MITRE ATT&CK Jobs in the UK

1 to 25 of 408 MITRE ATT&CK Jobs in the UK

Cyber Security Manager - Incident Response

London, England, United Kingdom
Boston Consulting Group
movement, and data exfiltration. Strong hands–on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. Expertise in threat cyber security frameworks such as MITRE ATT&CK and Cyber Kill Chains. Strong analytical and problem–solving skills, with an investigative mindset to identify security threats. Experience with malware analysis, including static and dynamic More ❯
Posted:

Incident Response Lead Analyst - Cyber Security

City of London, England, United Kingdom
The Boston Consulting Group GmbH
movement, and data exfiltration. Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. Expertise in threat cyber security frameworks such as MITRE ATT&CK and Cyber Kill Chains. Strong analytical and problem-solving skills, with an investigative mindset to identify security threats. Experience with malware analysis, including static and dynamic More ❯
Posted:

Incident Response Lead Analyst - Cyber Security

London, England, United Kingdom
Boston Consulting Group (BCG)
movement, and data exfiltration. Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. Expertise in threat cyber security frameworks such as MITRE ATT&CK and Cyber Kill Chains. Strong analytical and problem-solving skills, with an investigative mindset to identify security threats. Experience with malware analysis, including static and dynamic More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
Thomas Miller
Familiarity with scripting languages such as Python, Bash, or PowerShell. Experience with cloud security monitoring (AWS, Azure, GCP). Knowledge of incident management frameworks like NIST, MITRE ATT&CK. Preferred Qualifications: Certification such as CompTIA Security+ Bachelor's degree in Computer Science, Information Security, or related field Seniority level Seniority level Associate Employment type Employment type Full More ❯
Posted:

Senior SOC Analyst

Glasgow, United Kingdom
Applicable Limited
using SIEM and EDR solutions. Fine-tune SIEM detection rules, correlation alerts, and log sources to reduce false positives. Analyse threat intelligence feeds, map findings to MITRE ATT&CK framework, and provide actionable security recommendations. Collaborate with SOC teams to investigate alerts, escalate incidents, and improve detection mechanisms. Conduct adversary simulation exercises to test and … minimal levels of supervision. Threat Hunting & Detection (IOC & IOA Analysis, TTP Profiling, Cyber Kill Chain) SIEM Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & Reverse Engineering Network & Endpoint Security Monitoring (EDR, IDS/IPS More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Soc Analyst L3

Birmingham, Staffordshire, United Kingdom
Applicable Limited
using SIEM and EDR solutions. Fine-tune SIEM detection rules, correlation alerts, and log sources to reduce false positives. Analyse threat intelligence feeds, map findings to MITRE ATT&CK framework, and provide actionable security recommendations. Collaborate with SOC teams to investigate alerts, escalate incidents, and improve detection mechanisms. Conduct adversary simulation exercises to test and … operations or on call. Threat Hunting & Detection (IOC & IOA Analysis, TTP Profiling, Cyber Kill Chain) SIEM Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & Reverse Engineering Network & Endpoint Security Monitoring (EDR, IDS/IPS More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Soc Analyst L3

Birmingham, England, United Kingdom
Applicable Limited
using SIEM and EDR solutions. Fine-tune SIEM detection rules, correlation alerts, and log sources to reduce false positives. Analyse threat intelligence feeds, map findings to MITRE ATT&CK framework, and provide actionable security recommendations. Collaborate with SOC teams to investigate alerts, escalate incidents, and improve detection mechanisms. Conduct adversary simulation exercises to test and … operations or on call. Threat Hunting & Detection (IOC & IOA Analysis, TTP Profiling, Cyber Kill Chain) SIEM Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & Reverse Engineering Network & Endpoint Security Monitoring (EDR, IDS/IPS More ❯
Posted:

Director, Security Operations Center - Global Security Office

London, England, United Kingdom
Alvarez & Marsal
Strong knowledge of security technologies, SIEM platforms (e.g., Chronicle, Splunk, QRadar), EDR tools, firewalls, and network security. • Experience with security frameworks and regulations (NIST, ISO 27001, MITRE ATT&CK, CIS, etc.). • Demonstrated experience leading security incident investigations and crisis response. • Excellent leadership, communication, and project management skills. • Relevant certifications such as CISSP, CISM, GIAC More ❯
Posted:

Cyber Defence Analyst

Nottingham, Nottinghamshire, United Kingdom
Hybrid / WFH Options
Experian Group
Digital Forensics, Incident Response, or Ethical Hacking (e.g., GCIH, CEH, GCFE, GCFA, and CFCE). Knowledge of main concepts related to the Incident Response Life Cycle, MITRE ATT&CK Framework, Cyber Kill Chain, and other cybersecurity frameworks. High-level understanding of common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs), and common industry More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Tier 2 Security Operations Centre Analyst

