Part-Time MITRE ATT&CK Jobs in the UK

11 of 11 Part-Time MITRE ATT&CK Jobs in the UK

Cyber Security Consultant

London, UK
Lorien
Welwyn Garden City Employment: Contract (3 months) Rate : 600/Day Inside THE ROLE To design, develop and maintain high-quality detection logic aligned with the MITRE ATT&CK framework. The role involves close collaboration with SOC analysts, incident responders and threat intelligence teams to develop high-impact, context-rich use cases across Windows, Linux … thinking and strong content development skills to ensure detections are both effective and operationally relevant. KEY RESPONSIBILITIES Design, develop, and maintain robust detection content aligned to MITRE ATT&CK and threat-led priorities. Build and optimise detection queries using KQL, applying efficiency and best practices in logic construction. Support the full detection engineering lifecycle, including … to optimise query performance and maintain clarity of logic. Demonstrated experience with detection-as-code practices using GitHub or similar version control platforms. Deep understanding of MITRE ATT&CK, threat actor TTPs, and translating them into detection use cases. Familiarity with enterprise logging, data onboarding, and schema normalisation. Working knowledge of Sentinel, Defender for Endpoint More ❯
Employment Type: Part-time
Posted:

Cyber Security Consultant

City of London, Greater London, UK
Lorien
Welwyn Garden City Employment: Contract (3 months) Rate : 600/Day Inside THE ROLE To design, develop and maintain high-quality detection logic aligned with the MITRE ATT&CK framework. The role involves close collaboration with SOC analysts, incident responders and threat intelligence teams to develop high-impact, context-rich use cases across Windows, Linux … thinking and strong content development skills to ensure detections are both effective and operationally relevant. KEY RESPONSIBILITIES Design, develop, and maintain robust detection content aligned to MITRE ATT&CK and threat-led priorities. Build and optimise detection queries using KQL, applying efficiency and best practices in logic construction. Support the full detection engineering lifecycle, including … to optimise query performance and maintain clarity of logic. Demonstrated experience with detection-as-code practices using GitHub or similar version control platforms. Deep understanding of MITRE ATT&CK, threat actor TTPs, and translating them into detection use cases. Familiarity with enterprise logging, data onboarding, and schema normalisation. Working knowledge of Sentinel, Defender for Endpoint More ❯
Employment Type: Part-time
Posted:

Cyber Security Threat Hunter

Edinburgh, UK
Hybrid / WFH Options
Sanderson
proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and analytical … Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and its application in threat hunting. Strong analytical and problem-solving skills with a keen eye for detail. Ability to think like an adversary and More ❯
Employment Type: Part-time
Posted:

Cyber Security Threat Hunter

Peterborough, Cambridgeshire, UK
Hybrid / WFH Options
Sanderson
proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITRE ATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and analytical … Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITRE ATT&CK framework and its application in threat hunting. Strong analytical and problem-solving skills with a keen eye for detail. Ability to think like an adversary and More ❯
Employment Type: Part-time
Posted:

Enhanced DV Cyber Security Lead

England, UK
83zero
incident response . Implement and manage identity and access management (IAM) solutions using SailPoint, OKTA, and BeyondTrust. Collaborate with internal teams to ensure compliance with NIST, MITRE ATT&CK, and ISO27001 frameworks. Provide mentoring, documentation, and knowledge transfer to junior engineers and SOC analysts. Liaise with external vendors, clients, and cross-functional teams to resolve More ❯
Employment Type: Part-time
Posted:

Senior Threat Detection & Response Engineer

Guernsey, UK
McNally Recruitment Ltd
Procient with Python, Git/GitHub and developing security tooling integrations and automations Hands-on experience with Splunk Cloud, Enterprise Security, and SOAR Deep understanding of MITRE ATT&CK and how to apply it practically Familiarity with offensive security concepts, attacker tradecraft or incident response Excellent technical writing and documentation skills Comfortable presenting to technical More ❯
Employment Type: Part-time
Posted:

Microsoft Sentinel Engineer

Guernsey, UK
MVW Technology
processes and procedures and train the SOC team on how to follow them efficiently and effectively Design, develop and deliver Sentinel solutions to clients Use the MITRE ATT&CK cybersecurity knowledge base to enable the necessary steps to take to help predict an adversarys behaviour and next move, and quickly and effectively respond to an More ❯
Employment Type: Part-time
Posted:

MS Purview and M365 Defender XDR SME

London, UK
Tata Consultancy Services
XDR, Purview, and Entra ID. Experience with scripting languages, particularly PowerShell, for automation and management. Familiarity with common cybersecurity frameworks and attack methodologies, such as the MITRE ATT&CK framework. Microsoft Certified: Security Operations Analyst Associate (SC-200; SC-300; SC-400). Certified Information Systems Security Professional (CISSP). Desirable skills/knowledge/ More ❯
Employment Type: Part-time
Posted:

Senior Penetration Tester (RED TEAM)

Guernsey, UK
Hybrid / WFH Options
BreachLock, Inc
emulation, bypassing modern defenses, and helping Fortune 500 clients improve their cyber resilience. What Youll Do: Plan and execute full-scope red team engagements (TIBER-style, MITRE ATT&CK aligned) Perform focused penetration tests on web applications, mobile apps (iOS/Android), APIs, and backend services , as well as traditional network/cloud infrastructure and More ❯
Employment Type: Part-time
Posted:

Penetration Tester

Guernsey, UK
Hybrid / WFH Options
Hamilton Barnes
CCT, or equivalent) Experience conducting security build reviews across common operating systems (e.g. Windows, Linux) Scripting or programming experience (e.g. Python, PowerShell, or Bash) Knowledge of MITRE ATT&CK, TTPs, and adversary simulation techniques Awareness of broader threat environments and current industry trends What Youll Get: Competitive salary (up to 60,000, depending on experience More ❯
Employment Type: Part-time
Posted:

Senior Red Team Operator

Guernsey, UK
Iceberg
or C) Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them Familiarity with adversary emulation frameworks and MITRE ATT&CK Exposure to social engineering or physical red teaming is a strong bonus A calm, pragmatic communicator who can write clearly and explain technical risk to a More ❯
Employment Type: Part-time
Posted:
MITRE ATT&CK
10th Percentile
£50,500
25th Percentile
£61,500
Median
£80,000
75th Percentile
£95,000
90th Percentile
£98,000