<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//threatmatrix.co.uk/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://threatmatrix.co.uk/</loc>
		<lastmod>2025-03-26T14:49:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/service-icn.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/services-icn.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/Our-Statistics-img4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/pexels-tima-miroshnichenko-7567426-683x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/TOP-10_Low_Res.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/Phishing-emails.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/network-security-strategy-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/Protect-Your-Workplace.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/AI-innovation-and-risk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/09/Watchguard-300x87.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/09/logo_barracuda-msp_LgColorPantone-300x69.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/10/Cyble-Partner-Program-Logo-2024-final-black-01-1-300x49.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/10/Microsoft-Partner-300x164.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/09/check-point-logo-large-2024-300x116.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/09/tenable-logo-sva-2023-300x66.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/10/LocateRisk-Solutions-Partner-Logo-Dark-300x86.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/10/Fortra-logo-300x200.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/10/Akamai-Logo-300x122.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/logo-Ibrahim.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/11/Hornest-Security-Logo-300x149.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/12/Brandefence-Logo-300x101.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2025/03/Trend-Micro-Logo-300x200.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2025/03/Rootshell-Security-Logo-300x97.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2025/03/bulletproof-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2025/03/Pentest-People-Logo-300x100.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/web-developer/</loc>
		<lastmod>2024-08-01T23:01:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/student-849822_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/penetration-tester/</loc>
		<lastmod>2024-08-16T20:57:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/software-developer-6521720_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/sales-representative/</loc>
		<lastmod>2024-08-16T21:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/security-department-1653345_1920.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/soc-analyst/</loc>
		<lastmod>2024-08-16T21:02:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/cybercrime-8878479.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/privacy-policy/</loc>
		<lastmod>2024-09-01T13:08:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/ai-generated-8070001-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/head-of-soc/</loc>
		<lastmod>2024-10-20T17:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/head-of-security-operations-centre/</loc>
		<lastmod>2024-10-20T17:26:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/pexels-tima-miroshnichenko-5380589-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/forensic-analyst/</loc>
		<lastmod>2024-11-02T18:39:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/software-developer-6521720_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/business-development-manager-role/</loc>
		<lastmod>2024-11-02T19:47:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/quote-contact-form/</loc>
		<lastmod>2024-11-03T15:37:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/threat-hunting/</loc>
		<lastmod>2024-11-06T21:12:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/Image-1024x640.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/network-security/</loc>
		<lastmod>2024-11-06T21:13:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/network-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/endpoint-security/</loc>
		<lastmod>2024-11-06T21:27:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/Managed-Hosting-Service-Package.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/data-security/</loc>
		<lastmod>2024-11-06T21:30:03+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/home-02-blog1-1024x695.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/cloud-security/</loc>
		<lastmod>2024-11-07T13:10:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/services-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/vulnerability-management/</loc>
		<lastmod>2024-11-07T21:08:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/11/vulnerability-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/get-a-quote/</loc>
		<lastmod>2024-11-20T16:33:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/pexels-tima-miroshnichenko-5380599-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/</loc>
		<lastmod>2024-11-20T16:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/pexels-tima-miroshnichenko-5380649-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/our-services-icon1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/Our-Statistics-img4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/plugins/fortified-toolkit//assets/images/services_arrow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/Our-Statistics-icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/Our-Statistics-icon-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/Our-Statistics-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/Our-Statistics-icon-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/TOP-10_Low_Res.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/Phishing-emails.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/network-security-strategy-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/penetration-testing/</loc>
		<lastmod>2024-11-20T16:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/11/Pentest-Finding-Mangement-Platform-1024x569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/software-developer-6521720_1280-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/web-security/</loc>
		<lastmod>2024-11-20T16:45:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/services-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/incident-response/</loc>
		<lastmod>2024-11-20T16:46:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/desktop-5636733-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/about-us/</loc>
		<lastmod>2024-11-20T16:57:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/sub-banner-img-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/relible-img-section.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/Our-Statistics-icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/Our-Statistics-icon-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/Our-Statistics-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/Our-Statistics-icon-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/TOP-10_Low_Res.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/Phishing-emails.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/network-security-strategy-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/Protect-Your-Workplace.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/AI-innovation-and-risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/our-team/</loc>
		<lastmod>2024-11-21T16:57:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/andrea-de-santis-X8kOj-k9MaA-unsplash-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/Our-Statistics-img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/Our-Statistics-img-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/Our-Statistics-img-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/Our-Statistics-img4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/testimonials/</loc>
		<lastmod>2024-11-21T17:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/pexels-pixabay-60504-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/testimonials-img-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/quote-img.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/forensic-analysis/</loc>
		<lastmod>2024-11-21T17:03:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/Finger-Print-Access.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/contact-us/</loc>
		<lastmod>2024-11-21T17:07:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/ai-generated-8070001-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/contact-icon-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/contact-icon1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/10/cotact-icon-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/dark-web-monitoring/</loc>
		<lastmod>2024-11-21T17:08:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/11/Dark-Web-Monitoring-1024x574.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/careers/</loc>
		<lastmod>2024-11-21T17:14:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/engineer-8499904_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/terms-of-services/</loc>
		<lastmod>2024-11-21T17:22:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/07/cybercrime-8878479.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/security-operations-center/</loc>
		<lastmod>2024-11-24T15:25:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/portfolio3-1024x576.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/blogs/</loc>
		<lastmod>2024-11-24T15:27:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/03/slider-image-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/TOP-10_Low_Res.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/Phishing-emails.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/network-security-strategy-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2023/09/blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/Protect-Your-Workplace.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/08/AI-innovation-and-risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/email-security/</loc>
		<lastmod>2024-11-25T17:36:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/11/Email-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatmatrix.co.uk/services/attack-surface-management/</loc>
		<lastmod>2024-11-26T13:10:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatmatrix.co.uk/wp-content/uploads/2024/11/Attack-Service-Management-1024x683.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->