Threat Intelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threat intelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest cybersecurity … penetration testing, and Breach & Attack Simulation (BAS) platforms. Key Responsibilities: Monitor and analyse global cyber threat landscapes, identifying threats, adversary tactics, and emerging risks Collaborate with RedTeam, Blue Team, and Penetration Testing specialists to integrate intelligence into Breach & Attack Simulation (BAS) scenarios Act as a point of contact between threat intelligence, Red/… incident response, providing context, attributions, and support as required Required Skills & Experience: Extensive experience in threat intelligence, cybersecurity operations, or penetration testing Proven ability to work collaboratively with Red/Blue teams and Security Operations Centres (SOC) Hands-on experience with TIPs (Threat Intelligence Platforms), SIEM tools, and threat data enrichment solutions Practical exposure to Breach & Attack Simulation More ❯
Threat Intelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threat intelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest cybersecurity … penetration testing, and Breach & Attack Simulation (BAS) platforms. Key Responsibilities: Monitor and analyse global cyber threat landscapes, identifying threats, adversary tactics, and emerging risks Collaborate with RedTeam, Blue Team, and Penetration Testing specialists to integrate intelligence into Breach & Attack Simulation (BAS) scenarios Act as a point of contact between threat intelligence, Red/… incident response, providing context, attributions, and support as required Required Skills & Experience: Extensive experience in threat intelligence, cybersecurity operations, or penetration testing Proven ability to work collaboratively with Red/Blue teams and Security Operations Centres (SOC) Hands-on experience with TIPs (Threat Intelligence Platforms), SIEM tools, and threat data enrichment solutions Practical exposure to Breach & Attack Simulation More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Investigo
Conduct manual and automated penetration tests on web applications, networks, APIs, and mobile platforms Identify, exploit, and document vulnerabilities, delivering detailed risk assessments Design and execute redteam exercises and threat simulations Work closely with development and infrastructure teams to remediate findings Produce comprehensive reports highlighting risks, impacts, and mitigation strategies Stay up to date on emerging … Support internal security awareness training and initiatives Contribute to the development of security policies and best practices Required Skills & Experience: Strong background in penetration testing, ethical hacking, or redteaming Deep knowledge of OWASP Top 10, MITRE ATT&CK, and CVSS scoring systems Proficiency with tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux Scripting experience More ❯
manual and automated penetration tests on web applications, networks, APIs, and mobile platforms Identify, exploit, and document security vulnerabilities with detailed risk assessment Develop and execute redteam exercises and threat simulations Collaborate with development and infrastructure teams to remediate findings Prepare comprehensive reports outlining findings, impact, and mitigation strategies Stay current with latest attack vectors, tools … Assist in security awareness training and internal education efforts Contribute to security policies and best practices development Required Skills & Qualifications Proven experience in penetration testing, ethical hacking, or redteaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python More ❯
manual and automated penetration tests on web applications, networks, APIs, and mobile platforms Identify, exploit, and document security vulnerabilities with detailed risk assessment Develop and execute redteam exercises and threat simulations Collaborate with development and infrastructure teams to remediate findings Prepare comprehensive reports outlining findings, impact, and mitigation strategies Stay current with latest attack vectors, tools … Assist in security awareness training and internal education efforts Contribute to security policies and best practices development Required Skills & Qualifications Proven experience in penetration testing, ethical hacking, or redteaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python More ❯
out penetration tests (both automated and manual) on applications, networks, APIs, and mobile systems. Detect and exploit weaknesses, providing clear risk-based assessments Design and run redteam scenarios and adversary simulations Collaborate with engineering and infrastructure teams to remediate vulnerabilities Write thorough technical and executive-level reports detailing risks, business impact, and remediation options Keep pace … internal awareness sessions and training around cyber threats Feed into the development of security standards, guidance, and processes Skillset & requirements Solid background in penetration testing, ethical hacking, or redteaming engagements Strong knowledge of frameworks such as OWASP Top 10 , MITRE ATT&CK , and risk-scoring methods like CVSS Practical use of tools such as Burp Suite, Nmap More ❯
