Cloud, GCP Security Command Center) Detection engineering using KQL, particularly with Microsoft Sentinel Familiarity with Kubernetes, Docker, and securing containerised services Understanding of Zero Trust Architecture, MITREATT&CK, and cloud threat models Experience with SOAR platforms and automation pipelines Scripting or programming skills (Python, PowerShell, Bash, etc.) Interviews are moving fast — apply now or More ❯
Cloud, GCP Security Command Center) Detection engineering using KQL, particularly with Microsoft Sentinel Familiarity with Kubernetes, Docker, and securing containerised services Understanding of Zero Trust Architecture, MITREATT&CK, and cloud threat models Experience with SOAR platforms and automation pipelines Scripting or programming skills (Python, PowerShell, Bash, etc.) Interviews are moving fast — apply now or More ❯
disrupt threats before attackers achieve their objectives. The ideal candidate must possess demonstrated expertise in log analysis, network traffic investigation, and in-depth knowledge of the MITREATT&CK framework and Incident Response framework. Key responsibilities: Part of the global IT security team working closely with the US SOC teams. Performs a combination of duties More ❯
Defender, Carbon Black, CrowdStrike, or FireEye Confident with KQL, especially in Microsoft Sentinel Strong background in GCP Experience securing Kubernetes, Docker, and containerised workloads Familiar with MITREATT&CK, SOAR, and writing detections as code Comfortable scripting in Python, PowerShell, or Bash Start Date: ASAP Interviews are progressing quickly — get in touch to find out More ❯
Defender, Carbon Black, CrowdStrike, or FireEye Confident with KQL, especially in Microsoft Sentinel Strong background in GCP Experience securing Kubernetes, Docker, and containerised workloads Familiar with MITREATT&CK, SOAR, and writing detections as code Comfortable scripting in Python, PowerShell, or Bash Start Date: ASAP Interviews are progressing quickly — get in touch to find out More ❯
Defender, Carbon Black, CrowdStrike, or FireEye Confident with KQL, especially in Microsoft Sentinel Strong background in GCP Experience securing Kubernetes, Docker, and containerised workloads Familiar with MITREATT&CK, SOAR, and writing detections as code Comfortable scripting in Python, PowerShell, or Bash Start Date: ASAP Interviews are progressing quickly — get in touch to find out More ❯
Defender, Carbon Black, CrowdStrike, or FireEye Confident with KQL, especially in Microsoft Sentinel Strong background in GCP Experience securing Kubernetes, Docker, and containerised workloads Familiar with MITREATT&CK, SOAR, and writing detections as code Comfortable scripting in Python, PowerShell, or Bash Start Date: ASAP Interviews are progressing quickly — get in touch to find out More ❯
Greater Manchester, England, United Kingdom Hybrid / WFH Options
NearTech Search
working with just 1 day/week in the office Projects that span both UK and US markets Exposure to best-in-class tools and frameworks (MITREATT&CK, OWASP) Supportive culture with a learning mindset and room to grow Involvement in the full security lifecycle from audits to implementation Opportunity to shape how cloud More ❯
network architecture. Substantial experience in a Security Operations Centre (SoC), Network Operations Centre (NoC). Strong understanding of Incident Response processes and methodologies and experience with MITREATT&CK framework to map and analyse threats. Knowledge of Endpoint Detection and Response (EDR) platforms. Familiarity with threat hunting techniques and processes. More ❯
documentation, including reports, analysis, and mitigation strategies. Qualifications and experience: Experience working in a Security Operations Centre. Managing Microsoft Sentinel and Splunk implementations. Knowledge of the MitreAtt&ck Framework. Understanding of client-server applications, web applications, databases, firewalls, VPNs, and AntiVirus products. Expertise in log data analysis and intrusion detection systems. Strong networking knowledge More ❯
of data security, governance, and controls (essential). Experience with cloud security solutions and modern threat modeling (preferred). Knowledge of security frameworks like NIST CSF, MitreATT&CK (essential). What You'll Get in Return: We offer a competitive salary and benefits, including: Company Pension Scheme Private Medical Insurance Group Income Protection Group More ❯
Alexander Mann Solutions - Public Sector Resourcing
Familiarity with tools such as SIEM, IDS/IPS, antivirus, and correlation platforms. . Knowledge of cyber security regulations and frameworks (eg GDPR, NIS, NCSC, ITIL, MITREATT&CK). . Understanding of National Cyber Security Centre incident response and information security processes and policies. Desirable: . Experience onboarding critical applications and services into SOC More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
National Grid plc
