proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITREATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and analytical … Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITREATT&CK framework and its application in threat hunting. Strong analytical and problem-solving skills with a keen eye for detail. Ability to think like an adversary and More ❯
Peterborough, Cambridgeshire, UK Hybrid / WFH Options
Sanderson
proactively searching for and identifying threat actors that have evaded traditional security defences. This role requires a deep understanding of attacker tactics, techniques, and procedures (TTPs), MITREATT&CK Framework, cyber kill chain as well as the ability to analyse large datasets to uncover hidden threats. The ideal candidate will be a creative and analytical … Splunk, QRadar), EDR (e.g., CrowdStrike, SentinelOne) and threat intelligence platforms. Strong scripting skills in at least one language (e.g., Python, PowerShell). Solid understanding of the MITREATT&CK framework and its application in threat hunting. Strong analytical and problem-solving skills with a keen eye for detail. Ability to think like an adversary and More ❯
Procient with Python, Git/GitHub and developing security tooling integrations and automations Hands-on experience with Splunk Cloud, Enterprise Security, and SOAR Deep understanding of MITREATT&CK and how to apply it practically Familiarity with offensive security concepts, attacker tradecraft or incident response Excellent technical writing and documentation skills Comfortable presenting to technical More ❯
processes and procedures and train the SOC team on how to follow them efficiently and effectively Design, develop and deliver Sentinel solutions to clients Use the MITREATT&CK cybersecurity knowledge base to enable the necessary steps to take to help predict an adversarys behaviour and next move, and quickly and effectively respond to an More ❯
emulation, bypassing modern defenses, and helping Fortune 500 clients improve their cyber resilience. What Youll Do: Plan and execute full-scope red team engagements (TIBER-style, MITREATT&CK aligned) Perform focused penetration tests on web applications, mobile apps (iOS/Android), APIs, and backend services , as well as traditional network/cloud infrastructure and More ❯
CCT, or equivalent) Experience conducting security build reviews across common operating systems (e.g. Windows, Linux) Scripting or programming experience (e.g. Python, PowerShell, or Bash) Knowledge of MITREATT&CK, TTPs, and adversary simulation techniques Awareness of broader threat environments and current industry trends What Youll Get: Competitive salary (up to 60,000, depending on experience More ❯
or C) Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them Familiarity with adversary emulation frameworks and MITREATT&CK Exposure to social engineering or physical red teaming is a strong bonus A calm, pragmatic communicator who can write clearly and explain technical risk to a More ❯