enhance security detection content primarily for the Splunk SIEM, to enable the detection of threats across diverse platforms (e.g. cloud, endpoints, and networks) · Use frameworks like MITREATT&CK to map detection rules and maximise threat coverage · Use analytical platforms to query high volume datasets to identify trends and spot unusual behaviours, indicative of malicious More ❯
Excellent communication skills and the ability to work effectively within a collaborative SOC team Desirable Skills Experience with incident documentation and reporting Familiarity with security frameworks (MITREATT&CK, NIST, ISO 27001) Ability to adapt quickly to new tools, threats, and operational priorities Any relevant certifications (e.g., Security+, CySA+, Microsoft SC-series, GIAC More ❯
Staffordshire, West Midlands, United Kingdom Hybrid/Remote Options
Russell Taylor Group Ltd
and executing security assessments and incident response exercises in OT/ICS environments Developing and implementing attack scenarios and detection use cases using frameworks such as MITREATT&CK for ICS Performing vulnerability assessments, threat modelling and attack path analysis to identify and address security weaknesses Supporting risk assessments and compliance against standards such as More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
VIQU IT Recruitment
2nd line or similar). Strong hands-on experience in threat investigation, log analysis, and remediation . Good understanding of common security frameworks and practices (e.g., MITREATT&CK, NIST, ISO 27001). Familiarity with a range of security tools and platforms – experience with Microsoft Sentinel is desirable but not essential. Excellent communication skills – able More ❯
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
OpenTelemetry, and scripting. Security Use Cases & Threat Detection Build and maintain SIEM use cases, alerts, and dashboards for threat detection. Map detection rules to frameworks like MITREATT&CK, STRIDE, and NIST CSF. Collaborate with SOC teams to refine incident response workflows. Governance & Compliance Align SIEM architecture with Secure by Design and Zero Trust principles. More ❯
5+ years in penetration testing or offensive security. Strong hands-on experience with tools like Burp, Nmap, Metasploit, Cobalt Strike, Nessus, etc. Deep knowledge of OWASP, MITREATT&CK, and modern attack techniques. Scripting experience (Python, PowerShell, etc.). Industry certifications such as OSCP, OSCE, CREST CRT/CCT, GPEN. Bonus Points For: Cloud & container More ❯
5+ years in penetration testing or offensive security. Strong hands-on experience with tools like Burp, Nmap, Metasploit, Cobalt Strike, Nessus, etc. Deep knowledge of OWASP, MITREATT&CK, and modern attack techniques. Scripting experience (Python, PowerShell, etc.). Industry certifications such as OSCP, OSCE, CREST CRT/CCT, GPEN. Bonus Points For: Cloud & container More ❯
London, England, United Kingdom Hybrid/Remote Options
Control Risks
forensic investigations, financial crime or compliance setting. Proven knowledge and technical computer forensics experience for cyber incident response and investigations. Thorough understanding of best practice procedures (MITREATT&CK framework, NPCC, NIST, SANS etc.) evidence handling, computer systems and tools of the trade Expert understanding of multiple operating systems, particularly Microsoft and Linux infrastructure and More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid/Remote Options
Experian Ltd
developing security reports, trends, and metrics analysis. Experience with the application of some of the following frameworks - SANS, NIST 800-61, CVSS, CIS, OSSTM, ISO 27001, MITREATT&CK, PCI, HIPAA, GDPR or similar. Experience with cloud security practices Experience with business and technical requirements analysis, business process modeling/mapping, methodology development, and data More ❯
Stone, England, United Kingdom Hybrid/Remote Options
Capula
You’ll Do: Lead red team activities: penetration testing, threat emulation, resilience validation Support blue team functions: architecture, compliance, monitoring, incident response Develop attack scenarios using MITREATT&CK for ICS Conduct risk assessments and support standards like IEC 62443 & NIST SP800-82 Collaborate with stakeholders and contribute to training, reporting, and continuous improvement ✅ What More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid/Remote Options
Adecco
.- Knowledge of security compliance, including access controls, authentication, and encryption using Elastic Security features.- Ability to create, test, and optimise detection rules based on the MITREATT&CK Framework.- Experience in performance tuning with Elasticsearch and Logstash, including monitoring Logstash pipelines.- Proficiency in using Kibana for data visualisation and monitoring. Advantageous:- Familiarity with offensive More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid/Remote Options
Circle Group
high-volume, real-world attack telemetry. 2+ years' experience specifically in a Threat Intelligence function. Familiarity with threat actor tracking, vulnerability databases, and frameworks such as MITREATT&CK . Strong data analysis skills, ideally using the ELK stack (OpenSearch, Logstash, Kibana) . Intermediate proficiency in Python , capable of automating workflows and developing custom analysis More ❯
