coaching junior security engineers to improve their skills and effectiveness. BS or MS in a STEM related field. Understanding of the MitreATT&CK framework and knowledge of host and network telemetry data (e.g., process lists, application logs, NetFlow). Have awareness and understanding of More ❯
/MacOS, network communication protocols, virtual environments, cloud environments, mobile OS (Android/iOS), and containerized platforms. Understanding of OWASP, the MITREATT&CK framework, and the software development lifecycle (SDLC). More ❯
and provide actionable insights. Engage with and manage stakeholders throughout the incident lifecycle. Lead the threat-hunting process, using frameworks like MITREATT&CK to proactively identify potential threats. Ideal Candidate: Extensive experience in all aspects of Incident Response, with hands-on involvement in P1 More ❯
or red teaming A strong understanding of offensive security methodology and vulnerability frameworks such as the OWASP Testing Guide, TIBER EU, MITREATT&CK, PTES, or others An ability to analyze root causes and deliver technological recommendations to our clients Excellent oral and written communication More ❯
an Intermediate level. Exposure to application security testing (source code review, threat modeling, security testing). Understanding of OWASP, CVSS, the MITREATT&CK framework, and the software development lifecycle (SLDC). What is it like to work here? Outstanding - you've probably already got More ❯
an Intermediate level. Exposure to application security testing (source code review, threat modeling, security testing). Understanding of OWASP, CVSS, the MITREATT&CK framework, and the software development lifecycle (SLDC). What is it like to work here? Outstanding - you've probably already got More ❯
an Intermediate level. Exposure to application security testing (source code review, threat modeling, security testing). Understanding of OWASP, CVSS, the MITREATT&CK framework, and the software development lifecycle (SLDC). What is it like to work here? Outstanding - you've probably already got More ❯
Mandatory Skills : Working experience with driving design decisions using Threat Modeling (STRIDE/MITREATT&CK) Practical experience in hardening GCP Services Practical experience with a CNAPP/CSPM tool Experience with formal documentation of cloud controls (Threat Model Reports, Policy Summary Pages More ❯
and exhibit good verbal, written and presentation skills. Experience of working within key Cyber Security principles and standards (ISO 27001, NIST, Cyber Essentials, MITRE). [i] Experience working in a customer-facing role desirable. You should have experience in managing team driven workloads. Demonstrable experience driving continuous improvement More ❯
Kent, Broomfield, United Kingdom Hybrid / WFH Options
Tilt Recruitment
CD pipelines, and tools like Veracode, Trivy, and Checkov. Familiarity with standards such as CIS, NIST, GDPR, ISO and frameworks like MITREATT&CK. Strong programming/scripting skills (Python, Go, Groovy) with a clean, secure coding ethos. Ideal Candidate Profile: Expert in Azure cloud security services More ❯
West Midlands, Bilbrook, Staffordshire, United Kingdom Hybrid / WFH Options
Tilt Recruitment
CD pipelines, and tools like Veracode, Trivy, and Checkov. Familiarity with standards such as CIS, NIST, GDPR, ISO and frameworks like MITREATT&CK. Strong programming/scripting skills (Python, Go, Groovy) with a clean, secure coding ethos. Ideal Candidate Profile: Expert in Azure cloud security services More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Skye Business Solutions
security tools. Strong understanding of the threat landscape, common attack vectors, and threat actor tactics, techniques, procedures and tools. Experience with frameworks like MITRE ATTACK. Proficiency in data analysis and scripting languages (e.g., PowerShell, Python). Excellent problem-solving skills, attention to detail and quality delivery. Strong communication More ❯
for Payments System Upgrades. Conduct thorough risk assessments to identify potential security threats and develop mitigation strategies. Create comprehensive threat models aligning with MITREATTACK/STRIDE frameworks. Recommend the best controls & mitigations to potential vulnerabilities Ensure the design comply with relevant regulations and standards, including GDPR, SOX … enterprise (e.g., PCI compliance). Proven experience working previously for financial organizations. Previous relevant experience in developing bespoke Threat Models leveraging frameworks like MITREATTACK & STRIDE. Proficiency in assessing the Identity & Access Management functions & associated risks during Acquisition process. Be able to understand and assess the security elements More ❯