Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with MITREATT&CK Familiarity with ITIL Who we are: We're a business with a global reach that empowers local teams, and we undertake hugely exciting work that is More ❯
of SIEM, XDR, EDR, vulnerability management, firewalls, and network security. Hands-on experience in security control implementation and maintenance (e.g. ISO27001, Cyber Essentials). Familiarity with MITREATT&CK, incident response methodologies, and penetration testing. Experience in risk management, vendor security assessments, and compliance. Understanding of UK regulations, including Cyber Essentials, ISO27001, NIST CSF, and More ❯
interface at the highest level and exhibit good verbal, written and presentation skills. Experience of working within key Cyber Security principles and standards (ISO 27001, NIST, Cyber Essentials, MITRE). [i] Experience working in a customer-facing role desirable. You should have experience in managing team driven workloads. Demonstrable experience driving continuous improvement initiatives. Benefits & culture At Zellis More ❯
SANS/GIAC is highly beneficial. Additionally, this role requires an understanding of security frameworks including NIST/NIS Regulations CAF/IEC/SoGP/MITREATT&CK/MITREATT&CK ICS/Cyber Kill Chain. You’ll be self-motivated, able to work on own initiative and More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Met Office
knowledge and experience in vulnerability management, with deep knowledge of processes for identifying, classifying, and prioritising vulnerabilities using industry standard frameworks such as CVSS, NIST, and MITREATT&CK, with a track record of tailoring scoring models to organisational risk appetite.Proven ability to lead end-to-end vulnerability management initiatives in complex IT environments that More ❯
Stratford-upon-avon, Warwickshire, United Kingdom Hybrid / WFH Options
Ccl Solutions Group
the following technical competencies: Solid grounding in OS and network fundamentals (Linux, Windows, Mac, TCP/IP stack). Knowledge of common attack techniques and mitigations (MITREATT&CK, OWASP Top 10). Familiarity with scripting and automation using Python, Bash, or PowerShell. Strong understanding of Active Directory attack chains and common privilege escalation paths. More ❯
and implement comprehensive security strategies for Payments System Upgrades. Conduct thorough risk assessments to identify potential security threats and develop mitigation strategies. Create comprehensive threat models aligning with MITREATTACK/STRIDE frameworks. Recommend the best controls & mitigations to potential vulnerabilities Ensure the design comply with relevant regulations and standards, including GDPR, SOX, and PCI-DSS. Implement advanced … be within a financially regulated enterprise (e.g., PCI compliance). Proven experience working previously for financial organizations. Previous relevant experience in developing bespoke Threat Models leveraging frameworks like MITREATTACK & STRIDE. Proficiency in assessing the Identity & Access Management functions & associated risks during Acquisition process. Be able to understand and assess the security elements of technical designs/solutions More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
QinetiQ Limited
risk exposure to cyber security, in support of operational and business planning activity across a range of different domains or sectors using established frameworks (e.g. NIST, MITREATT&CK, UK Government) Identify mitigations for cyber risk in a given business or operational scenario and threat environment Support development of cyber security risk cases in a … years of experience in security vulnerability, risk, audit & compliance Understand relevant NIST frameworks and ISO27001 standards and how to apply in practice Knowledge of MITREATT&CK Essential qualifications for the Cyber Security Risk Consultant: We value difference and we don't have a fixed idea when it comes to background or education, provided you More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
Windows-based systems. Hands-on experience with vulnerability scanning tools (e.g., Nessus, OpenVAS, Burp Suite, or similar). Familiarity with CVSS scoring, vulnerability databases (e.g., NVD, MITREATT&CK), and risk prioritization frameworks. Understanding of patch management processes, secure configuration baselines, and compliance requirements. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of More ❯