MITRE ATT&CK Jobs in the UK

26 to 50 of 276 MITRE ATT&CK Jobs in the UK

Information Security Analyst

Fareham, England, United Kingdom
CooperCompanies
infrastructure. Ideally, you'll bring experience or knowledge in the following areas: Familiarity with key security frameworks like NIST 800-53 , ISO 27001 , CIS Controls , and MITRE ATT&CK . Understanding of information risk management and how to align security controls with business needs. Hands-on experience with network infrastructure - including switches, routers, firewalls, VPNs More ❯
Posted:

Cyber Threat Analyst - National Security West

Leeds, England, United Kingdom
Hybrid / WFH Options
Babcock
sufficient quality for distribution In-depth knowledge of the various techniques and frameworks used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITRE ATT&CK Development of new analytics and playbooks that result in creation of new detection rules/analytics Requirements Technical 3+ years' experience in Cyber Threat Intelligence, and More ❯
Posted:

SOC Analyst

Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
traffic, and endpoint telemetry Supporting containment and recovery efforts during active security incidents Continuously enhancing SOC capabilities, tooling, and detection rules using threat-informed approaches like MITRE ATT&CK Producing detailed incident reports and documentation for both technical and non-technical stakeholders Assisting with threat intelligence activities as needed Staying current on evolving threats, attack … will have Hands-on experience working in a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITRE ATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic understanding of enterprise security architecture More ❯
Employment Type: Full-Time
Salary: £10,000 per annum
Posted:

Full Stack Developer

Glasgow, Scotland, United Kingdom
ELLIOTT MOSS CONSULTING PTE. LTD
scalable applications using modern full-stack development tools and frameworks. · Collaborate with cybersecurity teams to build and enhance detection and mitigation systems based on frameworks like MITRE ATT&CK. · Develop and maintain data pipelines, APIs, dashboards, and visualization tools to support AI model insights. · Write clean, well-documented, and secure code using Python, C C#, or R. … Information Technology, or related field. · 3 years of experience in a cybersecurity operations or similar function. · Strong knowledge of cybersecurity principles, frameworks, and threat intelligence (e.g., MITRE ATT&CK). · Proficient in AI/ML technologies, including Natural Language Processing, Generative AI, and Machine Learning algorithms. · Experienced in full-stack development with proficiency in Python More ❯
Posted:

Front Line Analyst – National Security – Leeds

Leeds, England, United Kingdom
Hybrid / WFH Options
BAE Systems (New)
off the cloud’ using Microsoft Graph API, app registrations, and managed identities. Ability to research and learn new tools and techniques quickly. Good understanding of the MITRE ATT&CK Framework. Strong knowledge of networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP). Experience in Intrusion Analysis on Windows Devices and Azure Cloud More ❯
Posted:

Head of Cyber Threat Exposure

Central London, London, England, United Kingdom
Hybrid / WFH Options
Bupa UK
in threat management, vulnerability management, offensive security practices and security testing. Strong knowledge of common security vulnerabilities, attack vectors, and security testing frameworks, such as OWASP, MITRE ATT&CK, CVE/CVSS, and NIST SP 800-53. Experience of vulnerability scanning tools, penetration testing tools, and security testing frameworks (e.g., Nessus, Metasploit, Burp Suite More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Senior Incident Response Specialist

London, England, United Kingdom
Hybrid / WFH Options
Sportradar
and root cause analyses for complex incidents. Experience with SIEM platforms, endpoint detection and response tools, and network traffic analysis. Strong understanding of attack frameworks (e.g. MITRE ATT&CK) and the ability to apply them to threat hunting and incident response. Experience creating detection rules, playbooks, and workflows to improve SOC detection and response efficiency. More ❯
Posted:

Incident Response Analyst

London, England, United Kingdom
Enso Recruitment
or similar incident response frameworks. Proficient in log analysis across Windows, Linux, MacOS, network devices, and cloud environments. Understanding of attack frameworks such as MITRE ATT&CK, Lockheed Martin Kill Chain, or the Diamond Model. Comfortable with basic dynamic malware analysis and use of open-source tools (e.g. Velociraptor, Volatility, DFIR IRIS). Desirable Qualifications More ❯
Posted:

