practices. • Good knowledge of cyber threat landscape, current affairs and geopolitics, including threat groups and how to apply this knowledge within an operational environment. • Understands the MITREATT&CK Framework, Threat Intelligence Platforms and the coordination of Advanced Threat Protection (ATP) and tactics, techniques and procedures (TTPs) to support Cyber Operations. • Knowledge of user behaviour … Knowledge, Skills and Qualifications The role holder will have: • An understanding of threat modelling frameworks and processes e.g. PASTA, OWASP Threat Dragon, DREAD, STRIDE-LM, OCTAVE, MITREATT&CK. • Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. • An understanding of risk management frameworks e.g. NIST, FAIR, Orange … Breach and Attack Simulation or experience of working within an Active Defence discipline. Experience looking for: • All internal based projects. Backlog of tasks to work through. • MitreATT&CK framework used a lot • Research and understand the tech stacks • Understanding of risk management • Conduct gap analysis • Industry experience or industry-based certifications could be useful More ❯
Kingston Upon Thames, Surrey, United Kingdom Hybrid / WFH Options
Unilever
red team automation Detection Engineering Collaboration : Ability to translate offensive findings into detection logic and partner with SOC teams to improve alerting and response. Threat Modelling & MITREATT&CK : Strong understanding of attacker TTPs and ability to map findings to frameworks like MITREATT&CK and the Cyber Kill Chain. … red/purple teaming, adversary emulation, and vulnerability exploitation. - Proficiency with tools such as Cobalt Strike, Metasploit, Burp Suite, BloodHound, and custom scripting. - Strong understanding of MITREATT&CK, cyber kill chain, and threat-informed defense. - Experience integrating offensive security into CI/CD pipelines and cloud-native environments. - Relevant certifications (e.g., OSCP, OSCE, CRTO More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Electus Recruitment
Line Management. Maintain, improve and develop team knowledge of SOC tools, security operations and triage. Analyse and improve detection rules and use cases in line with MitreAtt&ck and threat-informed defence. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Represent the SOC within Partners meetings. Ability … in Security Operations Centre. People management experience to help develop Analysts and lead careers. Demonstrable experience of using Microsoft Sentinel and Splunk. Knowledge and experience with MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Good understanding of networking principles including TCP … with QRadar. Overview Position SOC Shift Lead Permanent Location Hemel Hempstead Salary - From £58K to £65K dependant on experience Keywords: SOC, Security Operations Centre, Sentinel, Splunk, MitreAtt&ck, SIEM, QRadar Only apply for this role if you currently hold the specific Government Security Clearance or are eligible for Government Security Clearance. Due to the More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Electus Recruitment Solutions
Line Management. Maintain, improve and develop team knowledge of SOC tools, security operations and triage. Analyse and improve detection rules and use cases in line with MitreAtt&ck and threat-informed defence. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Represent the SOC within Partners meetings. Ability … in Security Operations Centre. People management experience to help develop Analysts and lead careers. Demonstrable experience of using Microsoft Sentinel and Splunk. Knowledge and experience with MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Good understanding of networking principles including TCP … with QRadar. Overview Position – SOC Shift Lead – Permanent Location – Hemel Hempstead Salary - From £58K to £65K dependant on experience Keywords: SOC, Security Operations Centre, Sentinel, Splunk, MitreAtt&ck, SIEM, QRadar Only apply for this role if you currently hold the specific Government Security Clearance or are eligible for Government Security Clearance.Due to the nature More ❯
coordinate incident response activities. Collaborate with threat intelligence teams to enhance detection logic. Threat Modelling & Use Case Development Lead threat modelling exercises using frameworks such as MITREATT&CK, STRIDE, and Cyber Kill Chain. Translate threat models into actionable detection use cases and SIEM rules. Prioritise detection engineering based on business risk and impact. Reporting … SPL, AQL. Scripting experience with Python or PowerShell for automation. Deep understanding of threat detection, incident response, and the cyber kill chain. Familiarity with frameworks including MITREATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerability management, and penetration testing principles. Knowledge of ITIL processes (Incident More ❯