environments (SCADA, PLCs, RTUs) and IT/OT interfaces Nice to have: GICSP, OSCP/GPEN/CREST CRT, DFIR exposure, offensive tools experience (Nessus, Metasploit, MITREATT&CK for ICS), and physical security assessments aligned with NIS/NPSA Why this role? 80% remote, 20% on client sites across the UK Work with a More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Randstad Digital
experience in threat modelling complex infrastructures. Strong background in operational security (e.g., Threat Hunting, Red Team, or Intelligence). Familiarity with threat modelling frameworks (STRIDE, PASTA, MITREATT&CK, etc.). Knowledge of secure design principles and architecture reviews. Exposure to telecoms environments is highly desirable. Ability to work independently and meet tight deadlines. If More ❯
Manchester, North West, United Kingdom Hybrid/Remote Options
Randstad Digital
of the Elastic Stack (ELK) , with a focus on Elastic Security . Detection & Compliance Expert: Proven ability to engineer high-fidelity detection rules based on the MITREATT&CK Framework , alongside implementing essential security controls like RBAC, encryption , and data governance to ensure regulatory compliance. Performance & Tuning Specialist: Deep technical skill in fine-tuning Elasticsearch More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Randstad Digital
of the Elastic Stack (ELK) , with a focus on Elastic Security . Detection & Compliance Expert: Proven ability to engineer high-fidelity detection rules based on the MITREATT&CK Framework , alongside implementing essential security controls like RBAC, encryption , and data governance to ensure regulatory compliance. Performance & Tuning Specialist: Deep technical skill in fine-tuning Elasticsearch More ❯
Manchester, Lancashire, England, United Kingdom Hybrid/Remote Options
Randstad Technologies
of the Elastic Stack (ELK) , with a focus on Elastic Security . Detection & Compliance Expert: Proven ability to engineer high-fidelity detection rules based on the MITREATT&CK Framework , alongside implementing essential security controls like RBAC, encryption , and data governance to ensure regulatory compliance. Performance & Tuning Specialist: Deep technical skill in fine-tuning Elasticsearch More ❯
reviews. Strong background in cybersecurity, ideally with exposure to telecoms environments. Background in operational security (Intelligence, Threat Hunting or Red Team) Familiarity with threat modelling frameworks, (MITREATT&CK, STRIDE, PASTA etc) Ability to drive work to tight timescales and deadlines. Ability to work independently and manage priorities in a dynamic environment. All profiles will More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Experis
reviews. Strong background in cybersecurity, ideally with exposure to telecoms environments. Background in operational security (Intelligence, Threat Hunting or Red Team) Familiarity with threat modelling frameworks, (MITREATT&CK, STRIDE, PASTA etc) Ability to drive work to tight timescales and deadlines. Ability to work independently and manage priorities in a dynamic environment. All profiles will More ❯
reviews. * Strong background in cybersecurity, ideally with exposure to telecoms environments. * Background in operational security (Intelligence, Threat Hunting or Red Team) * Familiarity with threat modelling frameworks, (MITREATT&CK, STRIDE, PASTA etc) * Ability to drive work to tight timescales and deadlines. * Ability to work independently and manage priorities in a dynamic environment. What you need More ❯
Employment Type: Permanent
Salary: Up to £600.0 per day + £600 p/d Inside IR35
Birmingham, West Midlands, West Midlands (County), United Kingdom
Hays Technology
reviews. * Strong background in cybersecurity, ideally with exposure to telecoms environments. * Background in operational security (Intelligence, Threat Hunting or Red Team) * Familiarity with threat modelling frameworks, (MITREATT&CK, STRIDE, PASTA etc) * Ability to drive work to tight timescales and deadlines. * Ability to work independently and manage priorities in a dynamic environment. What you need More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Adecco
in cybersecurity, ideally with exposure to telecoms environments. Experience in operational security (Intelligence, Threat Hunting, or Red Team). Familiarity with threat modelling frameworks such as MITREATT&CK, STRIDE, or PASTA. Ability to drive work to tight timescales and meet deadlines. Demonstrated ability to work independently and manage priorities in a dynamic environment. If More ❯
with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITREATT&CK mapping for both technical and executive stakeholders. Contract Details: Duration: 6 months (with view to extend) Day Rate: Up to £500 per day (Inside IR35) Location More ❯
analysis tools. Familiarity with scripting languages (Python, Bash, PowerShell). Experience with cloud security monitoring (AWS, Azure, GCP). Knowledge of frameworks such as NIST and MITREATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and More ❯