Manchester, England, United Kingdom Hybrid / WFH Options
Whitehall Resources Ltd
Threat Hunting & Detection Engineering - Perform proactive threat hunting using KQL within Microsoft Sentinel. - Develop and fine-tune custom analytics rules, workbooks, and hunting queries. - Apply the MITREATT&CK framework to build coverage and improve threat visibility. Security Engineering & Platform Management - Onboard and integrate new data sources into Microsoft Sentinel, ensuring accurate log ingestion and More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems
as a point of contact for intrusion analysis, forensics, and incident response queries. Managing ADHOC and regular products during capacity constraints. Knowledge of Cyber Kill Chain, MITREATT&CK, and developing new analytics and playbooks. Requirements Technical: 3+ years in Cyber Threat Intelligence, research, and investigation. Experience in incident response and management. Understanding of threats More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems Applied Intelligence
sufficient quality for distribution In-depth knowledge of the various techniques and frameworks used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITREATT&CK Development of new analytics and playbooks that result in creation of new detection rules/analytics Requirements Technical 3+ years’ experience in Cyber Threat Intelligence, and More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Babcock
sufficient quality for distribution In-depth knowledge of the various techniques and frameworks used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITREATT&CK Development of new analytics and playbooks that result in creation of new detection rules/analytics Requirements Technical 3+ years' experience in Cyber Threat Intelligence, and More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems (New)
off the cloud’ using Microsoft Graph API, app registrations, and managed identities. Ability to research and learn new tools and techniques quickly. Good understanding of the MITREATT&CK Framework. Strong knowledge of networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP). Experience in Intrusion Analysis on Windows Devices and Azure Cloud More ❯
Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITREATT&CK, and risk models to form hypotheses and validate them through structured hunts. Leverage Jupyter Notebooks and other tools to automate hunts, visualise results, and create reusable … They have 3–5+ years of hands-on experience in Threat Hunting, Red Team, Blue Team, or Incident Response roles, with a deep understanding of the MITREATT&CK framework and a proven ability to detect and investigate advanced threats beyond signature-based solutions. Adept at leveraging Splunk for data analysis and detection development, they … you Minimum Requirements Minimum 3-5 + years of experience within a Threat Hunter, Red Team, Incident Response, or Blue Team role. Solid understanding of the MITREATT&CK framework, TTP analysis, and adversary emulation. Deep familiarity with hypothesis-driven threat hunting frameworks and methodologies. Ability to work autonomously while collaborating across security, engineering, and More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE
as use of Microsoft Graph API, app registrations and managed identities · Ability to quickly research and learn about new tools and techniques · Good working knowledge of MITREATT&CK Framework Good working knowledge of networking concepts & protocols (TCP/IP, UDP, DNS, DHCP, HTTP, etc.) · Intrusion Analysis on Windows Devices and Azure Cloud Architecture. · Relevant More ❯
using the ITIL framework. Ability to keep up to date with technology trends and to understand key technical drivers in the industry. Strong understanding of the MITREATT&CK and NIST Cybersecurity frameworks. Additional Information Your impact on Radius will be rewarded with the opportunity to develop and progress your career in many directions. You More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
their purpose in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape, advanced adversary tactics, and the MITREAttack Framework. Strong understanding of low-level concepts including operating systems, Active Directory, Windows and Linux server environments, alongside computer networking. Knowledge of cloud environments and SaaS applications such More ❯
gather and report threat intelligence, update detection rules and response playbooks, and collaborate across teams to improve security. You ll also track threat actor tactics using MITREATT&CK and assist with incident response and reviews. Key skills required: • 3+ years of experience in Security Operations, Threat Intelligence, or Incident Response roles • Proficient in analyzing More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Babcock
off the cloud' using Microsoft Graph API, app registrations, and managed identities. Ability to quickly research and learn new tools and techniques. Good working knowledge of MITREATT&CK Framework. Understanding of networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP, etc.). Experience with intrusion analysis on Windows devices and Azure cloud More ❯
