tools Hands-on experience with vulnerability assessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITREATT&CK framework Familiarity with regulatory requirements such as GDPR, HIPAA, PCI DSS, and industry standards like NIST Cybersecurity Framework. More ❯
tools Hands-on experience with vulnerability assessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITREATT&CK framework Familiarity with regulatory requirements such as GDPR, HIPAA, PCI DSS, and industry standards like NIST Cybersecurity Framework. More ❯
tools Hands-on experience with vulnerability assessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITREATT&CK framework Familiarity with regulatory requirements such as GDPR, HIPAA, PCI DSS, and industry standards like NIST Cybersecurity Framework. More ❯
london (city of london), south east england, united kingdom
RiverSafe
tools Hands-on experience with vulnerability assessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITREATT&CK framework Familiarity with regulatory requirements such as GDPR, HIPAA, PCI DSS, and industry standards like NIST Cybersecurity Framework. More ❯
mitigations Key Skills & Experience: Hands-on experience with Palo Alto Cortex XSOAR or other SOAR platforms Strong knowledge of threat detection and response engineering Familiarity with MITREATT&CK framework Proficiency in Python for automation and integration development Experience with query languages (KQL or similar) Understanding of REST APIs and ability to develop and consume More ❯
mitigations Key Skills & Experience: Hands-on experience with Palo Alto Cortex XSOAR or other SOAR platforms Strong knowledge of threat detection and response engineering Familiarity with MITREATT&CK framework Proficiency in Python for automation and integration development Experience with query languages (KQL or similar) Understanding of REST APIs and ability to develop and consume More ❯
mitigations Key Skills & Experience: Hands-on experience with Palo Alto Cortex XSOAR or other SOAR platforms Strong knowledge of threat detection and response engineering Familiarity with MITREATT&CK framework Proficiency in Python for automation and integration development Experience with query languages (KQL or similar) Understanding of REST APIs and ability to develop and consume More ❯
MODBUS, OPC, DNP3 Experience securing cross-domain IT/OT interfaces and real-time systems Proven ability to design secure networks: switching, routing, firewalls Familiarity with MITREATT&CK for ICS , Bow-Tie Analysis, and adversary simulation Hands-on experience with tools like Nessus, Nmap, Metasploit , fuzzing tools Knowledge of compliance frameworks: NIST More ❯
MODBUS, OPC, DNP3 Experience securing cross-domain IT/OT interfaces and real-time systems Proven ability to design secure networks: switching, routing, firewalls Familiarity with MITREATT&CK for ICS , Bow-Tie Analysis, and adversary simulation Hands-on experience with tools like Nessus, Nmap, Metasploit , fuzzing tools Knowledge of compliance frameworks: NIST More ❯
do it with a dev team, not just in theory. Vulnerability and risk management – and how to avoid both being reduced to spreadsheets. Frameworks like NIST, MITREATT&CK, Cyber Kill Chain, and compliance stuff like PCI-DSS. SIEMs, WAFs, DLPs, EDRs, and all the other acronym-heavy tools you’ve learned to assess critically. More ❯
do it with a dev team, not just in theory. Vulnerability and risk management – and how to avoid both being reduced to spreadsheets. Frameworks like NIST, MITREATT&CK, Cyber Kill Chain, and compliance stuff like PCI-DSS. SIEMs, WAFs, DLPs, EDRs, and all the other acronym-heavy tools you've learned to assess critically. More ❯
forensic investigations, financial crime or compliance setting. Proven knowledge and technical computer forensics experience for cyber incident response and investigations. Thorough understanding of best practice procedures (MITREATT&CK framework, NPCC, NIST, SANS etc.) evidence handling, computer systems and tools of the trade Expert understanding of multiple operating systems, particularly Microsoft and Linux infrastructure and More ❯
Advanced Investigation and Escalated Response o Perform in-depth investigations using correlated data from all available tooling. o Reconstruct attack chains and identify root causes using MITREATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and Threat Analysis o Investigate indicators of compromise using commercial and open-source threat intelligence. … and recommending follow-up actions when threats are confirmed. • Threat Hunting o Lead and participate in threat hunts using hypothesis-driven approaches mapped to TTPs and MITREATT&CK. o Leverage telemetry and queries in tooling to identify suspicious indicators not surfaced through existing detection logic. o Document hunting activities, findings, and detection coverage gaps to support More ❯
AWS security controls and cloud-native security services Proficient in coding/scripting for automation, alert enrichment, and custom detections Familiarity with adversary TTPs and the MITREATT&CK framework Experience with endpoint forensics, malware analysis, and security event correlation Hands-on experience with SIEM and SOAR platforms Solid understanding of operating system internals (macOS More ❯
Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Russell Taylor Group Ltd
tailored mitigation strategies. You'll lead and execute advanced penetration testing, red teaming, and adversary simulation exercises within OT/ICS environments, leveraging frameworks such as MITREATT&CK for ICS and modelling using Bow-Tie Analysis to proactively identify and exploit vulnerabilities. You'll conduct vulnerability assessments and administrative audits on client computer systems More ❯
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
RiverSafe
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
RiverSafe
threat intel teams to refine detections. Skills: Proven experience in SIEM content development & threat detection. Strong expertise with Microsoft Sentinel, Azure & Logic Apps. Deep knowledge of MITREATT&CK, attacker TTPs & security principles. Strong analytical & problem-solving skills. More ❯
CCT, or equivalent) Experience conducting security build reviews across common operating systems (e.g. Windows, Linux) Scripting or programming experience (e.g. Python, PowerShell, or Bash) Knowledge of MITREATT&CK, TTPs, and adversary simulation techniques Awareness of broader threat environments and current industry trends What Youll Get: Competitive salary (up to 60,000, depending on experience More ❯
CCT, or equivalent) Experience conducting security build reviews across common operating systems (e.g. Windows, Linux) Scripting or programming experience (e.g. Python, PowerShell, or Bash) Knowledge of MITREATT&CK, TTPs, and adversary simulation techniques Awareness of broader threat environments and current industry trends What You’ll Get: Competitive salary (up to £60,000, depending on More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
tooling, methodology, and lab development Required Skills & Experience 3+ years' experience in red teaming, offensive security, or advanced penetration testing Strong knowledge of attacker frameworks (e.g., MITREATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound, Metasploit etc.) Hands-on experience with Active Directory More ❯
for business units to digest Your skills and experiences An understanding of threat modelling frameworks and processes e.g. PASTA, OWASP Threat Dragon, DREAD, STRIDE-LM, OCTAVE, MITREATT&CK An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007 Knowledge of security control (and More ❯