infrastructure. Ideally, you'll bring experience or knowledge in the following areas: Familiarity with key security frameworks like NIST 800-53 , ISO 27001 , CIS Controls , and MITREATT&CK . Understanding of information risk management and how to align security controls with business needs. Hands-on experience with network infrastructure - including switches, routers, firewalls, VPNs More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Babcock
sufficient quality for distribution In-depth knowledge of the various techniques and frameworks used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITREATT&CK Development of new analytics and playbooks that result in creation of new detection rules/analytics Requirements Technical 3+ years' experience in Cyber Threat Intelligence, and More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
traffic, and endpoint telemetry Supporting containment and recovery efforts during active security incidents Continuously enhancing SOC capabilities, tooling, and detection rules using threat-informed approaches like MITREATT&CK Producing detailed incident reports and documentation for both technical and non-technical stakeholders Assisting with threat intelligence activities as needed Staying current on evolving threats, attack … will have Hands-on experience working in a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITREATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic understanding of enterprise security architecture More ❯
scalable applications using modern full-stack development tools and frameworks. · Collaborate with cybersecurity teams to build and enhance detection and mitigation systems based on frameworks like MITREATT&CK. · Develop and maintain data pipelines, APIs, dashboards, and visualization tools to support AI model insights. · Write clean, well-documented, and secure code using Python, C C#, or R. … Information Technology, or related field. · 3 years of experience in a cybersecurity operations or similar function. · Strong knowledge of cybersecurity principles, frameworks, and threat intelligence (e.g., MITREATT&CK). · Proficient in AI/ML technologies, including Natural Language Processing, Generative AI, and Machine Learning algorithms. · Experienced in full-stack development with proficiency in Python More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems (New)
off the cloud’ using Microsoft Graph API, app registrations, and managed identities. Ability to research and learn new tools and techniques quickly. Good understanding of the MITREATT&CK Framework. Strong knowledge of networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP). Experience in Intrusion Analysis on Windows Devices and Azure Cloud More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
Bupa UK
in threat management, vulnerability management, offensive security practices and security testing. Strong knowledge of common security vulnerabilities, attack vectors, and security testing frameworks, such as OWASP, MITREATT&CK, CVE/CVSS, and NIST SP 800-53. Experience of vulnerability scanning tools, penetration testing tools, and security testing frameworks (e.g., Nessus, Metasploit, Burp Suite More ❯
London, England, United Kingdom Hybrid / WFH Options
Sportradar
and root cause analyses for complex incidents. Experience with SIEM platforms, endpoint detection and response tools, and network traffic analysis. Strong understanding of attack frameworks (e.g. MITREATT&CK) and the ability to apply them to threat hunting and incident response. Experience creating detection rules, playbooks, and workflows to improve SOC detection and response efficiency. More ❯
or similar incident response frameworks. Proficient in log analysis across Windows, Linux, MacOS, network devices, and cloud environments. Understanding of attack frameworks such as MITREATT&CK, Lockheed Martin Kill Chain, or the Diamond Model. Comfortable with basic dynamic malware analysis and use of open-source tools (e.g. Velociraptor, Volatility, DFIR IRIS). Desirable Qualifications More ❯
certifications Knowledge of Active Directory, Cryptography, IAM, PKI, server hardening, SIEM, SOAR, and virtualization (VMware) Experience in pre-sales activities and supporting delivery collateral Familiarity with MITREATT&CK and ITIL frameworks Who we are: We’re a global business empowering local teams, undertaking exciting work that changes the world. Our portfolio spans consulting, applications More ❯
Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with MITREATT&CK Familiarity with ITIL Who we are: We're a business with a global reach that empowers local teams, and we undertake hugely exciting work that is More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
Tesco UK
/and trusted external stakeholders. Collaboration and Support • Supporting Security Operations, Threat Hunting, and engineering teams through prioritised intelligence requirements. • Aligning to cyber frameworks such as MITREATT&CK, Cyber Kill Chain, Pyramid of Pain, and Diamond Model to contextualise threats. Continuous Learning and Adaptation • Staying current on threat trends, tools, and techniques to ensure … query languages. • Experience of intelligence collection and processing techniques, including OSINT. • Exposure to Structured Analytic Techniques (like ACH) and quantitative methods. • Application of cyber frameworks like MITREATT&CK, Cyber Kill Chain, and Diamond Model in pursuit of producing high-quality intelligence. • Assisting with malware triage, including static and dynamic analysis, to identify and mitigate More ❯
to understand their security needs and provide tailored solutions Lead security assurance activities, including risk assessments, vulnerability assessments, penetration testing, and threat modelling techniques such as MITREATT&CK, STRIDE, DREAD, and PASTA Provide expert guidance on security controls and measures to protect cloud infrastructure and data Stay up-to-date with the latest security More ❯
