MITRE ATT&CK Jobs in London

12 of 12 MITRE ATT&CK Jobs in London

Offensive Security Senior Manager

Kingston Upon Thames, Surrey, United Kingdom
Hybrid / WFH Options
Unilever
red team automation Detection Engineering Collaboration : Ability to translate offensive findings into detection logic and partner with SOC teams to improve alerting and response. Threat Modelling & MITRE ATT&CK : Strong understanding of attacker TTPs and ability to map findings to frameworks like MITRE ATT&CK and the Cyber Kill Chain. … red/purple teaming, adversary emulation, and vulnerability exploitation. - Proficiency with tools such as Cobalt Strike, Metasploit, Burp Suite, BloodHound, and custom scripting. - Strong understanding of MITRE ATT&CK, cyber kill chain, and threat-informed defense. - Experience integrating offensive security into CI/CD pipelines and cloud-native environments. - Relevant certifications (e.g., OSCP, OSCE, CRTO More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Threat Intelligence Analyst

City, London, United Kingdom
Deerfoot Recruitment Solutions Limited
simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITRE ATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack surface assessments, and adversary emulation plans Present high-quality threat briefings, risk assessments … Intelligence Platforms), SIEM tools, and threat data enrichment solutions Practical exposure to Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITRE ATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports More ❯
Employment Type: Contract
Rate: GBP Annual
Posted:

Threat Intelligence Analyst

London, South East, England, United Kingdom
Deerfoot Recruitment Solutions Ltd
simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITRE ATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack surface assessments, and adversary emulation plans Present high-quality threat briefings, risk assessments … Intelligence Platforms), SIEM tools, and threat data enrichment solutions Practical exposure to Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITRE ATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports More ❯
Employment Type: Contractor
Rate: Competitive salary
Posted:

SOC Solutions Engineer

City of London, London, United Kingdom
Hybrid / WFH Options
Anson Mccade
tools (e.g., Logic Apps, XSOAR). Threat Detection & Response: Investigate alerts, enrich detection logic with threat intel, coordinate incident response. Threat Modelling & Use Case Development: Apply MITRE ATT&CK, STRIDE, and Kill Chain frameworks to build detection use cases. Reporting & Collaboration: Build security dashboards, produce reporting packs, and guide junior analysts and engineers. Client & Project … preferred). Strong knowledge of log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with the ability to mentor More ❯
Employment Type: Permanent, Work From Home
Posted:

Insider Threat Investigations Lead - VP

London, United Kingdom
Hybrid / WFH Options
Barclay Simpson
with insider threat detection tools (UEBA, DLP, SIEM) and knowledge of advanced threat intelligence techniques. Understanding of threat actor tactics, techniques, and procedures (TTPs) and the MITRE ATT&CK Framework. Familiarity with security frameworks, incident response, and risk management practices. Knowledge of legal and regulatory considerations, including privacy and data protection laws. Excellent interpersonal, relationship More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Incident Response Consultant - MOD DV

London, United Kingdom
Forward Role
briefings during and after incidents. Forensics & Threat Hunting: Conduct advanced forensic investigations across endpoints, servers, networks, cloud platforms, and SaaS. Adversary Analysis: Use threat intelligence and MITRE ATT&CK to attribute attacks and inform proactive defences. Crisis Management: Lead coordination between internal stakeholders, third parties, and law enforcement. Cybersecurity Advisory: Help clients improve incident readiness More ❯
Employment Type: Permanent
Posted:

Senior Security Operations Analyst SOC

London, South East, England, United Kingdom
Hybrid / WFH Options
Client Server Ltd
experience in Security Operations and Incident Response You have experience of performing analysis with SIEM technologies, Splunk preferred You have experience with proactive threat hunting using MITRE ATT&CK or similar frameworks You have a deep understanding of security appliances/tools such as host-based and network-based IDS/IPS, WAF, EDR You More ❯
Employment Type: Full-Time
Salary: £90,000 - £100,000 per annum
Posted:

Vulnerability Lead - Engine by Starling

London, United Kingdom
Hybrid / WFH Options
Starling Bank Limited
lifecycle including associated tools and platforms Ability to work effectively with patching teams and co-ordinate remediation activities Understanding of CVSS scoring, OWASP Top 10 and MITRE ATT&CK Organised and able to track and report on remediation activities across multiple teams Can translate scan data into clear, risk-based reports for management teams Partner More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of Security Operations SOC

City of London, London, United Kingdom
Hybrid / WFH Options
Client Server
have an indepth knowledge of core security operations practices: SIEM, threat hunting, vulnerability management, incident response You have a good understanding of common threat actor tactics (MITRE ATT&CK), modern malware, and intrusion techniques You have experience of supporting complex security transformations across global businesses You're collaborative and pragmatic, without ego What's in More ❯
Employment Type: Permanent, Work From Home
Posted:

Head of Security Operations SOC

London, UK
Hybrid / WFH Options
client server
an in-depth knowledge of core security operations practices: SIEM, threat hunting, vulnerability management, incident response * You have a good understanding of common threat actor tactics (MITRE ATT&CK), modern malware, and intrusion techniques * You have experience of supporting complex security transformations across global businesses * You're collaborative and pragmatic, without ego *Benefits:* As a More ❯
Employment Type: Full-time
Posted:

Pentester

London, United Kingdom
Hybrid / WFH Options
Queen Square Recruitment Limited
knowledge (OWASP Top 10, API security). Proven end-to-end pentest experience: internal, external, cloud, AD, web apps, APIs. Familiarity with pentest reporting formats (CVSS, MITRE ATT&CK mapping). Comfortable in NDA-restricted, compliance-driven, sensitive environments. Excellent reporting skills for both technical and executive audiences. Scripting for automation/exploit development: Python More ❯
Employment Type: Contract
Posted:

Senior Threat Detection Specialist

London, South East, England, United Kingdom
Hybrid / WFH Options
QBE Management Services (UK) Limited
response. About you Strong experience across both offensive and defensive cyber security disciplines. Deep understanding of attacker tactics, techniques, and procedures (TTPs), with expertise in the MITRE ATT&CK Framework. Hands-on technical knowledge in cyber detection engineering, security tools, and infrastructure. Skilled in Detection-as-Code and experienced with SIEM query languages. Confident communicator More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:
MITRE ATT&CK
London
10th Percentile
£46,700
25th Percentile
£52,813
Median
£85,000
75th Percentile
£95,000
90th Percentile
£103,500