Threat Modelling Jobs in the Thames Valley

3 Threat Modelling Jobs in the Thames Valley

Security Architect - Telecom

Reading, England, United Kingdom
Vallum Associates
security: including but not limited to authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security includes but is not limited to, network security, host security, database security, device security, VPNs … Cisco/Palo Alto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/automating common tasks) Preferred : Experience in designing systems more »
Posted:

Security Architect

Reading, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. • Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs …/Cisco/PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • Identity and Access Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell/building dashboards/au- tomating common tasks) Preferred: • Experience in designing more »
Posted:

Senior Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
of new TTPs (Tactics, Techniques & Procedures) of the attackers, mimic them in your technical security risk assessments and/or quickly react to new threat scenarios to provide continuous security assurance Collaborate with engineering teams to help them triage and fix security issues Mentor members of the team in …/exploit them, Real world mitigations that can be applied Familiarity with vulnerability classification frameworks (e.g. OWASP Top 10, CVSS, MITRE CVE) Ability to threat model systems/applications/platforms to assess design and find flaws that can be exploited What We’ll Give You A team of more »
Posted:
Threat Modelling
the Thames Valley
Median
£120,000