OWASP, STRIDE, PASTA Produce strategic risk and threat reports for senior stakeholders Stay ahead of the curve with threat intelligence and geopolitical awareness Skills Experience with threat modelling, redteaming, vulnerability management or active defence Knowledge of TTPs, threat actor motivations, and cyber frameworks (e.g. NIST CSF, FAIR, ISO 27001) Ability to interpret and design Data Flow Diagrams More ❯
industry tools to expedite containment, eradication, and recovery strategies that minimise business impact and protect network systems and customer data from cyber threats. Dimensions People – Work collaboratively in a team of around 14 cyber security operations staff. Mentor Level 1 and Level 2 SOC Analysts, providing guidance and training. Suppliers – Regular interaction with technical resources from outsourced Managed Security … and SOAR solutions, IAM, and DLP tools (e.g. FortiSIEM, Q-Radar, Microsoft Secure Gateway, Darktrace, Microsoft Defender, Sentinel). Experience developing incident response playbooks, SOAR workflows, red-team exercises, and tabletop simulations. Experience in investigating advanced intrusions, such as targeted ransomware or state-sponsored attacks. Summary: My client are looking for an experienced Incident Response (CSIRT)/ More ❯
Threat Intelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threat intelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest click apply for full job details More ❯
job training and attending training programmes as appropriate, and support/provide mentorship to others in the team. • Supports the Threat Modelling Lead when required, particularly on forecasting future team operations. • Is a subject matter expert (SME) on emerging threats and will work on complex issues as a fully contributory member of the Threat Modelling Team, with limited … to security threats. • Performs continuous evaluation of the organisation's estate, assessing function capability, and suggesting improvements where necessary. • Identifying security gaps, and building attack simulations to support Purple Team engagements by illustrating potential attack patterns to prioritise future remediation efforts. • Produces reports detailing key threats and risks to the organisation at a strategic level for business units to … boundaries and is able to create one using information provided about an environment. • Familiar with the functions of relevant authorities e.g. NCSC, NPSA. • An understanding of Vulnerability Management, RedTeaming, and Breach and Attack Simulation or experience of working within an Active Defence discipline. Experience looking for: • All internal based projects. Backlog of tasks to work through. • Mitre More ❯
London (Hybrid, 23 days in office) | Rate : Market About the Role Our client, a leading global organization, is looking for a skilled Internal Pentester to join a leading security team in London. This contract role is perfect for someone experienced in penetration testing across networks, systems, web applications, APIs, and cloud environments, who can identify vulnerabilities, simulate attacks, and … with development, cloud, and infrastructure teams on remediation. Keep up to date with latest vulnerabilities, exploit techniques, and pentesting tools. Essential Skills & Experience 37+ years in penetration testing, redteaming, or offensive security. Strong application security knowledge (OWASP Top 10, API security). Proven end-to-end pentest experience: internal, external, cloud, AD, web apps, APIs. Familiarity with … Pacu Nice to Have OSCP, OSWA, OSEP, OSCE, CRTP, CRTE, GPEN, GXPN, eCPPT or equivalent certifications. Cloud security certifications (AWS/Azure). Advanced AD/cloud/redteaming trainings (SANS, HackTheBox Pro Labs). Strong analytical, problem-solving, troubleshooting, and customer engagement skills. Experience in agile, cross-functional teams, documenting findings, and supporting remediation cycles. If More ❯
to security threats. Performs continuous evaluation of the organisation's estate, assessing function capability, and suggesting improvements where necessary. Identifying security gaps, and building attack simulations to support Purple Team engagements by illustrating potential attack patterns to prioritise future remediation efforts. Produces reports detailing key threats and risks to the organisation at a strategic level for business units to … boundaries and is able to create one using information provided about an environment. Familiar with the functions of relevant authorities e.g. NCSC, NPSA. An understanding of Vulnerability Management, RedTeaming, and Breach and Attack Simulation or experience of working within an Active Defence discipline. Security Requirements: SC This role will require you to hold or be eligible to More ❯