practices. • Good knowledge of cyber threat landscape, current affairs and geopolitics, including threat groups and how to apply this knowledge within an operational environment. • Understands the MITREATT&CK Framework, Threat Intelligence Platforms and the coordination of Advanced Threat Protection (ATP) and tactics, techniques and procedures (TTPs) to support Cyber Operations. • Knowledge of user behaviour … Knowledge, Skills and Qualifications The role holder will have: • An understanding of threat modelling frameworks and processes e.g. PASTA, OWASP Threat Dragon, DREAD, STRIDE-LM, OCTAVE, MITREATT&CK. • Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. • An understanding of risk management frameworks e.g. NIST, FAIR, Orange … Breach and Attack Simulation or experience of working within an Active Defence discipline. Experience looking for: • All internal based projects. Backlog of tasks to work through. • MitreATT&CK framework used a lot • Research and understand the tech stacks • Understanding of risk management • Conduct gap analysis • Industry experience or industry-based certifications could be useful More ❯
Penwortham, Lancashire, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
of the current threat landscape, the TTPs frequently employed in those attacks and how we can investigate and mitigate these. - Knowledge and demonstrable experience of the MITREATT&CK framework. - Good knowledge of enterprise computing technologies. Skills: - Understanding of enterprise networking and computing - Knowledge of Python 3 programming language - Demonstrable experience in using SOAR tooling … ability to obtain UK Government security clearance to SC - Relevant industry and vendor qualifications such as CISSP, CISM, CompTIA security+ - Cyber security framework knowledge such as MITREATT&CK Qualifications: Relevant IT degree or business degree or equivalent experience PREFERRED For more information please contact Lauren Morley at JAM Recruitment or click apply. More ❯
Preston, Lancashire, North West, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
of the current threat landscape, the TTPs frequently employed in those attacks and how we can investigate and mitigate these. - Knowledge and demonstrable experience of the MITREATT&CK framework. - Good knowledge of enterprise computing technologies. Skills: - Understanding of enterprise networking and computing - Knowledge of Python 3 programming language - Demonstrable experience in using SOAR tooling … ability to obtain UK Government security clearance to SC - Relevant industry and vendor qualifications such as CISSP, CISM, CompTIA security+ - Cyber security framework knowledge such as MITREATT&CK Qualifications: Relevant IT degree or business degree or equivalent experience PREFERRED For more information please contact Lauren Morley at JAM Recruitment or click apply. More ❯
simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITREATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack surface assessments, and adversary emulation plans Present high-quality threat briefings, risk assessments … Intelligence Platforms), SIEM tools, and threat data enrichment solutions Practical exposure to Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITREATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports More ❯
simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITREATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack surface assessments, and adversary emulation plans Present high-quality threat briefings, risk assessments … Intelligence Platforms), SIEM tools, and threat data enrichment solutions Practical exposure to Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITREATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports More ❯
Alexander Mann Solutions - Public Sector Resourcing
for automation. . Familiarity with cloud security platforms (AWS, Azure, GCP). . Knowledge of network protocols, operating systems (Linux/Windows), and cybersecurity frameworks (NIST, MITREATT&CK, CAF). . Experience with SOAR (Security Orchestration, Automation, and Response) platforms. . Excellent problem-solving and analytical skills. . Strong communication and collaboration abilities. Please More ❯
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Synergize Consulting Limited
Knowledge of information assurance standards and frameworks including CIS, NIST, ISO 27001, Cyber Essentials/Essentials Plus, GDPR. Knowledge of threat cyber security frameworks such as MITREATT&CK, Kill Chain and NIST CSF 2.0. The ideal candidate will combine strong technical expertise with a solid understanding of global events and their influence on the More ❯
frameworks and attack simulations Identify vulnerabilities and help prioritise remediation efforts Collaborate with internal teams to embed cyber security best practices Apply industry standards such as MITREATT&CK, NIST, OWASP, STRIDE, PASTA Produce strategic risk and threat reports for senior stakeholders Stay ahead of the curve with threat intelligence and geopolitical awareness Skills Experience More ❯
standards, guidance, and processes Skillset & requirements Solid background in penetration testing, ethical hacking, or red teaming engagements Strong knowledge of frameworks such as OWASP Top 10 , MITREATT&CK , and risk-scoring methods like CVSS Practical use of tools such as Burp Suite, Nmap, Metasploit, Wireshark, Kali Linux Proficiency with scripting languages (e.g., Python, Bash More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Investigo
development of security policies and best practices Required Skills & Experience: Strong background in penetration testing, ethical hacking, or red teaming Deep knowledge of OWASP Top 10, MITREATT&CK, and CVSS scoring systems Proficiency with tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux Scripting experience with Python, Bash, or PowerShell Understanding of More ❯
to security policies and best practices development Required Skills & Qualifications Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITREATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating More ❯
to security policies and best practices development Required Skills & Qualifications Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITREATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating More ❯
knowledge (OWASP Top 10, API security). Proven end-to-end pentest experience: internal, external, cloud, AD, web apps, APIs. Familiarity with pentest reporting formats (CVSS, MITREATT&CK mapping). Comfortable in NDA-restricted, compliance-driven, sensitive environments. Excellent reporting skills for both technical and executive audiences. Scripting for automation/exploit development: Python More ❯
NAC, AD, DLP, web/email filtering, behavioural analytics, TCP/IP and OT protocols, and security applications. Understanding of adversarial TTPs and frameworks such as MITREATT&CK. Experience with SIEM and SOAR solutions, IAM, and DLP tools (e.g. FortiSIEM, Q-Radar, Microsoft Secure Gateway, Darktrace, Microsoft Defender, Sentinel). Experience developing incident response playbooks, SOAR More ❯
place. What are BAE Systems looking for from you? An understanding of threat modelling frameworks and processes e.g. PASTA, OWASP Threat Dragon, DREAD, STRIDE-LM, OCTAVE, MITREATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
/CI/CD security and cloud-native architectures (containers, Kubernetes, Git). Strong knowledge of AI/ML-specific security vulnerabilities (adversarial attacks, data poisoning, prompt injection, MITRE ATLAS). Familiarity with global regulatory frameworks relevant to AI security. Excellent communication skills for engaging both technical and non-technical stakeholders. Esther Urtecho Senior Delivery Consultant London | Bristol More ❯