Security Architect

London, England, United Kingdom
NTT DATA
certifications Knowledge of Active Directory, Cryptography, IAM, PKI, server hardening, SIEM, SOAR, and virtualization (VMware) Experience in pre-sales activities and supporting delivery collateral Familiarity with MITRE ATT&CK and ITIL frameworks Who we are: We’re a global business empowering local teams, undertaking exciting work that changes the world. Our portfolio spans consulting, applications More ❯
Posted:

Security Architect

Thornbury, Gloucestershire, United Kingdom
Applicable Limited
Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with MITRE ATT&CK Familiarity with ITIL Who we are: We're a business with a global reach that empowers local teams, and we undertake hugely exciting work that is More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Analyst Cti

Welwyn Garden City, England, United Kingdom
Hybrid / WFH Options
Tesco UK
/and trusted external stakeholders. Collaboration and Support • Supporting Security Operations, Threat Hunting, and engineering teams through prioritised intelligence requirements. • Aligning to cyber frameworks such as MITRE ATT&CK, Cyber Kill Chain, Pyramid of Pain, and Diamond Model to contextualise threats. Continuous Learning and Adaptation • Staying current on threat trends, tools, and techniques to ensure … query languages. • Experience of intelligence collection and processing techniques, including OSINT. • Exposure to Structured Analytic Techniques (like ACH) and quantitative methods. • Application of cyber frameworks like MITRE ATT&CK, Cyber Kill Chain, and Diamond Model in pursuit of producing high-quality intelligence. • Assisting with malware triage, including static and dynamic analysis, to identify and mitigate More ❯
Posted:

Cloud Security Architect

London, England, United Kingdom
UBDS Digital
to understand their security needs and provide tailored solutions Lead security assurance activities, including risk assessments, vulnerability assessments, penetration testing, and threat modelling techniques such as MITRE ATT&CK, STRIDE, DREAD, and PASTA Provide expert guidance on security controls and measures to protect cloud infrastructure and data Stay up-to-date with the latest security More ❯
Posted:

SOAR Engineer/Analyst (Google SecOps)

City of London, London, England, United Kingdom
Gibbs Hybrid
CrowdStrike Falcon platform Scripting experience in Python, PowerShell, or Bash. Experience with REST APIs and JSON for tool integration. Working knowledge of incident response frameworks and MITRE ATT&CK. Strong problem-solving, critical thinking, and communication skills. Desirable Qualifications Experience with CI/CD for playbook development and version control (e.g., Git). Familiarity with other SOC More ❯
Employment Type: Contractor
Rate: £450 - £495 per day
Posted:

SOAR Engineer/Analyst (Google SecOps)

England, United Kingdom
Atrium (EMEA)
CrowdStrike Falcon platform Scripting experience in Python, PowerShell, or Bash. Experience with REST APIs and JSON for tool integration. Working knowledge of incident response frameworks and MITRE ATT&CK. Strong problem-solving, critical thinking, and communication skills. Desirable Qualifications Experience with CI/CD for playbook development and version control (e.g., Git). Familiarity with other SOC More ❯
Posted:

Front Line Analyst - National Security - Leeds

Leeds, England, United Kingdom
Hybrid / WFH Options
BAE
as use of Microsoft Graph API, app registrations and managed identities · Ability to quickly research and learn about new tools and techniques · Good working knowledge of MITRE ATT&CK Framework Good working knowledge of networking concepts & protocols (TCP/IP, UDP, DNS, DHCP, HTTP, etc.) · Intrusion Analysis on Windows Devices and Azure Cloud Architecture. · Relevant More ❯
Posted:

Cyber Security Content Analyst

London, England, United Kingdom
Hack The Box
while providing clear documentation, walkthroughs, and hints for our users. Additionally, the Cyber Security Content Analyst will map existing and new content to frameworks such as MITRE ATT&CK, NIST/NICE, and others, identify gaps in coverage, and assist in the development of new content to address those gaps. This individual will also monitor … our labs. Ensure all documentation is clear, concise, and user-friendly. Framework Mapping and Analysis: Map each lab to relevant vulnerabilities, techniques, and frameworks such as MITRE ATT&CK, NIST/NICE, OWASP Top 10, etc. Maintain a centralized database to track mappings and content alignment. Gap Analysis and Content Enhancement: Evaluate gaps between existing … Skills, knowledge, and experience points required to unlock the role of Cyber Security Content Analyst at Hack The Box Deep understanding of cybersecurity frameworks such as MITRE ATT&CK, NIST/NICE, OWASP Top 10, etc. Familiarity with threat intelligence platforms and feeds. Strong organizational and analytical skills, with attention to detail. Excellent knowledge of More ❯
Posted:

