hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. * Expertise in threat cyber security frameworks such as MITREATT&CK and Cyber Kill Chains. * Strong analytical and problem-solving skills, with an investigative mindset to identify security threats. * Experience with malware More ❯
hands-on experience with SIEM, EDR, IDS/IPS, and forensic analysis tools. Expertise in threat cyber security frameworks such as MITREATT&CK and Cyber Kill Chains. Strong analytical and problem-solving skills, with an investigative mindset to identify security threats. Experience with malware More ❯
System Administration/Network Administration/DevOps). Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITREATT&CK, etc.) Experience with common industry SIEM and vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. More ❯
with security tools like LogRhythm, Qualys, SCCM, Intune, Microsoft 365, AD, and enterprise anti-malware Technical knowledge in network segmentation, firewalls, MitreAtt&ck, Windows, Linux, and Mac, with experience in NIST standards and frameworks About You Bring strong analytical, problem-solving, and interpersonal skills More ❯
Linux and open-source experience. Technical expertise with SIEM, SOAR, EDR, and OT protocols Familiar with SCADA/ICS environments and MITREATT&CK framework. Skilled in incident response, threat hunting, SLA management, and executive communication. Preferred Qualifications Degree in Computer Science, InfoSec, or related More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intaso
Linux and open-source experience. Technical expertise with SIEM, SOAR, EDR, and OT protocols Familiar with SCADA/ICS environments and MITREATT&CK framework. Skilled in incident response, threat hunting, SLA management, and executive communication. Preferred Qualifications Degree in Computer Science, InfoSec, or related More ❯
to demonstrate it: Security Detection and Monitoring Incident Response Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITREATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel More ❯
with ISO2071 Vulnerability Management and Scanning tools; Tenable, Rapid7 or Qualys Good understanding of attacker tactics, techniques and procedures Experience using MitreATT&CK framework Strong communication skills Excellent analytical and problem-solving skills Essential Qualifications: Cybersecurity relevant certification from CompTia , SANS, GIAC or ISC2 More ❯
for cyber incident response and investigations. Understanding of best practices (NPCC, NIST, ISO17025) in evidence handling, systems, and tools. Knowledge of MITREATT&CK, Cyber Kill Chain, network topology, and EDR solutions. Expertise in multiple operating systems (Microsoft, Linux), cloud services (Microsoft 365, Azure, AWS More ❯
positives. Supporting Sentinel Workbooks, Alerts, and Playbooks through advanced KQL use. Deep understanding of incident response, threat intelligence and adversary techniques (MITREATT&CK framework). Strong knowledge of cloud and hybrid security, particularly within Azure. Additional Requirements: Must hold or be eligible to achieve More ❯
or more major SIEM platforms (e.g. Splunk, Sentinel etc.) Deep understanding of log ingestion, parsing, normalisation and enrichment Strong grasp of MITREATT&CK framework, threat detection and alert logic Solid scripting/automation skills (e.g., Python, PowerShell, Bash) Experience with cloud logging and monitoring More ❯
or more major SIEM platforms (e.g. Splunk, Sentinel etc.) Deep understanding of log ingestion, parsing, normalisation and enrichment Strong grasp of MITREATT&CK framework, threat detection and alert logic Solid scripting/automation skills (e.g., Python, PowerShell, Bash) Experience with cloud logging and monitoring More ❯
a Security Operations Centre (SoC), Network Operations Centre (NoC). Strong understanding of Incident Response processes and methodologies and experience with MITREATT&CK framework to map and analyse threats. Knowledge of Endpoint Detection and Response (EDR) platforms. Familiarity with threat hunting techniques and processes. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Goodman Masson
or within a SOC/NOC environment Strong knowledge of Microsoft Defender, EDR, and network architecture Understanding of security frameworks (e.g., MITREATT&CK, NIST, ISO 27001) Excellent communication and teamwork skills Relevant certifications (e.g., Sec+, OSCP, CISA) are a plus In our company values More ❯
security engineers to improve their skills and effectiveness. PREFERRED QUALIFICATIONS • BS or MS in a STEM related field. Understanding of the MitreATT&CK framework and knowledge of host and network telemetry data (e.g., process lists, application logs, NetFlow). • Have awareness and understanding of More ❯
an Intermediate level. Exposure to application security testing (source code review, threat modeling, security testing). Understanding of OWASP, CVSS, the MITREATT&CK framework, and the software development lifecycle (SLDC). What is it like to work here? Outstanding - you've probably already got More ❯
at least one modern language such as Java, Go, TypeScript, Python, Rust and security code review. PREFERRED QUALIFICATIONS Understanding of the MitreATT&CK framework and knowledge of host and network telemetry data (e.g., process lists, application logs, NetFlow). Have awareness and understanding of More ❯
an Intermediate level. Exposure to application security testing (source code review, threat modeling, security testing). Understanding of OWASP, CVSS, the MITREATT&CK framework, and the software development lifecycle (SLDC). What is it like to work here? Outstanding - you've probably already got More ❯
coaching junior security engineers to improve their skills and effectiveness. BS or MS in a STEM related field. Understanding of the MitreATT&CK framework and knowledge of host and network telemetry data (e.g., process lists, application logs, NetFlow). Have awareness and understanding of More ❯
considered for this role, you will come from a CTI background with a focus on Tactical and Operational work. Experience with MITREATT&CK and TTP mapping would be highly desirable, coupled with a flare for strong communication and reporting skills for stakeholders/senior More ❯
in GCP - essential •Strong knowledge of security architecture principles, frameworks, and best practices •Experience working with threat modeling methodologies such as MITREATT&CK, STRIDE, PASTA etc. •Overall experience in Cybersecurity: 5+ years •Security practices encompassing authentication, authorization, logging/monitoring, encryption, infrastructure security, and More ❯
in GCP - essential •Strong knowledge of security architecture principles, frameworks, and best practices •Experience working with threat modeling methodologies such as MITREATT&CK, STRIDE, PASTA etc. •Overall experience in Cybersecurity: 5+ years •Security practices encompassing authentication, authorization, logging/monitoring, encryption, infrastructure security, and More ❯