Kingston Upon Thames, Surrey, United Kingdom Hybrid / WFH Options
Unilever
red team automation Detection Engineering Collaboration : Ability to translate offensive findings into detection logic and partner with SOC teams to improve alerting and response. Threat Modelling & MITREATT&CK : Strong understanding of attacker TTPs and ability to map findings to frameworks like MITREATT&CK and the Cyber Kill Chain. … red/purple teaming, adversary emulation, and vulnerability exploitation. - Proficiency with tools such as Cobalt Strike, Metasploit, Burp Suite, BloodHound, and custom scripting. - Strong understanding of MITREATT&CK, cyber kill chain, and threat-informed defense. - Experience integrating offensive security into CI/CD pipelines and cloud-native environments. - Relevant certifications (e.g., OSCP, OSCE, CRTO More ❯
positives. Output activities from refinement sessions such as development and/or refinement of rules and workbooks. Optimisation activities such as log utilisation tracking and refinement. MITREATT&CK heat map coverage. Working with internal ITC teams and the Customer to identify any onboarding or offboarding projects of appropriate log sources necessary for effective security … LLD (co-management activity). Skills required: Hands-on MXDR/SIEM experience (e.g., Sentinel, Splunk, QRadar) Strong telemetry parsing/enrichment skills Solid grasp of MITREATT&CK & threat-detection best practices Clear communicator with a customer-focused mindset Passion for continuous improvement in cyber defence Please apply within for further details. Alex Reeder More ❯
vulnerabilities. Ability to coordinate and chair regular meetings and workshops with multiple stakeholders to provide guidance, collaboration and oversight of vulnerability remediation initiatives. Excellent understanding of MITREATT&CK framework, adversary tactics and techniques. Confidence in presenting information and acting as a source of SME knowledge and guidance. Analytical, conceptual thinking, planning and execution skills. … responsibility models. Strong communication skills with the ability to explain complex security issues to non-technical stakeholders. Knowledge of Zero Trust architecture and security frameworks (e.g., MITREATT&CK). Experience in red/blue team exercises. Familiarity with cloud-native security tools and infrastructure-as-code (e.g., Azure Policy, ARM/Bicep, Terraform). More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITREATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Experience designing or More ❯
of use cases, threat intelligence, and vulnerability management. Key Responsibilities Lead the DFIR function, overseeing incident detection, investigation, and response activities. Develop and implement IR methodologies (MITREATT&CK, Kill Chain, Threat Modelling, Diamond Model). Conduct forensic investigations on systems, networks, and endpoints. Refine threat hunting and threat intelligence capabilities. Support and mature security … cyber incident response teams. Deep technical knowledge of IR and forensic analysis (eg Wireshark, packet capture, host-based artifacts). Strong understanding of security monitoring frameworks (MITREATT&CK, NIST, etc.). Experience working in financial services or a regulated environment preferred. Hands-on experience with SIEM tools, network forensics, and endpoint detection. Knowledge of More ❯
integrate with security monitoring frameworks. Develop and oversee vulnerability management programs, ensuring alignment with industry standards. Provide subject matter expertise on cyber security frameworks, including NIST, MITREATT&CK, and Kill Chain methodologies. About You: Proven experience in Cyber Security, with a focus on incident response, security monitoring, and threat intelligence. Strong knowledge of security … tools and network protocol analysis (e.g., Wireshark). Familiarity with cloud security assessments and industry benchmarks such as CIS. Experience with security frameworks such as NIST, MITREATT&CK, and the Cyber Kill Chain. Certifications such as GCIA, GCIH, or GCFA are highly desirable. Package: £70,000 - £75,000 Junior £80,000 - £90,000 Senior More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
integrate with security monitoring frameworks. Develop and oversee vulnerability management programs, ensuring alignment with industry standards. Provide subject matter expertise on cyber security frameworks, including NIST, MITREATT&CK, and Kill Chain methodologies. About You: Proven experience in Cyber Security, with a focus on incident response, security monitoring, and threat intelligence. Strong knowledge of security … tools and network protocol analysis (e.g., Wireshark). Familiarity with cloud security assessments and industry benchmarks such as CIS. Experience with security frameworks such as NIST, MITREATT&CK, and the Cyber Kill Chain. Certifications such as GCIA, GCIH, or GCFA are highly desirable. Package: £70,000 - £75,000 Junior £80,000 - £90,000 Senior More ❯
Key Responsibilities Design, develop and deploy detection logic across SIEM, EDR and cloud security platforms. Build detections aligned with frameworks such as MITREATT&CK and continuously tune for accuracy and performance. Conduct threat modelling and participate in purple team exercises to assess and improve detection effectiveness. Use Detection-as-Code principles to manage detection … content (e.g. SIEM rules, correlation searches and detection-as-code signatures) to proactively identify malicious behaviour and improve threat visibility and reduce false positives Familiarity with MITREATT&CK framework and threat detection lifecycle. More ❯
UK. Desirable: Experience in a Managed Services or Managed Security Services Provider (MSP/MSSP). Certifications such as CompTIA Security+, CySA+, or equivalent. Familiarity with MITREATT&CK, threat hunting, or scripting (e.g., PowerShell, Python). What’s in It for You £40,000 – £55,000 base salary (depending on experience) Hybrid working model More ❯
City of London, London, United Kingdom Hybrid / WFH Options
