IP, VPNs, and firewalls. Your expertise in incident response and threat intelligence analysis is essential, as is your familiarity with the MitreAtt&ck framework and advanced threat detection techniques. Strong analytical and problem-solving skills are indispensable, as is the ability to offer mentorship … platforms (Microsoft Sentinel, Splunk) Leading incident response and fortifying detection and containment strategies Tuning and maintaining detection rules, leveraging frameworks like MitreAtt&ck Collaborating with colleagues to enhance the Security Operations Centre's capabilities Staying abreast of cyber threat developments and contributing to best More ❯
IP, VPNs, and firewalls. Your expertise in incident response and threat intelligence analysis is essential, as is your familiarity with the MitreAtt&ck framework and advanced threat detection techniques. Strong analytical and problem-solving skills are indispensable, as is the ability to offer mentorship … platforms (Microsoft Sentinel, Splunk) Leading incident response and fortifying detection and containment strategies Tuning and maintaining detection rules, leveraging frameworks like MitreAtt&ck Collaborating with colleagues to enhance the Security Operations Centre's capabilities Staying abreast of cyber threat developments and contributing to best More ❯
protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ). Skilled in incident response and threat intelligence analysis . Familiarity with MitreAtt&ck framework and advanced threat detection techniques. Excellent analytical and problem-solving capabilities. Able to provide mentorship and leadership within a SOC … . Leading incident response and driving improvements in detection and containment strategies. Tuning and maintaining detection rules, using threat frameworks like MitreAtt&ck . Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre . Staying abreast of cyber More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with MitreAtt&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide mentorship and leadership within a SOC … Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like MitreAtt&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyber threat developments More ❯
of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with MitreAtt&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide mentorship and leadership within a SOC … Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like MitreAtt&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyber threat developments More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with MitreAtt&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities Able to provide mentorship and leadership within a SOC … Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like MitreAtt&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyber threat developments More ❯
incidents using groundbreaking tools like Microsoft Sentinel and Splunk. Leading incident response. Fine-tuning detection rules and strategies with frameworks like MitreAtt&ck to stay ahead of new threats. Craft the future of our Security Operations Centre, ensuring we remain adaptable to new challenges. … applications (TCP/IP, VPNs, firewalls, etc.). Problem-solving skills to assess complex threats and deliver actionable insights. Experience with MitreATT&CK, incident response, and threat intelligence. It would be great if you had: Cyber Security certifications like CRT or OSCP. Hands-on More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Splunk) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like MitreAtt&ck Collaborating with colleagues to enhance the overall capability and resilience of the Security Operations Centre Staying abreast of cyber threat developments … of network protocols and infrastructure (eg TCP/IP, VPNs, Firewalls) Skilled in incident response and threat intelligence analysis Familiarity with MitreAtt&ck framework and advanced threat detection techniques Excellent analytical and problem-solving capabilities The ability to provide mentorship and leadership within a More ❯
containment and recovery efforts during active security incidents Continuously enhancing SOC capabilities, tooling, and detection rules using threat-informed approaches like MITREATT&CK Producing detailed incident reports and documentation for both technical and non-technical stakeholders Assisting with threat intelligence activities as needed Staying … working in a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITREATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic More ❯
Hemel Hempstead, Felden, Hertfordshire, United Kingdom
FINTEC recruit Ltd
Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage Analyse and optimise detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies Acting as a representative of the SOC in key … environment Qualified at SOC Level 2 Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis Experience of static malware analysis and reverse engineering (desirable) Scripting or programming with Python, Perl More ❯
Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage Analyse and optimise detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies Acting as a representative of the SOC in key … environment Qualified at SOC Level 2 Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis Experience of static malware analysis and reverse engineering (desirable) Scripting or programming with Python, Perl More ❯