Stoke-on-Trent, England, United Kingdom
Securecloudplus
propose pragmatic, measurable improvements Lead small initiatives to improve SOC efficiency, such as automating repetitive tasks or improving alert triage Contribute to maturity efforts such as MITRE ATT&CK mapping, control gap analysis, or threat modelling Education and Experience Requirements Experience (preferred) 1 to 3 years of hands-on experience in a SOC or similar … on experience with log analysis and alert triage, vulnerability scanning and patching and incident response Working knowledge of cyber security and compliance frameworks (NIST, ISO 27001, MITRE ATT&CK). Experience or strong interest in using scripting and automation for security operations Soft Skills: Excellent written and verbal communication skills, with the ability to convey More ❯
Posted:

Defence Automation Engineer

London, England
IAG
Bash). Strong understanding of SOC processes, including incident response and threat detection. Experience with SIEM platforms (e.g., Splunk). Knowledge of security frameworks (e.g., NIST, MITRE ATT&CK). Skills Proficiency in automation tools (e.g., SOAR platforms, Ansible, Phantom). Expertise in scripting languages (e.g., Python, PowerShell, Bash). Strong knowledge of SOC processes … . Ability to integrate and automate security tools. Strong problem-solving and analytical skills. Experience in developing automated workflows and playbooks. Knowledge of security frameworks (e.g., MITRE ATT&CK, NIST). Strong collaboration and communication skills. Experience with log management and event correlation automation. Experience 3-5 years of experience in SOC or cybersecurity roles. … incident response, and threat detection. Experience with SIEM platforms (e.g., Splunk, QRadar, ArcSight). Experience developing and managing automated response workflows. Familiarity with security frameworks like MITRE ATT&CK or NIST. Experience working with security log management and event correlation tools. Additional Information What will happen next? If the opportunity sounds interesting to you, please More ❯
Employment Type: Permanent
Salary: GBP
Posted:

Cyber Defence Automation Engineer

London, England, United Kingdom
IAG Tech
Bash). Strong understanding of SOC processes, including incident response and threat detection. Experience with SIEM platforms (e.g., Splunk). Knowledge of security frameworks (e.g., NIST, MITRE ATT&CK). Skills Proficiency in automation tools (e.g., SOAR platforms, Ansible, Phantom). Expertise in scripting languages (e.g., Python, PowerShell, Bash). Strong knowledge of SOC processes … . Ability to integrate and automate security tools. Strong problem-solving and analytical skills. Experience in developing automated workflows and playbooks. Knowledge of security frameworks (e.g., MITRE ATT&CK, NIST). Strong collaboration and communication skills. Experience with log management and event correlation automation. Experience 3-5 years of experience in SOC or cybersecurity roles. … incident response, and threat detection. Experience with SIEM platforms (e.g., Splunk, QRadar, ArcSight). Experience developing and managing automated response workflows. Familiarity with security frameworks like MITRE ATT&CK or NIST. Experience working with security log management and event correlation tools. Additional Information What will happen next? If the opportunity sounds interesting to you, please More ❯
Posted:

Security Operations Center Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
Gravitas Recruitment Group (Global) Ltd
Netskope 💡 Technical Skills: Strong OS knowledge (Windows, Linux) Network protocol analysis (Wireshark, TCPDump) Scripting (Python, Bash, PowerShell) Cloud security monitoring (AWS, Azure, GCP) Familiarity with NIST, MITRE ATT&CK frameworks What You’ll Get: ✨ Competitive salary ✨ Hybrid working flexibility ✨ Bonus & benefits ✨ Career growth in a high-impact, international environment If you're passionate about cybersecurity More ❯
Posted:

Security Operations Center Analyst

London Area, United Kingdom
Hybrid / WFH Options
Gravitas Recruitment Group (Global) Ltd
Netskope 💡 Technical Skills: Strong OS knowledge (Windows, Linux) Network protocol analysis (Wireshark, TCPDump) Scripting (Python, Bash, PowerShell) Cloud security monitoring (AWS, Azure, GCP) Familiarity with NIST, MITRE ATT&CK frameworks What You’ll Get: ✨ Competitive salary ✨ Hybrid working flexibility ✨ Bonus & benefits ✨ Career growth in a high-impact, international environment If you're passionate about cybersecurity More ❯
Posted:

SOC Analyst

Cheltenham, England, United Kingdom
NCC Group
level and technical customer facing information. Confidence providing critical/sensitive information accurately. Contacting key stakeholders during major incidents. Incident Analysis and Response: Awareness of the MITRE ATT&CK framework. Pedigree in performing in-depth analysis of security alerts. Assess customer impact through investigation and work with senior analysts for resolution. Liaise with CIRT for More ❯
Posted:

