City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
designed to empower businesses of all sizes. Unlike conventional providers, we offer adaptable solutions tailored to the evolving needs of our clients, recognizing that businesses are dynamic entities. Our team is committed to delivering efficiency, innovation, and dedication to our clients ever-changing environments. We strive to revolutionize the market with trustworthy and cutting-edge solutions. Beyond mere provision … Blue teams and SO Industry Experience Required or Preferred: Key Soft Skills (e.g Communication, leadership, stakeholder management): Analytical and detail-oriented with a strong sense of curiosity. Collaborative and team-focused, with a proactive approach to cross-functional engagement. Able to work independently and manage multiple priorities in a fast-paced environment. High integrity and discretion when handling sensitive … Deliverables: Monitor and analyze the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organizations business and technology environment. Collaborate with RedTeam, Blue Team, and Penetration Testing teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies. Act as a liaison between More ❯
Monitor and analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with RedTeam, Blue Team, and Penetration Testing teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies Act as a liaison between … threat intelligence and offensive security teams to ensure alignment on threat modelling and adversary simulation exercises Support threat hunting activities by providing contextual intelligence and working alongside hunt team members Conduct threat modelling of threat actors, including their capabilities, motivations, and potential impact Leverage the MITRE ATT&CK framework to map threat actor behaviours and support detection engineering Develop … Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due to the culture understanding Analytical and detail-oriented with a strong sense of curiosity Collaborative and team-focused, with a proactive approach to cross-functional engagement Able to work independently and manage multiple priorities in a fast-paced environment High integrity and discretion when handling sensitive More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid/Remote Options
Morson Edge
contribute to safeguarding my client's network systems, operational technology, and customer data from emerging and sophisticated cyber risks. Key Responsibilities As a senior member of the Security Operations team, you will: Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery. Conduct advanced threat hunting across IT and OT environments to identify and … initiatives to enhance resilience. Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR). Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge. About You You'll bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving. Essential Qualifications & Experience Proven experience in a … IEC 27001/27002. Hands-on experience with tools such as FortiSIEM, Q-Radar, Microsoft Defender, Darktrace, Microsoft Sentinel, or similar platforms. Experience in forensic analysis, red-team exercises, and crisis simulation activities. Desirable Experience managing or supporting both IT and OT environments. In-depth understanding of adversarial TTPs and complex threat landscapes. More ❯
industry tools to expedite containment, eradication, and recovery strategies that minimise business impact and protect network systems and customer data from cyber threats. Dimensions People – Work collaboratively in a team of around 14 cyber security operations staff. Mentor Level 1 and Level 2 SOC Analysts, providing guidance and training. Suppliers – Regular interaction with technical resources from outsourced Managed Security … and SOAR solutions, IAM, and DLP tools (e.g. FortiSIEM, Q-Radar, Microsoft Secure Gateway, Darktrace, Microsoft Defender, Sentinel). Experience developing incident response playbooks, SOAR workflows, red-team exercises, and tabletop simulations. Experience in investigating advanced intrusions, such as targeted ransomware or state-sponsored attacks. Summary: My client are looking for an experienced Incident Response (CSIRT)/ More ❯
Birmingham, West Midlands, England, United Kingdom
Adecco
days onsite required pw) Are you a Cybersecurity Consultant with a knack for threat modelling? Our client is on the lookout for a talented individual to join their dynamic team for a crucial 3-month engagement. This role is pivotal in identifying and mitigating risks across complex IT and telecommunications infrastructures. Key Responsibilities: Conduct comprehensive threat modelling and risk … infrastructures.Strong knowledge of secure design principles and architecture reviews.A solid background in cybersecurity, ideally with exposure to telecoms environments.Experience in operational security (Intelligence, Threat Hunting, or RedTeam).Familiarity with threat modelling frameworks such as MITRE ATT&CK, STRIDE, or PASTA.Ability to drive work to tight timescales and meet deadlines.Demonstrated ability to work independently and manage priorities … your CV along with a brief cover letter highlighting your relevant experience and skills. We look forward to reviewing your application and potentially welcoming you to our client's team! Note: This position is ideal for candidates who are immediately available and can commit to the contract length. Take the next step in your cybersecurity career-apply today! Cyber More ❯
Overview We are seeking a highly skilled contractor to perform threat modelling and assessment activities across complex IT and telecommunications infrastructure. This role will be part of a small team whose function will be to identify risks across multiple and complex environments over a six-month engagement. Key Responsibilities Conduct comprehensive threat modelling and risk assessments on diverse IT … Knowledge of secure design principles and architecture reviews. Strong background in cybersecurity, ideally with exposure to telecoms environments. Background in operational security (Intelligence, Threat Hunting or RedTeam) Familiarity with threat modelling frameworks, (MITRE ATT&CK, STRIDE, PASTA etc) Ability to drive work to tight timescales and deadlines. Ability to work independently and manage priorities in a More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Experis
Overview We are seeking a highly skilled contractor to perform threat modelling and assessment activities across complex IT and telecommunications infrastructure. This role will be part of a small team whose function will be to identify risks across multiple and complex environments over a six-month engagement. Key Responsibilities Conduct comprehensive threat modelling and risk assessments on diverse IT … Knowledge of secure design principles and architecture reviews. Strong background in cybersecurity, ideally with exposure to telecoms environments. Background in operational security (Intelligence, Threat Hunting or RedTeam) Familiarity with threat modelling frameworks, (MITRE ATT&CK, STRIDE, PASTA etc) Ability to drive work to tight timescales and deadlines. Ability to work independently and manage priorities in a More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Hays Technology
We are seeking a highly skilled contractor to perform threat modelling and assessment activities across complex IT and telecommunications infrastructure. This role will be part of a small team whose function will be to identify risks across multiple and complex environments over a six-month engagement. Key Responsibilities: * Conduct comprehensive threat modelling and risk assessments on diverse IT and … Knowledge of secure design principles and architecture reviews. * Strong background in cybersecurity, ideally with exposure to telecoms environments. * Background in operational security (Intelligence, Threat Hunting or RedTeam) * Familiarity with threat modelling frameworks, (MITRE ATT&CK, STRIDE, PASTA etc) * Ability to drive work to tight timescales and deadlines. * Ability to work independently and manage priorities in a More ❯