critical infrastructure. Proficiency with platforms such as Microsoft Defender for Endpoint, SentinelOne, Trellix, or other EDR solutions. Familiarity with SIEM tools and frameworks like NIST and MITREATT&CK. Knowledge of standards such as NERC CIP, CIS Benchmarks, NIST SP 800-82. Scripting and automation skills (PowerShell, Python, Bash). Understanding of cyber threats in the More ❯
Wolverhampton, West Midlands, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
DevSecOps, IaC (Terraform), CI/CD pipelines and tools like Veracode, Trivy and Checkov. Familiarity with standards such as CIS, NIST, GDPR, ISO and frameworks like MITREATT&CK. Strong programming/scripting skills (Python, Go, Groovy) with a clean, secure coding ethos. Microsoft Azure Security Engineer Associate or AWS equivalent is essential, along with Cyber Essentials More ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
DevSecOps, IaC (Terraform), CI/CD pipelines and tools like Veracode, Trivy and Checkov. Familiarity with standards such as CIS, NIST, GDPR, ISO and frameworks like MITREATT&CK. Strong programming/scripting skills (Python, Go, Groovy) with a clean, secure coding ethos. Microsoft Azure Security Engineer Associate or AWS equivalent is essential, along with Cyber Essentials More ❯
Gillingham, Brompton, Medway, Kent, United Kingdom Hybrid / WFH Options
Tilt Recruitment
DevSecOps, IaC (Terraform), CI/CD pipelines and tools like Veracode, Trivy and Checkov. Familiarity with standards such as CIS, NIST, GDPR, ISO and frameworks like MITREATT&CK. Strong programming/scripting skills (Python, Go, Groovy) with a clean, secure coding ethos. Microsoft Azure Security Engineer Associate or AWS equivalent is essential, along with Cyber Essentials More ❯
For: ️ Proven experience as a Cyber Threat Intelligence Specialist or in a similar threat analysis role ️ Strong knowledge of threat intelligence frameworks (e.g., STIX/TAXII, MITREATT&CK) and tools (e.g., SIEM, threat intelligence platforms) ️ Experience with threat hunting, incident response, and malware analysis ️ Familiarity with cyber threat actors, attack methodologies, and geopolitical threat More ❯
with security teams to remediate identified vulnerabilities. To be considered, you should have: 4+ years in a penetration testing position. Strong knowledge of OWASP Top 10, MITREATT&CK Framework, and common exploit techniques. Experience using tools such as Burp Suite, Metasploit, Kali Linux, Nmap, and Wireshark. Experience with cloud security testing, particularly in AWS More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Lawrence Harvey
custom query writing and dashboard development. Deep understanding of incident response, including network traffic analysis, PCAP investigation, and forensic techniques. Familiarity with attack frameworks such as MITREATT&CK, and ability to recognise TTPs in real-world data. Demonstrated experience analysing logs and alerts across varied data sources (network, endpoint, IDS/IPS). If More ❯
custom query writing and dashboard development. Deep understanding of incident response, including network traffic analysis, PCAP investigation, and forensic techniques. Familiarity with attack frameworks such as MITREATT&CK, and ability to recognise TTPs in real-world data. Demonstrated experience analysing logs and alerts across varied data sources (network, endpoint, IDS/IPS). If More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Lawrence Harvey
custom query writing and dashboard development. Deep understanding of incident response, including network traffic analysis, PCAP investigation, and forensic techniques. Familiarity with attack frameworks such as MITREATT&CK, and ability to recognise TTPs in real-world data. Demonstrated experience analysing logs and alerts across varied data sources (network, endpoint, IDS/IPS). If More ❯
investigation to collaborating with the Head of SOC to contain and resolve threats. Ideally you will have experience with Splunk, threat detection and have worked with MITREATT&CK, preferably within a Financial Services firm. This role offers the chance to work in a fast-paced, global environment with opportunities to grow your technical and More ❯
investigation to collaborating with the Head of SOC to contain and resolve threats. Ideally you will have experience with Splunk, threat detection and have worked with MITREATT&CK, preferably within a Financial Services firm. This role offers the chance to work in a fast-paced, global environment with opportunities to grow your technical and More ❯
investigation to collaborating with the Head of SOC to contain and resolve threats. Ideally you will have experience with Splunk, threat detection and have worked with MITREATT&CK, preferably within a Financial Services firm. This role offers the chance to work in a fast-paced, global environment with opportunities to grow your technical and More ❯
Microsoft Security solutions such as: Microsoft Sentinel (SIEM) Defender for Endpoint, Office 365, or Identity Solid understanding of incident response processes and best practices. Familiarity with MITREATT&CK framework and common attacker techniques. Strong communication and leadership skills, with the ability to influence and guide both technical and non-technical stakeholders. Desirable: Experience with More ❯