3 of 3 Threat Modelling Jobs in Wiltshire

Technical Product Manager

Hiring Organisation
Cotality
Location
Swindon, UK
Employment Type
Full-time
necessary security controls, compliance artifacts (e.g., SOC 2, ISO 27001), and vulnerability management practices required for the product. Work with security teams to conduct threat modelling and ensure product architecture minimizes risk. 3. Client Delivery & Technical Integration Lead the technical scoping and delivery strategy for client deployments. ...

Senior Application Security Specialist

Hiring Organisation
hackajob
Location
Swindon, UK
Employment Type
Full-time
experience with automated, dynamic, and static application security testing tools. Knowledge and understanding of Open Web Application Security Project (OWASP) and its utilisation within threat modelling. Experience of software development and languages. Working knowledge of CI/CD pipelines and associated security tooling. Demonstrative experience in using structured methodologies … throughout the development lifecycle. Contributing continuously improving the Company's supply chain assurance processes to identify flaws and vulnerabilities. Performing advanced risk assessments, threat modelling, and design reviews to ensure effective security controls are in place. Identifying opportunities for converting manual tasks into automated processes and identify tooling ...

Staff Product Security Engineer

Hiring Organisation
Databricks
Location
Swindon, UK
Employment Type
Full-time
security team at Databricks, managing SDLC functions for features and products within Databricks. This would include, but is not limited to, security design reviews, threat models, manual code reviews, exploit writing and exploit chain creation. You will also support IR and VRP programs when there is a vulnerability report … EMEA. The Impact You Will Have Full SDLC Support for new product features being developed in ENG and non-ENG teams. This would include Threat Modeling, Design Review, Manual Code Review, Exploit writing, etc. Work with other security teams to provide support for Incident Response and Vulnerability Response ...