embed a continuous improvement mindset. Strengthen detection: Contribute to the development and tuning of detection rules and playbooks, aligned to the MITREATT&CK framework. Communicate with impact: Act as the point of contact during incidents, maintaining clear handovers and reporting. What You’ll Bring … to real-time monitoring, triage, and incident response. Strong working knowledge of SIEM tools – especially Microsoft Sentinel or Splunk. Familiarity with MITREATT&CK, detection engineering, and threat-informed defence practices. Solid understanding of network protocols, endpoint monitoring, logs, and security tooling. Previous experience mentoring More ❯
embed a continuous improvement mindset. Strengthen detection: Contribute to the development and tuning of detection rules and playbooks, aligned to the MITREATT&CK framework. Communicate with impact: Act as the point of contact during incidents, maintaining clear handovers and reporting. What You’ll Bring … to real-time monitoring, triage, and incident response. Strong working knowledge of SIEM tools – especially Microsoft Sentinel or Splunk. Familiarity with MITREATT&CK, detection engineering, and threat-informed defence practices. Solid understanding of network protocols, endpoint monitoring, logs, and security tooling. Previous experience mentoring More ❯
people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls … Enhancing team knowledge across SOC tooling , detection methodologies , and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation , findings, and mitigation strategies Acting as a representative of the SOC in key More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
develop team knowledge of SOC tools, security operations and triage. Analyse and improve detection rules and use cases in line with MitreAtt&ck and threat-informed defence. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Represent the … management experience to help develop Analysts and lead careers. Demonstrable experience of using Microsoft Sentinel and Splunk. Knowledge and experience with MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Good understanding More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls … Enhancing team knowledge across SOC tooling , detection methodologies , and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation , findings, and mitigation strategies Acting as a representative of the SOC in key More ❯
watford, hertfordshire, east anglia, united kingdom
Walsh Employment
people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls … Enhancing team knowledge across SOC tooling , detection methodologies , and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation , findings, and mitigation strategies Acting as a representative of the SOC in key More ❯
people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls … Enhancing team knowledge across SOC tooling , detection methodologies , and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation , findings, and mitigation strategies Acting as a representative of the SOC in key More ❯
people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls … Enhancing team knowledge across SOC tooling , detection methodologies , and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation , findings, and mitigation strategies Acting as a representative of the SOC in key More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls … Enhancing team knowledge across SOC tooling , detection methodologies , and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation , findings, and mitigation strategies Acting as a representative of the SOC in key More ❯
people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases, firewalls … Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies Acting as a representative of the SOC in key More ❯
technologies; experience with enterprise security services such as EDR, SIEM technologies, and SOAR platforms is essential Familiarity with frameworks such as MITREATT&CK and how to utilise them in the assessment of detection capabilities and coverage Skilled in identifying opportunities for developing new threat … Enter manually Accepted file types: pdf, doc, docx, txt, rtf LinkedIn Profile Website Do you have familiarity with frameworks such as MITREATT&CK and how to utilise them in the assessment of detection capabilities and coverage? Select Do you have a strong technical foundation More ❯
Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies Acting as a representative of the SOC in key … people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client Server applications and multi-tier web environments Relational databases, Firewalls More ❯
Enhancing team knowledge across SOC tooling, detection methodologies, and threat triage Analysing and optimising detection rules and use cases based on MitreAtt&ck Maintaining detailed and up-to-date incident documentation, findings, and mitigation strategies Acting as a representative of the SOC in key … people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MitreAtt&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases, firewalls More ❯
Rapid-prototyping searches mid-incident to surface lateral movement, C2, or privilege escalation attempts Creating and maintaining detection logic documentation + MITREATT&CK coverage mapping Supporting blue team investigations with deep log analysis and quick-turnaround queries Working with multiple data sources: firewalls, EDR … SIEM platforms Comfort pivoting through logs under pressure and building fast, accurate queries Experience with threat modeling and mapping detections to MITREATT&CK Bonus: You've worked with version control for detection rules, or done some detection-as-code ✅ Nice-to-Haves Certs like More ❯