Threat Hunter

Manchester, Lancashire, United Kingdom
NCC Group
Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITRE ATT&CK, and risk models to form hypotheses and validate them through structured hunts. Leverage Jupyter Notebooks and other tools to automate hunts, visualise results, and create reusable … have 3-5+ years of hands-on experience in Threat Hunting, Red Team, Blue Team, or Incident Response roles, with a deep understanding of the MITRE ATT&CK framework and a proven ability to detect and investigate advanced threats beyond signature-based solutions. Adept at leveraging Splunk for data analysis and detection development, they … you Minimum Requirements Minimum 3-5 + years of experience within a Threat Hunter, Red Team, Incident Response, or Blue Team role. Solid understanding of the MITRE ATT&CK framework, TTP analysis, and adversary emulation. Deep familiarity with hypothesis-driven threat hunting frameworks and methodologies. Ability to work autonomously while collaborating across security, engineering, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Threat Hunter

London, England, United Kingdom
NCC Group
Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITRE ATT&CK, and risk models to form hypotheses and validate them through structured hunts. Leverage Jupyter Notebooks and other tools to automate hunts, visualise results, and create reusable … They have 3–5+ years of hands-on experience in Threat Hunting, Red Team, Blue Team, or Incident Response roles, with a deep understanding of the MITRE ATT&CK framework and a proven ability to detect and investigate advanced threats beyond signature-based solutions. Adept at leveraging Splunk for data analysis and detection development, they … you Minimum Requirements Minimum 3-5 + years of experience within a Threat Hunter, Red Team, Incident Response, or Blue Team role. Solid understanding of the MITRE ATT&CK framework, TTP analysis, and adversary emulation. Deep familiarity with hypothesis-driven threat hunting frameworks and methodologies. Ability to work autonomously while collaborating across security, engineering, and More ❯
Posted:

Network and Endpoint Security Pre-Sales Architect - London

City of London, London, United Kingdom
Accenture
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITRE ATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITRE ATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Experience designing or More ❯
Posted:

Network and Endpoint Security Pre-Sales Architect - London

London Area, United Kingdom
Accenture
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITRE ATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITRE ATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Experience designing or More ❯
Posted:

Network and Infra Endpoint Security Architect - London

London, England, United Kingdom
Accenture
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITRE ATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITRE ATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Experience designing or More ❯
Posted:

Network and Endpoint Security Architect

London, England, United Kingdom
Accenture
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITRE ATT&CK and NIST CSF Experience supporting RFP/RFI processes, technical solution documentation, and bill of materials (BoM) development Key Responsibilities: Client Engagement & Technical Pre-Sales Serve … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITRE ATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Background in regulated More ❯
Posted:

SOC Analyst - Microsoft Sentinel Specialist

Leeds, West Yorkshire, England, United Kingdom
Eames Consulting
KQL, analytics rule creation, playbook development, and connector integration. Solid grasp of the Microsoft Defender XDR suite (Defender for Endpoint, Cloud, Identity, etc.). Familiarity with MITRE ATT&CK , SIEM fundamentals, and security best practices. Confident communicator and problem-solver, capable of working both independently and in a team. Bonus Points For: Microsoft certs: SC More ❯
Employment Type: Full-Time
Salary: £55,000 - £60,000 per annum
Posted:

Threat Intelligence Analyst

London, England, United Kingdom
ReliaQuest
atomic IOCs, threat actor methodologies, malware, and vulnerabilities. Familiarity with the intelligence cycle, structured analytical techniques, and appropriate analytical frameworks (including Cyber Kill Chain, Diamond Model, MITRE ATT&CK). Capacity to read security logs and code to understand the content and context. Strong analytical skills, a demonstrated writing ability, and excellent verbal communication. Experience More ❯
Posted:

Senior Cyber Security Analyst

Crewe, England, United Kingdom
Radius Limited
using the ITIL framework. Ability to keep up to date with technology trends and to understand key technical drivers in the industry. Strong understanding of the MITRE ATT&CK and NIST Cybersecurity frameworks. Additional Information Your impact on Radius will be rewarded with the opportunity to develop and progress your career in many directions. You More ❯
Posted:
MITRE ATT&CK
10th Percentile
£46,250
25th Percentile
£48,063
Median
£62,250
75th Percentile
£82,500
90th Percentile
£95,000