in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape, advanced adversary tactics, and the MITREAtt&ck Framework. An in depth understanding of low-level concepts including operating systems, Active Directory, windows and Linux server environments, alongside computer networking. Good fundamentals of cloud More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks (NIST, NCSC, CIS, MITREATT&CK) Hands-on experience with security tools: SIEM, IDS/IPS, firewalls, endpoint protection Expertise in Azure security and securing cloud platforms A solid understanding of vulnerabilities More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Techwaka
penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks (NIST, NCSC, CIS, MITREATT&CK) Hands-on experience with security tools: SIEM, IDS/IPS, firewalls, endpoint protection Expertise in Azure security and securing cloud platforms A solid understanding of vulnerabilities More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems
off the cloud’ (e.g., Microsoft Graph API, app registrations, managed identities). Ability to research and learn new tools and techniques quickly. Good working knowledge of MITREATT&CK framework. Understanding of networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP). Experience with intrusion analysis on Windows and Azure cloud architecture. Relevant More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Queen Square Recruitment
Strong understanding of log management (onboarding, parsing, retention strategies) Demonstrated ability to build and manage detection use cases aligned with evolving threats Familiarity with the MITREATT&CK framework and threat modeling Solid understanding of Windows, Linux, networking, and endpoint security Skilled in threat intelligence, digital forensics, and advanced incident handling Experience with SOAR platforms More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
BizMarComm
in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape, advanced adversary tactics, and the MITREAtt&ck Framework. Knowledge of cloud environments and SaaS applications such as AWS, Azure, Office 365, & Defender. Must have the ability to gain and hold HMG Security Clearance More ❯
with Microsoft Sentinel, including KQL, custom analytic rules, and automation. Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365. Strong knowledge of the MITREATT&CK framework, threat intelligence, and adversary TTPs. Solid understanding of Windows, Linux, and core network security principles. Skilled in incident response, digital forensics, and proactive threat hunting. More ❯
good coffee supply). We are a FTSE company hiring a Cyber Security Operations Engineer . If you can identify anomalies before SIEM alerts, speak in MITREATT&CK, and think in hex, we want to hear from you. You will report to the Cyber Security Operations Manager and be responsible for protecting our organization More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
in Microsoft Sentinel (KQL, custom rules, automation, dashboards) Strong hands-on experience with Microsoft Defender for Endpoint, , and Office 365 Proficient in handling incidents aligned with MITREATT&CK framework Solid understanding of Windows and Linux systems, networking, and endpoint security Skilled in digital forensics, threat intelligence, and advanced incident handling Familiarity with SOAR platforms More ❯
corners - is hiring a Cyber Security Operations Engineer . If you're the kind of person who spots anomalies before SIEM alerts even pop, talks in MITREATT&CK when stressed, and dreams in hex - we want to hear from you. You’ll report to the Cyber Security Operations Manager and be part of the More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
NearTech Search
working with just 1 day/week in the office Projects that span both UK and US markets Exposure to best-in-class tools and frameworks (MITREATT&CK, OWASP) Supportive culture with a learning mindset and room to grow Involvement in the full security lifecycle from audits to implementation Opportunity to shape how cloud More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
a Security role, ideally within incident response or detection. In-depth understanding of the cyber threat landscape and advanced adversary tactics, being able to relate them back to MITREAttack Framework. Understanding of low-level concepts including operating systems and networking. Knowledge of cloud environments and SaaS applications such as AWS, Azure, Office 365, & Defender. Must have the More ❯
role, ideally within incident response or detection. In-depth understanding of the cyber threat landscape and advanced adversary tactics, being able to relate them back to MITREAtt&ck Framework. Understanding of low-level concepts including operating systems and networking. Knowledge of cloud environments and SaaS applications such as AWS, Azure, Office 365, & Defender. Must More ❯
In-depth understanding of the cyber threat landscape and adversary tactics. Intermediate knowledge and experience of Linux, Windows, Azure, AWS, Elastic Stack, Tennable, Threat Intel gathering, MitreAtt&ck Framework, and Office 365 security centre. About the DCC: At the DCC, we believe in making Britain more connected, so we can all lead smarter, greener More ❯