Perform advanced threat hunting and root cause analysis across cloud workloads, Kubernetes clusters, APIs, and user activity. Integrate external threat intelligence feeds, aligning TTPs with the MITREATT&CK framework. Drive continuous improvement by conducting regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including … services, ideally under PCI-DSS, ISO 27001, or SOC 2. Strong Scripting or automation experience (Python, Terraform, Bash). Knowledge of threat modelling and attack frameworks (MITREATT&CK, Kill Chain). Familiarity with Kubernetes (GKE), container security, API hardening. Nice to Have Certifications such as: Google Professional Cloud Security Engineer CISSP, CISM, GCIH, or … GCIA Experience implementing Zero Trust Architecture in a cloud-native environment. Familiarity with OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. More ❯
Perform advanced threat hunting and root cause analysis across cloud workloads, Kubernetes clusters, APIs, and user activity. Integrate external threat intelligence feeds, aligning TTPs with the MITREATT&CK framework. Drive continuous improvement by conducting regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including … services, ideally under PCI-DSS, ISO 27001, or SOC 2. Strong Scripting or automation experience (Python, Terraform, Bash). Knowledge of threat modelling and attack frameworks (MITREATT&CK, Kill Chain). Familiarity with Kubernetes (GKE), container security, API hardening. Nice to Have Certifications such as: Google Professional Cloud Security Engineer CISSP, CISM, GCIH, or … GCIA Experience implementing Zero Trust Architecture in a cloud-native environment. Familiarity with OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. More ❯
. Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ). Skilled in incident response and threat intelligence analysis . Familiarity with MitreAtt&ck framework and advanced threat detection techniques. Excellent analytical and problem-solving capabilities. Able to provide mentorship and leadership within a SOC team. Desirable (Nice-to-Have … SIEM platforms ( Microsoft Sentinel , Splunk ). Leading incident response and driving improvements in detection and containment strategies. Tuning and maintaining detection rules, using threat frameworks like MitreAtt&ck . Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre . Staying abreast of cyber threat developments and contributing to More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with MitreAtt&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide mentorship and leadership within a SOC team Desirable (Nice-to-Have … advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like MitreAtt&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyber threat developments and contributing to best practices More ❯
line management to SOC Analysts Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage Analyzing and optimizing detection rules and use cases based on MITREATT&CK Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies Acting as a representative of the SOC in key meetings and internal stakeholder engagements … a Security Operations Centre (SOC) environment Qualified at SOC Level 2 Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MITREATT&CK Framework for detection and threat analysis Experience of static malware analysis and reverse engineering (desirable) Scripting or programming with Python, Perl, Bash, PowerShell or C++ (desirable More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
and recommended mitigation strategies. What you will bring : Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations. Knowledge and experience with MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
documentation, including reports, analysis, and mitigation strategies. Qualifications and experience: Experience working in a Security Operations Centre. Managing Microsoft Sentinel and Splunk implementations. Knowledge of the MitreAtt&ck Framework. Understanding of client-server applications, web applications, databases, firewalls, VPNs, and AntiVirus products. Expertise in log data analysis and intrusion detection systems. Strong networking knowledge More ❯
in handling critical and high severity incidents from initial detection to resolution, including the general navigation/engineering and creation of rulesets & dashboards aligned to the MITREATT&CK framework. Preferred vendors: Microsoft Sentinel, Google Chronicle (SecOps), Elastic. Excellent Knowledge of EDR/XDR – including incident investigation at a priority 1 and 2 severity and … general day-to-day usage alongside best-practice configurations for common toolsets. Preferred vendors: CrowdStrike, Microsoft, Palo Alto, SentinelOne. Good Knowledge of incident response, aligned to MITREATT&CK with a good knowledge of common tactics, tools and techniques attackers utilise in the wild. Good Knowledge of VM – including analysis, classification and prioritisation to create More ❯