis of phishing and malware campaigns. more »