ArcSight) Ability to perform log analysis across network, host, application, and cloud sources Understanding of malware behaviour, attack vectors, and common threat actor techniques Familiarity with MITREATT&CK, incident handling frameworks (NIST, SANS) Experience with alert investigation, root-cause analysis, and writing clear incident reports Ability to use EDR tools (CrowdStrike, Carbon Black, SentinelOne More ❯
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
City of London, London, United Kingdom Hybrid/Remote Options
RiverSafe
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
mitigations Key Skills & Experience: Hands-on experience with Palo Alto Cortex XSOAR or other SOAR platforms Strong knowledge of threat detection and response engineering Familiarity with MITREATT&CK framework Proficiency in Python for automation and integration development Experience with query languages (KQL or similar) Understanding of REST APIs and ability to develop and consume More ❯
mitigations Key Skills & Experience: Hands-on experience with Palo Alto Cortex XSOAR or other SOAR platforms Strong knowledge of threat detection and response engineering Familiarity with MITREATT&CK framework Proficiency in Python for automation and integration development Experience with query languages (KQL or similar) Understanding of REST APIs and ability to develop and consume More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI More ❯
New Malden, England, United Kingdom Hybrid/Remote Options
Northrop Grumman UK
MOD standards, including DEFSTAN 05-139 and cyber security assessment DEFSTAN 05-138. Knowledge of NIST CSF. Familiarity with ISA 62443. Threat modelling experience, including MitreATT&CK, DEF3ND, and EMB3D. OT/ICS Certification and/or experience. Cyber Security Risk Management. Vulnerability/Patch/Update Management. Security clearance: You must be More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Digital Waffle
tooling, methodology, and lab development Required Skills & Experience 3+ years' experience in red teaming, offensive security, or advanced penetration testing Strong knowledge of attacker frameworks (e.g., MITREATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound, Metasploit etc.) Hands-on experience with Active Directory More ❯
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
analysis tools. Familiarity with scripting languages (Python, Bash, PowerShell). Experience with cloud security monitoring (AWS, Azure, GCP). Knowledge of frameworks such as NIST and MITREATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and More ❯
analysis tools. Familiarity with scripting languages (Python, Bash, PowerShell). Experience with cloud security monitoring (AWS, Azure, GCP). Knowledge of frameworks such as NIST and MITREATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and More ❯
analysis tools. Familiarity with scripting languages (Python, Bash, PowerShell). Experience with cloud security monitoring (AWS, Azure, GCP). Knowledge of frameworks such as NIST and MITREATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and More ❯
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯
East London, London, United Kingdom Hybrid/Remote Options
RiverSafe
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯
City of London, London, United Kingdom Hybrid/Remote Options
RiverSafe
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯
Central London / West End, London, United Kingdom Hybrid/Remote Options
RiverSafe
KQL queries, where efficiencies can be gained, best practices and how to build detection logic Highly proficient in Splunk to at least Power User level Good understanding of MitreAttack framework and experience of referencing and building content to the framework. Familiar with GitHub technologies and CI/CD practices. Good enterprise level understanding of Windows and Linux More ❯