Lead incident response activities and collaborate with threat intelligence teams Enrich detection logic with contextual threat data Threat Modelling & Use Case Development Conduct threat modelling using MITREATT&CK, STRIDE, or Kill Chain frameworks Translate models into actionable SIEM use cases and detection rules Prioritize engineering efforts based on risk and business impact Reporting & Collaboration … query languages (KQL, SPL, AQL) Scripting skills (Python, PowerShell) for automation and enrichment Deep knowledge of threat detection, incident response, and cyber kill chain Familiarity with MITREATT&CK, NIST, and CIS frameworks Understanding of network traffic flows and vulnerability management Exposure to ethical hacking and penetration testing Knowledge of ITIL disciplines (Incident, Problem, Change More ❯
Penwortham, Lancashire, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
of the current threat landscape, the TTPs frequently employed in those attacks and how we can investigate and mitigate these. - Knowledge and demonstrable experience of the MITREATT&CK framework. - Good knowledge of enterprise computing technologies. Skills: - Understanding of enterprise networking and computing - Knowledge of Python 3 programming language - Demonstrable experience in using SOAR tooling … ability to obtain UK Government security clearance to SC - Relevant industry and vendor qualifications such as CISSP, CISM, CompTIA security+ - Cyber security framework knowledge such as MITREATT&CK Qualifications: Relevant IT degree or business degree or equivalent experience PREFERRED For more information please contact Lauren Morley at JAM Recruitment or click apply. More ❯
Preston, Lancashire, North West, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
of the current threat landscape, the TTPs frequently employed in those attacks and how we can investigate and mitigate these. - Knowledge and demonstrable experience of the MITREATT&CK framework. - Good knowledge of enterprise computing technologies. Skills: - Understanding of enterprise networking and computing - Knowledge of Python 3 programming language - Demonstrable experience in using SOAR tooling … ability to obtain UK Government security clearance to SC - Relevant industry and vendor qualifications such as CISSP, CISM, CompTIA security+ - Cyber security framework knowledge such as MITREATT&CK Qualifications: Relevant IT degree or business degree or equivalent experience PREFERRED For more information please contact Lauren Morley at JAM Recruitment or click apply. More ❯
simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITREATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack surface assessments, and adversary emulation plans Present high-quality threat briefings, risk assessments … Intelligence Platforms), SIEM tools, and threat data enrichment solutions Practical exposure to Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITREATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria
Line Management. Maintain, improve and develop team knowledge of SOC tools, security operations and triage. Analyse and improve detection rules and use cases in line with MitreAtt&ck and threat-informed defence. Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. Represent the SOC within Partners meetings. Ability … in Security Operations Centre. People management experience to help develop Analysts and lead careers. Demonstrable experience of using Microsoft Sentinel and Splunk. Knowledge and experience with MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Good understanding of networking principles including TCP More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
QinetiQ Limited
risk exposure to cyber security, in support of operational and business planning activity across a range of different domains or sectors using established frameworks (e.g. NIST, MITREATT&CK, UK Government) Identify mitigations for cyber risk in a given business or operational scenario and threat environment Support development of cyber security risk cases in a … years of experience in security vulnerability, risk, audit & compliance Understand relevant NIST frameworks and ISO27001 standards and how to apply in practice Knowledge of MITREATT&CK Essential qualifications for the Cyber Security Risk Consultant: We value difference and we don't have a fixed idea when it comes to background or education, provided you More ❯
of Microsoft Defender suite (for Endpoint, Identity, Cloud, etc) Ideally, knowledge of AWS security stack would be including GuardDuty, CloudWatch and SecurityHub Familiarity with industry frameworks: MITREATT&CK, NIST, CIS benchmark, PCI-DSS Excellent incident responder with a passion for problem-solving Strong sense of ownership, able to independently drive engineering projects Always learning More ❯
