London, South East, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
2nd line or similar). Strong hands-on experience in threat investigation, log analysis, and remediation . Good understanding of common security frameworks and practices (e.g., MITREATT&CK, NIST, ISO 27001). Familiarity with a range of security tools and platforms – experience with Microsoft Sentinel is desirable but not essential. Excellent communication skills – able More ❯
OPA policies). Integrate real-time threat detection via SIEM (Splunk/Elastic) with HPC telemetry and anomaly hunting. Lead Cyber Security exercises adapted to HPC (MITREATT&CK for defence systems). Automate secure IaC (Ansible, Terraform) for air-gapped or hybrid HPC deployments. Support NCSC audits to maintain IL5/IL6 equivalency for More ❯
scripting (e.g., Python, Bash, PowerShell) Experience creating SIEM rules or detection logic Exposure to cloud environments and related attack vectors Knowledge of threat hunting methods and MITREATT&CK Interest or experience in cross-functional collaboration (e.g., Threat Intel, Red Teams More ❯
scripting (e.g., Python, Bash, PowerShell) Experience creating SIEM rules or detection logic Exposure to cloud environments and related attack vectors Knowledge of threat hunting methods and MITREATT&CK Interest or experience in cross-functional collaboration (e.g., Threat Intel, Red Teams More ❯
experience in Cyber Threat Intelligence (CTI), preferably in financial services Proven ability to analyze, interpret, and report on cyber threats with business impact assessments. Familiarity with MITREATT&CK, threat actor TTPs, and threat modeling frameworks. Experience monitoring global threat landscapes and geopolitical risks. Excellent written and verbal communication skills, with the ability to simplify More ❯
City of London, London, United Kingdom Hybrid / WFH Options
RiverSafe
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
mitigations Key Skills & Experience: Hands-on experience with Palo Alto Cortex XSOAR or other SOAR platforms Strong knowledge of threat detection and response engineering Familiarity with MITREATT&CK framework Proficiency in Python for automation and integration development Experience with query languages (KQL or similar) Understanding of REST APIs and ability to develop and consume More ❯
mitigations Key Skills & Experience: Hands-on experience with Palo Alto Cortex XSOAR or other SOAR platforms Strong knowledge of threat detection and response engineering Familiarity with MITREATT&CK framework Proficiency in Python for automation and integration development Experience with query languages (KQL or similar) Understanding of REST APIs and ability to develop and consume More ❯
do it with a dev team, not just in theory. Vulnerability and risk management – and how to avoid both being reduced to spreadsheets. Frameworks like NIST, MITREATT&CK, Cyber Kill Chain, and compliance stuff like PCI-DSS. SIEMs, WAFs, DLPs, EDRs, and all the other acronym-heavy tools you’ve learned to assess critically. More ❯
forensic investigations, financial crime or compliance setting. Proven knowledge and technical computer forensics experience for cyber incident response and investigations. Thorough understanding of best practice procedures (MITREATT&CK framework, NPCC, NIST, SANS etc.) evidence handling, computer systems and tools of the trade Expert understanding of multiple operating systems, particularly Microsoft and Linux infrastructure and More ❯
Advanced Investigation and Escalated Response o Perform in-depth investigations using correlated data from all available tooling. o Reconstruct attack chains and identify root causes using MITREATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and Threat Analysis o Investigate indicators of compromise using commercial and open-source threat intelligence. … and recommending follow-up actions when threats are confirmed. • Threat Hunting o Lead and participate in threat hunts using hypothesis-driven approaches mapped to TTPs and MITREATT&CK. o Leverage telemetry and queries in tooling to identify suspicious indicators not surfaced through existing detection logic. o Document hunting activities, findings, and detection coverage gaps to support More ❯
AWS security controls and cloud-native security services Proficient in coding/scripting for automation, alert enrichment, and custom detections Familiarity with adversary TTPs and the MITREATT&CK framework Experience with endpoint forensics, malware analysis, and security event correlation Hands-on experience with SIEM and SOAR platforms Solid understanding of operating system internals (macOS More ❯
Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Russell Taylor Group Ltd
tailored mitigation strategies. You'll lead and execute advanced penetration testing, red teaming, and adversary simulation exercises within OT/ICS environments, leveraging frameworks such as MITREATT&CK for ICS and modelling using Bow-Tie Analysis to proactively identify and exploit vulnerabilities. You'll conduct vulnerability assessments and administrative audits on client computer systems More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI More ❯
New Malden, England, United Kingdom Hybrid / WFH Options
Northrop Grumman UK
MOD standards, including DEFSTAN 05-139 and cyber security assessment DEFSTAN 05-138. Knowledge of NIST CSF. Familiarity with ISA 62443. Threat modelling experience, including MitreATT&CK, DEF3ND, and EMB3D. OT/ICS Certification and/or experience. Cyber Security Risk Management. Vulnerability/Patch/Update Management. Security clearance: You must be More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
tooling, methodology, and lab development Required Skills & Experience 3+ years' experience in red teaming, offensive security, or advanced penetration testing Strong knowledge of attacker frameworks (e.g., MITREATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound, Metasploit etc.) Hands-on experience with Active Directory More ❯
planning, and execution of sophisticated Red Team engagements simulating advanced persistent threats across global enterprise environments Develop and refine Tactics, Techniques, and Procedures (TTPs) aligned with MITREATT&CK to challenge and validate detection and response mechanisms Conduct advanced adversary emulation, lateral movement, privilege escalation, and persistence operations in diverse environments Reverse engineer proof-of More ❯
for business units to digest Your skills and experiences An understanding of threat modelling frameworks and processes e.g. PASTA, OWASP Threat Dragon, DREAD, STRIDE-LM, OCTAVE, MITREATT&CK An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007 Knowledge of security control (and More ❯
re looking for Significant experience (10 years) in security operations, detection engineering, or incident response Deep understanding of attacker techniques, detection methodologies, and response frameworks like MITREATT&CK Comfortable working in cloud-native environments (especially AWS) with a focus on building or integrating security tooling Hands-on experience with SIEMs and log pipelines Experience More ❯
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
Addition+
environments, and cybersecurity operations. Hands-on experience with tools such as SIEM, DLP, endpoint protection, and network monitoring. Knowledge of frameworks including ISO27001, GDPR, NIS2, and MITREATT&CK. Skilled in networking fundamentals — firewalls, VPNs, routers, LANs, and intrusion detection. Relevant certifications such as SC-200 or AZ-500 (CISSP/CISM/CRISC advantageous). Confident More ❯
Swindon, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
and digital assets. Key Responsibilities Develop and maintain security architecture for service mesh and containerised environments. Conduct risk assessments and implement mitigation strategies. Create threat models aligned with MITREATTACK & STRIDE frameworks. Recommend controls and enforce best practices for APIs, microservices, and data flows. Design and review secure API gateways using IBM DataPower. Implement mTLS, RBAC, and zero … in financial services (PCI compliance). Hands-on experience with IBM DataPower, OAuth 2.0, JWT, TLS, WS-Security, and encryption standards. Previous experience developing bespoke threat models using MITREATTACK & STRIDE. Ability to design secure architectures for hybrid/multi-cloud environments. Knowledge of zero-trust security models and microservices security. Ability to assess security aspects of technical More ❯