CrowdStrike Falcon platform Scripting experience in Python, PowerShell, or Bash. Experience with REST APIs and JSON for tool integration. Working knowledge of incident response frameworks and MITREATT&CK. Strong problem-solving, critical thinking, and communication skills. Desirable Qualifications Experience with CI/CD for playbook development and version control (e.g., Git). Familiarity with other SOC More ❯
CrowdStrike Falcon platform Scripting experience in Python, PowerShell, or Bash. Experience with REST APIs and JSON for tool integration. Working knowledge of incident response frameworks and MITREATT&CK. Strong problem-solving, critical thinking, and communication skills. Desirable Qualifications Experience with CI/CD for playbook development and version control (e.g., Git). Familiarity with other SOC More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE
as use of Microsoft Graph API, app registrations and managed identities · Ability to quickly research and learn about new tools and techniques · Good working knowledge of MITREATT&CK Framework Good working knowledge of networking concepts & protocols (TCP/IP, UDP, DNS, DHCP, HTTP, etc.) · Intrusion Analysis on Windows Devices and Azure Cloud Architecture. · Relevant More ❯
while providing clear documentation, walkthroughs, and hints for our users. Additionally, the Cyber Security Content Analyst will map existing and new content to frameworks such as MITREATT&CK, NIST/NICE, and others, identify gaps in coverage, and assist in the development of new content to address those gaps. This individual will also monitor … our labs. Ensure all documentation is clear, concise, and user-friendly. Framework Mapping and Analysis: Map each lab to relevant vulnerabilities, techniques, and frameworks such as MITREATT&CK, NIST/NICE, OWASP Top 10, etc. Maintain a centralized database to track mappings and content alignment. Gap Analysis and Content Enhancement: Evaluate gaps between existing … Skills, knowledge, and experience points required to unlock the role of Cyber Security Content Analyst at Hack The Box Deep understanding of cybersecurity frameworks such as MITREATT&CK, NIST/NICE, OWASP Top 10, etc. Familiarity with threat intelligence platforms and feeds. Strong organizational and analytical skills, with attention to detail. Excellent knowledge of More ❯
Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITREATT&CK, and risk models to form hypotheses and validate them through structured hunts. Leverage Jupyter Notebooks and other tools to automate hunts, visualise results, and create reusable … have 3-5+ years of hands-on experience in Threat Hunting, Red Team, Blue Team, or Incident Response roles, with a deep understanding of the MITREATT&CK framework and a proven ability to detect and investigate advanced threats beyond signature-based solutions. Adept at leveraging Splunk for data analysis and detection development, they … you Minimum Requirements Minimum 3-5 + years of experience within a Threat Hunter, Red Team, Incident Response, or Blue Team role. Solid understanding of the MITREATT&CK framework, TTP analysis, and adversary emulation. Deep familiarity with hypothesis-driven threat hunting frameworks and methodologies. Ability to work autonomously while collaborating across security, engineering, and More ❯
Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITREATT&CK, and risk models to form hypotheses and validate them through structured hunts. Leverage Jupyter Notebooks and other tools to automate hunts, visualise results, and create reusable … They have 3–5+ years of hands-on experience in Threat Hunting, Red Team, Blue Team, or Incident Response roles, with a deep understanding of the MITREATT&CK framework and a proven ability to detect and investigate advanced threats beyond signature-based solutions. Adept at leveraging Splunk for data analysis and detection development, they … you Minimum Requirements Minimum 3-5 + years of experience within a Threat Hunter, Red Team, Incident Response, or Blue Team role. Solid understanding of the MITREATT&CK framework, TTP analysis, and adversary emulation. Deep familiarity with hypothesis-driven threat hunting frameworks and methodologies. Ability to work autonomously while collaborating across security, engineering, and More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITREATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Experience designing or More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITREATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Experience designing or More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITREATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Experience designing or More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Experience supporting RFP/RFI processes, technical solution documentation, and bill of materials (BoM) development Key Responsibilities: Client Engagement & Technical Pre-Sales Serve … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITREATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Background in regulated More ❯
KQL, analytics rule creation, playbook development, and connector integration. Solid grasp of the Microsoft Defender XDR suite (Defender for Endpoint, Cloud, Identity, etc.). Familiarity with MITREATT&CK , SIEM fundamentals, and security best practices. Confident communicator and problem-solver, capable of working both independently and in a team. Bonus Points For: Microsoft certs: SC More ❯
atomic IOCs, threat actor methodologies, malware, and vulnerabilities. Familiarity with the intelligence cycle, structured analytical techniques, and appropriate analytical frameworks (including Cyber Kill Chain, Diamond Model, MITREATT&CK). Capacity to read security logs and code to understand the content and context. Strong analytical skills, a demonstrated writing ability, and excellent verbal communication. Experience More ❯
using the ITIL framework. Ability to keep up to date with technology trends and to understand key technical drivers in the industry. Strong understanding of the MITREATT&CK and NIST Cybersecurity frameworks. Additional Information Your impact on Radius will be rewarded with the opportunity to develop and progress your career in many directions. You More ❯