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Synergize Consulting Limited
Knowledge of information assurance standards and frameworks including CIS, NIST, ISO 27001, Cyber Essentials/Essentials Plus, GDPR. Knowledge of threat cyber security frameworks such as MITREATT&CK, Kill Chain and NIST CSF 2.0. The ideal candidate will combine strong technical expertise with a solid understanding of global events and their influence on the More ❯
frameworks and attack simulations Identify vulnerabilities and help prioritise remediation efforts Collaborate with internal teams to embed cyber security best practices Apply industry standards such as MITREATT&CK, NIST, OWASP, STRIDE, PASTA Produce strategic risk and threat reports for senior stakeholders Stay ahead of the curve with threat intelligence and geopolitical awareness Skills Experience More ❯
matter knowledge to identify and implement appropriate solutions. Experience in managing and maintaining high quality standards and meeting time requirements. Working knowledge and application of the MITREATT&CK Framework. Possess one of more of the following professional information security certifications: GCTI, CPTIA, CRTIA or another equivalent. An understanding of the security principles outlined in More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
experience in Security Operations and Incident Response You have experience of performing analysis with SIEM technologies, Splunk preferred You have experience with proactive threat hunting using MITREATT&CK or similar frameworks You have a deep understanding of security appliances/tools such as host-based and network-based IDS/IPS, WAF, EDR You More ❯
presence; able to communicate technology concepts at all levels. Demonstrated ability to establish lasting customer relationships. Framework fluency: familiarity with NIST CSF, ISO 27001, CIS Controls, MITREATT&CK and core domains (EDR/SIEM/IAM/Zero Trust; cloud security across AWS/Azure/GCP). Solution experience: selling MDR/XDR More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
and recommended mitigation strategies. What you will bring : Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations. Knowledge and experience with MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria
and recommended mitigation strategies. What you will bring : Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations. Knowledge and experience with MitreAtt&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Advanced Investigation and Escalated Response o Perform in-depth investigations using correlated data from all available tooling. o Reconstruct attack chains and identify root causes using MITREATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and Threat Analysis o Investigate indicators of compromise using commercial and open-source threat intelligence. … and recommending follow-up actions when threats are confirmed. • Threat Hunting o Lead and participate in threat hunts using hypothesis-driven approaches mapped to TTPs and MITREATT&CK. o Leverage telemetry and queries in tooling to identify suspicious indicators not surfaced through existing detection logic. o Document hunting activities, findings, and detection coverage gaps to support More ❯
standards, guidance, and processes Skillset & requirements Solid background in penetration testing, ethical hacking, or red teaming engagements Strong knowledge of frameworks such as OWASP Top 10 , MITREATT&CK , and risk-scoring methods like CVSS Practical use of tools such as Burp Suite, Nmap, Metasploit, Wireshark, Kali Linux Proficiency with scripting languages (e.g., Python, Bash More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Investigo
development of security policies and best practices Required Skills & Experience: Strong background in penetration testing, ethical hacking, or red teaming Deep knowledge of OWASP Top 10, MITREATT&CK, and CVSS scoring systems Proficiency with tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux Scripting experience with Python, Bash, or PowerShell Understanding of More ❯
Advanced Investigation and Escalated Response o Perform in-depth investigations using correlated data from all available tooling. o Reconstruct attack chains and identify root causes using MITREATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and Threat Analysis o Investigate indicators of compromise using commercial and open-source threat intelligence. … and recommending follow-up actions when threats are confirmed. • Threat Hunting o Lead and participate in threat hunts using hypothesis-driven approaches mapped to TTPs and MITREATT&CK. o Leverage telemetry and queries in tooling to identify suspicious indicators not surfaced through existing detection logic. o Document hunting activities, findings, and detection coverage gaps to support More ❯