GRC Consultant

London, England, United Kingdom
NTT DATA
covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Familiarity with MITRE ATT&CK Familiarity with ITIL Who we are: We’re a business with a global reach that empowers local teams, and we undertake hugely exciting work that is … covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Familiarity with MITRE ATT&CK Familiarity with ITIL Who we are: We’re a business with a global reach that empowers local teams, and we undertake hugely exciting work that is More ❯
Posted:

Cloud Security Architect

London, England, United Kingdom
iXceed Solutions
development. Experience with Infrastructure as Code (IaC) tools, particularly Terraform. Solid understanding of security monitoring, logging, and alerting concepts. Familiarity with common security frameworks (e.g., NIST, MITRE ATT&CK, OWASP Top 10). Preferred Qualifications Google Professional Cloud Security Engineer certification or equivalent (e.g., CISSP, CISM, AWS/Azure Security Certs). Experience with incident More ❯
Posted:

SOAR Engineer/Analyst (Security Orchestration, Automation, and Response)

United Kingdom
Atrium (EMEA)
Falcon platform Scripting experience in Python , PowerShell , or Bash . Experience with REST APIs and JSON for tool integration. Working knowledge of incident response frameworks and MITRE ATT&CK. Strong problem-solving, critical thinking, and communication skills. Desirable Qualifications Experience with CI/CD for playbook development and version control (e.g., Git). Familiarity with other SOC More ❯
Posted:

SOAR Engineer/Analyst (Security Orchestration, Automation, and Response)

Wallington, Surrey, England, United Kingdom
Gibbs Hybrid
Falcon platform Scripting experience in Python , PowerShell , or Bash . Experience with REST APIs and JSON for tool integration. Working knowledge of incident response frameworks and MITRE ATT&CK. Strong problem-solving, critical thinking, and communication skills. Desirable Qualifications Experience with CI/CD for playbook development and version control (e.g., Git). Familiarity with other SOC More ❯
Employment Type: Full-Time
Salary: £360 - £495 per day
Posted:

Senior SOC Analyst

Portsmouth, Hampshire, United Kingdom
McNally Recruitment Ltd
. Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ). Skilled in incident response and threat intelligence analysis . Familiarity with Mitre Att&ck framework and advanced threat detection techniques. Excellent analytical and problem-solving capabilities. Able to provide mentorship and leadership within a SOC team. Desirable (Nice-to-Have … SIEM platforms ( Microsoft Sentinel , Splunk ). Leading incident response and driving improvements in detection and containment strategies. Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck . Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre . Staying abreast of cyber threat developments and contributing to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Analyst

Southampton, England, United Kingdom
JR United Kingdom
advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyber threat developments and contributing to best practices … Sentinel and Splunk Solid understanding of network protocols and infrastructure (eg TCP/IP, VPNs, Firewalls) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities The ability to provide mentorship and leadership within a SOC team To apply for More ❯
Posted:

Security Operations Center Analyst

Gosport, England, United Kingdom
ZipRecruiter
Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide mentorship and leadership within a SOC team Desirable (Nice-to-Have … advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyber threat developments and contributing to best practices More ❯
Posted:

Senior SOC Analyst

Gosport, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Walsh Employment
Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide mentorship and leadership within a SOC team Desirable (Nice-to-Have … advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyber threat developments and contributing to best practices More ❯
Employment Type: Permanent, Work From Home
Posted:

Threat Hunter

Manchester, England, United Kingdom
NCC Group
Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITRE ATT&CK, and risk models to form hypotheses and validate them through structured hunts. Leverage Jupyter Notebooks and other tools to automate hunts, visualise results, and create reusable … They have 3–5+ years of hands-on experience in Threat Hunting, Red Team, Blue Team, or Incident Response roles, with a deep understanding of the MITRE ATT&CK framework and a proven ability to detect and investigate advanced threats beyond signature-based solutions. Adept at leveraging Splunk for data analysis and detection development, they … for in you Minimum 3-5 + years of experience within a Threat Hunter, Red Team, Incident Response, or Blue Team role. Solid understanding of the MITRE ATT&CK framework, TTP analysis, and adversary emulation. Deep familiarity with hypothesis-driven threat hunting frameworks and methodologies. Ability to work autonomously while collaborating across security, engineering, and More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Boston Hale
systems, and security principles Proficiency with security tools like LogRhythm, Qualys, SCCM, Intune, Microsoft 365, AD, and enterprise anti-malware Technical knowledge in network segmentation, firewalls, Mitre Att&ck, Windows, Linux, and Mac, with experience in NIST standards and frameworks About You Bring strong analytical, problem-solving, and interpersonal skills to collaborate across teams and More ❯
Posted:
MITRE ATT&CK
10th Percentile
£46,250
25th Percentile
£48,063
Median
£62,250
75th Percentile
£82,500
90th Percentile
£95,000