and effective detection capabilities. Key Responsibilities Design, develop and deploy detection logic across SIEM, EDR and cloud security platforms. Build detections aligned with frameworks such as MITREATT&CK and continuously tune for accuracy and performance. Conduct threat modelling and participate in purple team exercises to assess and improve detection effectiveness. Use Detection-as-Code … content (e.g. SIEM rules, correlation searches and detection-as-code signatures) to proactively identify malicious behaviour and improve threat visibility and reduce false positives Familiarity with MITREATT&CK framework and threat detection lifecycle. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
trenches and know what it takes to stay ahead of threat actors. Ideally, you bring: Hands-on experience with SIEM platforms , especially Splunk. Strong familiarity with MITREATT&CK , intrusion detection/prevention systems, and malware behaviour. Confidence in network traffic analysis (PCAP, NetFlow) and endpoint forensics. The ability to explain technical risk in plain More ❯
automation in CI/CD pipelines. Familiarity with cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes). Knowledge of OWASP Top 10, CWE, CVSS, MITREATT&CK and NIST frameworks. Experience conducting threat modelling, code reviews and penetration testing. Excellent communication skills with the ability to influence and educate development teams. Security certifications More ❯
Cloud, GCP Security Command Center) Detection engineering using KQL, particularly with Microsoft Sentinel Familiarity with Kubernetes, Docker, and securing containerised services Understanding of Zero Trust Architecture, MITREATT&CK, and cloud threat models Experience with SOAR platforms and automation pipelines Scripting or programming skills (Python, PowerShell, Bash, etc.) Interviews are moving fast — apply now or More ❯
Defender, Carbon Black, CrowdStrike, or FireEye Confident with KQL, especially in Microsoft Sentinel Strong background in GCP Experience securing Kubernetes, Docker, and containerised workloads Familiar with MITREATT&CK, SOAR, and writing detections as code Comfortable scripting in Python, PowerShell, or Bash Start Date: ASAP Interviews are progressing quickly — get in touch to find out More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Lawrence Harvey
custom query writing and dashboard development. Deep understanding of incident response, including network traffic analysis, PCAP investigation, and forensic techniques. Familiarity with attack frameworks such as MITREATT&CK, and ability to recognise TTPs in real-world data. Demonstrated experience analysing logs and alerts across varied data sources (network, endpoint, IDS/IPS). If More ❯
investigation to collaborating with the Head of SOC to contain and resolve threats. Ideally you will have experience with Splunk, threat detection and have worked with MITREATT&CK, preferably within a Financial Services firm. This role offers the chance to work in a fast-paced, global environment with opportunities to grow your technical and More ❯
Microsoft Security solutions such as: Microsoft Sentinel (SIEM) Defender for Endpoint, Office 365, or Identity Solid understanding of incident response processes and best practices. Familiarity with MITREATT&CK framework and common attacker techniques. Strong communication and leadership skills, with the ability to influence and guide both technical and non-technical stakeholders. Desirable: Experience with More ❯
and potential capabilities. Ability to break down and translate information into tangible actionable data. Secure & Test-Driven Engineering Understanding of cyber security threat frameworks such as MITREATT&CK, Lockheed Martin Killchain etc. Ability to specify/implement processes to maintain required level of security for a component/product/system during its lifecycle. More ❯
technologies and processes including: •Proficiency in GCP - essential •Strong knowledge of security architecture principles, frameworks, and best practices •Experience working with threat modeling methodologies such as MITREATT&CK, STRIDE, PASTA etc. •Overall experience in Cybersecurity: 5+ years •Security practices encompassing authentication, authorization, logging/monitoring, encryption, infrastructure security, and network/segmentation •Knowledge of More ❯
with experience across: CTI - Develop CTI tactical, operational and strategic intelligence framework and processes Threat hunting - Develop and lead structured threat hunting campaigns-based threat intelligence, MITREATT&CK, and risk models Pen Testing - Support internal testing of hypotheses and validation of remediation from pen tests You will be experienced and hands-on with a More ❯
Employment Type: Contract
Rate: £650.0 - £700.0 per day + £650 - £700 per day inside IR35