City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years … of experience in threat intelligence, cybersecurity operations, or penetration testing. Proven ability to collaborate across technical teams, including Red/Blue teams and SO Industry Experience Required or Preferred: Key Soft Skills (e.g Communication, leadership, stakeholder management): Analytical and detail-oriented with a strong sense of curiosity. Collaborative and team-focused, with a proactive approach to cross-functional engagement. … and analyze the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organizations business and technology environment. Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies. Act as a liaison between threat intelligence and More ❯
analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies Act as a liaison between threat intelligence and … intelligence and offensive security operations Ad hoc requests from your line manager Cyber Security Analyst Ideal Candidate: At least 5 years of experience in threat intelligence, cybersecurity operations, or penetrationtesting Ability to collaborate across technical teams, including Red/Blue teams and SOC Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools Experience using … Breach and Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due More ❯
SP800 series, CSF). Conduct risk assessments and vulnerability management activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetrationtesting and audit log management. Deliver training and awareness programs to enhance the organizations security posture. Collaborate with internal and external stakeholders to maintain compliance and manage third … analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous Vulnerability Management and Incident Response. PenetrationTesting and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
Paddington, Sheldon Square, Greater London, United Kingdom Hybrid/Remote Options
Morson Edge
SP800 series, CSF). Conduct risk assessments and vulnerability management activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetrationtesting and audit log management. Deliver training and awareness programs to enhance the organizations security posture. Collaborate with internal and external stakeholders to maintain compliance and manage third … analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous Vulnerability Management and Incident Response. PenetrationTesting and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