Disclaimer: Hunt UK Visa Sponsors aggregates job listings from publicly available sources, such as search engines, to assist with your job hunting. We do not claim affiliation with WTW. For the most up-to-date job details, please visit the official website by clicking "Apply Now."
As part of the Centre for Threat-Informed Offence, you will lead liaison security operations, supporting Breach & Attack Simulation (BAS) and Red Team activities. Acting as the bridge between Offensive Security and the business, you will coordinate, monitor, and communicate Red Team operations, ensuring alignment with real-world threats. Your role includes validating attack simulations, enhancing security visibility, and refining detection capabilities with Cyber Defence and MDR. With strong technical expertise and communication skills, you will translate findings into actionable insights to strengthen security posture. This is a remote working role, with flexibility to operate from any of our office locations as required.
The Role:
- Hands-on experience in Cyber Defence, Threat Hunting, or Incident Response, with exposure to Red Team or BAS operations.
- Validate and analyse Red Team and BAS findings, ensuring accurate reporting of offensive security activities and their impact on the business.
- Ensure timely correlation and investigation of Red Team activities to assess detection efficacy and minimize risk exposure.
- Safely acquire and preserve forensic evidence related to offensive security exercises, assessing detection gaps, attack paths, and security control effectiveness.
- Strong sysadmin skills (Linux/Windows) and proficiency in scripting/programming (PowerShell, Python) to automate detection and analysis tasks.
- Identify and analyse emerging attack techniques based on internal testing, threat intelligence, and Red Team assessments.
- Collaborate with IT and Cyber Defence teams to ensure Red Team-generated alerts and findings are triaged, actioned, and integrated into detection engineering efforts.
- Correlate offensive security test data with defensive gaps to develop strategic mitigation plans and enhance security controls.
- Routinely update and refine Red Team detection playbooks, ensuring response activities align with threat-informed defence principles and provide comprehensive threat mitigation.
Communications and Relationships:
Internal:
- With the CISO, IT Security Directors and security team; Information Security Programme Manager and project managers, Risk & Compliance, Legal, Audit, IT, Procurement and other support functions as well as operational management and client-facing teams.
External:
Customers and suppliers