HD TECH Recruitment
UK. Desirable: Experience in a Managed Services or Managed Security Services Provider (MSP/MSSP). Certifications such as CompTIA Security+, CySA+, or equivalent. Familiarity with MITREATT&CK, threat hunting, or scripting (e.g., PowerShell, Python). What’s in It for You £40,000 – £55,000 base salary (depending on experience) Hybrid working model More ❯
and KQL Strong knowledge of Active Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP) Proficiency in scripting (PowerShell, Python) Familiarity with security frameworks (MITREATT&CK, NIST, Kill Chain) Experience with EDR, DLP, Proxy, and SEG tools Desirable Qualifications Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Randstad Technologies
enhancing SOC documentation, SOPs, and playbooks Collaborating with cross-functional teams and contributing to security strategy Ensuring security policies align with standards like NIST, ISO 27001, MITREATT&CK We're Looking for Someone With: Expert-level SIEM experience (Azure Sentinel highly preferred) Strong knowledge of Kusto Query Language (KQL) Demonstrated experience in cybersecurity incident More ❯
across diverse environments (cloud, hybrid, manufacturing). - Hands-on expertise with EDR, SOAR tooling, and SASE/SSE technologies. - Deep familiarity with frameworks such as NIST, MITREATT&CK, and other industry standards. - Strong stakeholder management skills and the ability to influence at all levels of the business. - A pragmatic, action-oriented approach to reaching More ❯
and third parties to mitigate risks uncovered during investigations and assessments Enhance monitoring capabilities by integrating IOCs and developing detection strategies aligned to frameworks such as MITREATT&CK Support and mature vulnerability management processes and remediation tracking Provide security advisory support across the wider IT function Required Experience Solid track record in incident response … threat detection, and security monitoring within complex environments Proficiency with forensics tools, SIEM platforms, and packet inspection technologies (eg Wireshark, Suricata) Familiarity with threat modelling techniques (Kill Chain, MITRE, Diamond Model) Comfortable working across Windows, Linux/Unix, and hybrid/cloud-based environments Exposure to banking or other regulated industries is highly desirable Strong grasp of vulnerability More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Ashdown Group
must have demonstrable expertise with monitoring and securing enterprise class technology estates. You will have proven experience with Cyber Security best practice including remediations for the MITREATT&CK Framework and NIST Cloud Security guidelines. You will support ISO 27001 compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
experience in Security Operations and Incident Response You have experience of performing analysis with SIEM technologies, Splunk preferred You have experience with proactive threat hunting using MITREATT&CK or similar frameworks You have a deep understanding of security appliances/tools such as host-based and network-based IDS/IPS, WAF, EDR You More ❯
better suited to. 8+ years of experience in IoT security, preferably in the medical device or the pharmaceutical industry. Proficiency in security frameworks (e.g., NIST, OWASP, MITREATT&CK, PASTA, STRIDE) and standards such as FDA cybersecurity guidance Experience assessing security risks using industry standard methods (penetration test results, threat modeling, security testing) and determining More ❯
containerised environments. Experience in building or maturing security culture initiatives, including awareness programs, gamified training, or executive engagement. Experience with security testing tools and frameworks (e.g., MITREATT&CK, Cobalt Strike, Metasploit, Burp Suite, or similar). About the job The UK Security Operations (SecOps) team in Google Public Sector delivers, operates and secures private More ❯
reporting abilities. Familiarity with risk management frameworks (ISO 3100X, NIST 800 series, ENISA, EBIOS, OCTAVE, FAIR). Preferred: Background in information security and security frameworks (eg, MITREATT&CK, ISO 2700X). Experience working in multinational environments. Knowledge of AI governance or ethics is a plus. Details 9+ month contract (Inside IR35) | Hybrid: 3 days More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
QBE Management Services (UK) Limited
response. About you Strong experience across both offensive and defensive cyber security disciplines. Deep understanding of attacker tactics, techniques, and procedures (TTPs), with expertise in the MITREATT&CK Framework. Hands-on technical knowledge in cyber detection engineering, security tools, and infrastructure. Skilled in Detection-as-Code and experienced with SIEM query languages. Confident communicator More ❯
Security Hub, CloudTrail, KMS), or ability to rapidly apply equivalent experience from other platforms in an AWS context • Familiarity with adversary behaviours and detection frameworks (e.g. MITREATT&CK, SIGMA) • Experience supporting enterprise customers across regulated or high-trust environments such as finance, energy, or government • Prior experience designing or contributing to security automation mechanisms More ❯
Experience leading and coaching junior security engineers to improve their skills and effectiveness. PREFERRED QUALIFICATIONS BS or MS in a STEM related field. Understanding of the MitreATT&CK framework and knowledge of host and network telemetry data (e.g., process lists, application logs, NetFlow). Have awareness and understanding of current cyber security threats, actors More ❯
in security testing A proven track record of managing and growing high-performing teams You possess practiced competence with red teaming methodologies and experience using the MITREATT&CK framework for adversary simulations You're skilled in Objective-C, Go, Bash, Python, or JXA, and have knowledge of macOS C2 frameworks and hacking techniques You More ❯