or C) Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them Familiarity with adversary emulation frameworks and MITREATT&CK Exposure to social engineering or physical red teaming is a strong bonus A calm, pragmatic communicator who can write clearly and explain technical risk to a More ❯
or C) Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them Familiarity with adversary emulation frameworks and MITREATT&CK Exposure to social engineering or physical red teaming is a strong bonus A calm, pragmatic communicator who can write clearly and explain technical risk to a More ❯
re looking for Significant experience (10 years) in security operations, detection engineering, or incident response Deep understanding of attacker techniques, detection methodologies, and response frameworks like MITREATT&CK Comfortable working in cloud-native environments (especially AWS) with a focus on building or integrating security tooling Hands-on experience with SIEMs and log pipelines Experience More ❯
re looking for Significant experience (10 years) in security operations, detection engineering, or incident response Deep understanding of attacker techniques, detection methodologies, and response frameworks like MITREATT&CK Comfortable working in cloud-native environments (especially AWS) with a focus on building or integrating security tooling Hands-on experience with SIEMs and log pipelines Experience More ❯
were looking for Significant experience (10 years) in security operations, detection engineering, or incident response Deep understanding of attacker techniques, detection methodologies, and response frameworks like MITREATT&CK Comfortable working in cloud-native environments (especially AWS) with a focus on building or integrating security tooling Hands-on experience with SIEMs and log pipelines Experience More ❯
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
london (city of london), south east england, united kingdom
Hamilton Barnes 🌳
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
across Azure, AWS, and GCP environments, ensuring comprehensive monitoring and detection coverage. Drive threat hunting activities and develop hypotheses based on attacker TTPs and frameworks like MITREATT&CK. Collaborate with incident response, engineering, and intelligence teams to contain and resolve security incidents. Support continuous improvement of detection strategies and mentor analysts to uplift overall team capability. More ❯
across Azure, AWS, and GCP environments, ensuring comprehensive monitoring and detection coverage. Drive threat hunting activities and develop hypotheses based on attacker TTPs and frameworks like MITREATT&CK. Collaborate with incident response, engineering, and intelligence teams to contain and resolve security incidents. Support continuous improvement of detection strategies and mentor analysts to uplift overall team capability. More ❯
across Azure, AWS, and GCP environments, ensuring comprehensive monitoring and detection coverage. Drive threat hunting activities and develop hypotheses based on attacker TTPs and frameworks like MITREATT&CK. Collaborate with incident response, engineering, and intelligence teams to contain and resolve security incidents. Support continuous improvement of detection strategies and mentor analysts to uplift overall team capability. More ❯
across Azure, AWS, and GCP environments, ensuring comprehensive monitoring and detection coverage. Drive threat hunting activities and develop hypotheses based on attacker TTPs and frameworks like MITREATT&CK. Collaborate with incident response, engineering, and intelligence teams to contain and resolve security incidents. Support continuous improvement of detection strategies and mentor analysts to uplift overall team capability. More ❯
london (city of london), south east england, united kingdom
Bestman Solutions
across Azure, AWS, and GCP environments, ensuring comprehensive monitoring and detection coverage. Drive threat hunting activities and develop hypotheses based on attacker TTPs and frameworks like MITREATT&CK. Collaborate with incident response, engineering, and intelligence teams to contain and resolve security incidents. Support continuous improvement of detection strategies and mentor analysts to uplift overall team capability. More ❯
across Azure, AWS, and GCP environments, ensuring comprehensive monitoring and detection coverage. Drive threat hunting activities and develop hypotheses based on attacker TTPs and frameworks like MITREATT&CK. Collaborate with incident response, engineering, and intelligence teams to contain and resolve security incidents. Support continuous improvement of detection strategies and mentor analysts to uplift overall team capability. More ❯
Amersham, Buckinghamshire, UK Hybrid / WFH Options
Addition+
environments, and cybersecurity operations. Hands-on experience with tools such as SIEM, DLP, endpoint protection, and network monitoring. Knowledge of frameworks including ISO27001, GDPR, NIS2, and MITREATT&CK. Skilled in networking fundamentals — firewalls, VPNs, routers, LANs, and intrusion detection. Relevant certifications such as SC-200 or AZ-500 (CISSP/CISM/CRISC advantageous). Confident More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
Addition+
environments, and cybersecurity operations. Hands-on experience with tools such as SIEM, DLP, endpoint protection, and network monitoring. Knowledge of frameworks including ISO27001, GDPR, NIS2, and MITREATT&CK. Skilled in networking fundamentals — firewalls, VPNs, routers, LANs, and intrusion detection. Relevant certifications such as SC-200 or AZ-500 (CISSP/CISM/CRISC advantageous). Confident More ❯
milton keynes, south east england, united kingdom Hybrid / WFH Options
Addition+
environments, and cybersecurity operations. Hands-on experience with tools such as SIEM, DLP, endpoint protection, and network monitoring. Knowledge of frameworks including ISO27001, GDPR, NIS2, and MITREATT&CK. Skilled in networking fundamentals firewalls, VPNs, routers, LANs, and intrusion detection. Relevant certifications such as SC-200 or AZ-500 (CISSP/CISM/CRISC advantageous). Confident More ❯
Experience in penetration testing across multiple domains. Working at a cyber team consulting team delivering CREST-aligned security services Strong knowledge of OWASP Top 10, PTES, MITREATT&CK. Proficiency in Linux/Windows and scripting (Python, PowerShell, Bash). Excellent communication and reporting skills. Certifications: ? CREST CPSA or CRT, OSCP (essential) ? OSEP, OSWE, GWAPT, GPEN, CHECK More ❯
Experience in penetration testing across multiple domains. Working at a cyber team consulting team delivering CREST-aligned security services Strong knowledge of OWASP Top 10, PTES, MITREATT&CK. Proficiency in Linux/Windows and scripting (Python, PowerShell, Bash). Excellent communication and reporting skills. Certifications: ? CREST CPSA or CRT, OSCP (essential) ? OSEP, OSWE, GWAPT, GPEN, CHECK More ❯
Swindon, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
and digital assets. Key Responsibilities Develop and maintain security architecture for service mesh and containerised environments. Conduct risk assessments and implement mitigation strategies. Create threat models aligned with MITREATTACK & STRIDE frameworks. Recommend controls and enforce best practices for APIs, microservices, and data flows. Design and review secure API gateways using IBM DataPower. Implement mTLS, RBAC, and zero … in financial services (PCI compliance). Hands-on experience with IBM DataPower, OAuth 2.0, JWT, TLS, WS-Security, and encryption standards. Previous experience developing bespoke threat models using MITREATTACK & STRIDE. Ability to design secure architectures for hybrid/multi-cloud environments. Knowledge of zero-trust security models and microservices security. Ability to assess security aspects of technical More ❯