City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
data enrichment tools. Experience using Breach and Attack Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITREATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and … activities by providing contextual intelligence and working alongside hunt team members. Conduct threat modeling of threat actors, including their capabilities, motivations, and potential impact. Leverage the MITREATT&CK framework to map threat actor behaviors and support detection engineering. Develop and maintain threat profiles, attack surface assessments, and adversary emulation plans. Collaborate with global stakeholders More ❯
North London, London, United Kingdom Hybrid/Remote Options
Secure Recruitment Ltd
of Threat Intelligence Practices & Ability to Translate Complex Data Strong Background in Threat & Vulnerability Intelligence, including familiarity with Threat Actor Tracking, Vulnerability Databases & Frameworks such as MITREATT&CK Hands-On Experience with Honeypot Data & Log Analysis, ideally within ELK Stack Proficiency in Python Programming with Ability to Automate Workflows, Parse Data & Build Customised Tooling … Both Internal Stakeholders & External Searches: Threat Analyst/Threat Intelligence Analyst/Senior Threat Intelligence Analyst/Senior Vulnerability Analyst/Threat Hunting/Adversarial/MITREATT&CK/APT Analyst/Cyber Threat Analyst At SECURE , We Value Attitude & Aptitude Over Certifications. If you possess the drive and relevant experience to deliver tangible More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Futureheads Recruitment | B Corp™
context and collaborating with hunt teams to refine hypotheses. Conduct threat actor modelling, focusing on motivations, capabilities, and potential business impact. Map threat behaviours using the MITREATT&CK framework to support detection engineering. Develop and maintain threat profiles, adversary emulation plans, and attack surface insights. Deliver high quality briefings, reports, and threat assessments to … or penetration testing. Proven ability to collaborate with Red Teams, Blue Teams, and SOC functions. Strong understanding of adversary TTPs, threat modelling, and frameworks such as MITREATT&CK. Experience with threat intelligence platforms, SIEM systems, and enrichment tools. Familiarity with Breach and Attack Simulation platforms. Hands on experience with penetration testing tools such as Metasploit, Burp More ❯
context and collaborating with hunt teams to refine hypotheses. Conduct threat actor modelling, focusing on motivations, capabilities, and potential business impact. Map threat behaviours using the MITREATT&CK framework to support detection engineering. Develop and maintain threat profiles, adversary emulation plans, and attack surface insights. Deliver high quality briefings, reports, and threat assessments to … or penetration testing. Proven ability to collaborate with Red Teams, Blue Teams, and SOC functions. Strong understanding of adversary TTPs, threat modelling, and frameworks such as MITREATT&CK. Experience with threat intelligence platforms, SIEM systems, and enrichment tools. Familiarity with Breach and Attack Simulation platforms. Hands on experience with penetration testing tools such as Metasploit, Burp More ❯
City, London, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
Science, or equivalent experience. Proven experience within a SOC (Security Operations Centre) or NOC (Network Operations Centre). Strong understanding of incident response methodologies and the MITREATT&CK framework. Experience using SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. Technical expertise in Microsoft Defender, EDR (Endpoint Detection and Response), and network architecture. More ❯
London, Fleet Street, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
Science, or equivalent experience. Proven experience within a SOC (Security Operations Centre) or NOC (Network Operations Centre). Strong understanding of incident response methodologies and the MITREATT&CK framework. Experience using SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. Technical expertise in Microsoft Defender, EDR (Endpoint Detection and Response), and network architecture. More ❯
Write and fine-tune Kusto Query Language (KQL) queries to analyse and visualise raw security data. Integrate third-party tools (firewalls, IAM, telemetry) into Sentinel. Use MITREATT&CK to anticipate and counter adversarial activity. Apply cost-optimisation principles (data tiering, filtering). Collaborate with security architects to improve internal policies and ISO 27001 alignment. More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Constant Recruitment Ltd
Write and fine-tune Kusto Query Language (KQL) queries to analyse and visualise raw security data. Integrate third-party tools (firewalls, IAM, telemetry) into Sentinel. Use MITREATT&CK to anticipate and counter adversarial activity. Apply cost-optimisation principles (data tiering, filtering). Collaborate with security architects to improve internal policies and ISO 27001 alignment. More ❯
Enterprise Security). Strong experience in SPL (Search Processing Language) and log analysis. Deep understanding of security monitoring, incident response, and threat detection methodologies. Familiarity with MITREATT&CK, cyber kill chain, and common attack vectors (phishing, malware, insider threats). Experience with EDR tools (e.g., CrowdStrike, SentinelOne), firewalls, IDS/IPS, and SOAR platforms. More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Bonhill Partners
Enterprise Security). Strong experience in SPL (Search Processing Language) and log analysis. Deep understanding of security monitoring, incident response, and threat detection methodologies. Familiarity with MITREATT&CK, cyber kill chain, and common attack vectors (phishing, malware, insider threats). Experience with EDR tools (e.g., CrowdStrike, SentinelOne), firewalls, IDS/IPS, and SOAR platforms. More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
VIQU IT Recruitment
2nd line or similar). Strong hands-on experience in threat investigation, log analysis, and remediation . Good understanding of common security frameworks and practices (e.g., MITREATT&CK, NIST, ISO 27001). Familiarity with a range of security tools and platforms – experience with Microsoft Sentinel is desirable but not essential. Excellent communication skills – able More ❯
City of London, London, United Kingdom Hybrid/Remote Options
RiverSafe
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
New Malden, England, United Kingdom Hybrid/Remote Options
Northrop Grumman UK
MOD standards, including DEFSTAN 05-139 and cyber security assessment DEFSTAN 05-138. Knowledge of NIST CSF. Familiarity with ISA 62443. Threat modelling experience, including MitreATT&CK, DEF3ND, and EMB3D. OT/ICS Certification and/or experience. Cyber Security Risk Management. Vulnerability/Patch/Update Management. Security clearance: You must be More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Digital Waffle
tooling, methodology, and lab development Required Skills & Experience 3+ years' experience in red teaming, offensive security, or advanced penetration testing Strong knowledge of attacker frameworks (e.g., MITREATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound, Metasploit etc.) Hands-on experience with Active Directory More ❯
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯
East London, London, United Kingdom Hybrid/Remote Options
RiverSafe
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯
City of London, London, United Kingdom Hybrid/Remote Options
RiverSafe
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯
Central London / West End, London, United Kingdom Hybrid/Remote Options
RiverSafe
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