Swindon, England, United Kingdom Hybrid / WFH Options
Nationwide Building Society
will engineering teams to create solutions that solve or remediate security problems. This will involve a range of activities, including (but not limited to) threatmodelling, selection and configuration of DevSecOps tools, high-level and detailed security designs. We are looking for a Security Engineer with experience in … design and implementing cloud native applications in the cloud. You should have demonstrable experience in: Threatmodelling, design and implementing security controls in the cloud environment (AWS or Azure) Design and implementing cloud native and hybrid solutions in major public cloud platforms. Understanding of cryptographic primitives and protocols more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
all product teams, dealing with complex projects daily and serving as the escalation point for the Product Security Specialist (PSS). You will lead threatmodelling workshops and engage with key stakeholders to identify threats and recommend countermeasures. Additionally, you will lead a team of Product Security Specialists … a team of Product Security Specialist (PSS). Providing leadership, technical guidance, and support to the Product Security Specialists. You will lead/facilitate threatmodelling workshops with SMEs. Engaging with key stakeholders to identify threats and recommend countermeasures. Collaborating with strategy, transformation, and digital engineering parts of … such as OWASP, NIST, and ISO Awareness of security tools and technologies, such as SAST, DAST, IAST, SCA, WAF, IDS, IPS. Experience in conducting threatmodelling and risk assessments. Interview process The interview process for this role is two stages including a technical competency-based questions and a more »
Solihull, West Midlands, United Kingdom Hybrid / WFH Options
Indotronix Avani UK Ltd
respond promptly to mitigate security threats. - Develop and implement security automation scripts and tools to streamline security tasks in the DevOps pipeline. - Participate in threatmodelling exercises and risk assessments to proactively identify security weaknesses and prioritize remediation efforts. - Stay up-to-date with the latest security trends … controls and NIST Guidelines. - Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools. - Ability to perform security threat modeling and risk assessments to identify and prioritize security risks. - Experience with security incident response and handling, including log analysis and forensics. - Strong communication … Workflow Within 3 months: - Security Incident Handling and Remediation - Security Automation and Tooling - Security Compliance and Auditing - Collaboration with Development Teams Within 6 months: - ThreatModelling and Risk Assessment - Continuous Improvement Initiatives - Security Incident Management Whats in it for you? We operate a Flexible Working Policy and this more »
Solihull, West Midlands, United Kingdom Hybrid / WFH Options
Indotronix Avani UK Ltd
respond promptly to mitigate security threats. - Develop and implement security automation scripts and tools to streamline security tasks in the DevOps pipeline. - Participate in threatmodelling exercises and risk assessments to proactively identify security weaknesses and prioritize remediation efforts. - Stay up-to-date with the latest security trends … controls and NIST Guidelines. - Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools. - Ability to perform security threat modeling and risk assessments to identify and prioritize security risks. - Experience with security incident response and handling, including log analysis and forensics. - Strong communication … Workflow Within 3 months: - Security Incident Handling and Remediation - Security Automation and Tooling - Security Compliance and Auditing - Collaboration with Development Teams Within 6 months: - ThreatModelling and Risk Assessment - Continuous Improvement Initiatives - Security Incident Management Whats in it for you? We operate a Flexible Working Policy and this more »
Solihull, West Midlands, United Kingdom Hybrid / WFH Options
Indotronix Avani UK Ltd
respond promptly to mitigate security threats. - Develop and implement security automation scripts and tools to streamline security tasks in the DevOps pipeline. - Participate in threatmodelling exercises and risk assessments to proactively identify security weaknesses and prioritize remediation efforts. - Stay up-to-date with the latest security trends … controls and NIST Guidelines. - Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools. - Ability to perform security threat modeling and risk assessments to identify and prioritize security risks. - Experience with security incident response and handling, including log analysis and forensics. - Strong communication … Workflow Within 3 months: - Security Incident Handling and Remediation - Security Automation and Tooling - Security Compliance and Auditing - Collaboration with Development Teams Within 6 months: - ThreatModelling and Risk Assessment - Continuous Improvement Initiatives - Security Incident Management Whats in it for you? We operate a Flexible Working Policy and this more »
Solihull, West Midlands, United Kingdom Hybrid / WFH Options
Indotronix Avani UK Ltd
respond promptly to mitigate security threats. Develop and implement security automation scripts and tools to streamline security tasks in the DevOps pipeline. Participate in threatmodelling exercises and risk assessments to proactively identify security weaknesses and prioritize remediation efforts. Stay up-to-date with the latest security trends … controls and NIST Guidelines. Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools. Ability to perform security threat modeling and risk assessments to identify and prioritize security risks. Experience with security incident response and handling, including log analysis and forensics. Strong communication … Workflow Within 3 months: Security Incident Handling and Remediation Security Automation and Tooling Security Compliance and Auditing Collaboration with Development Teams Within 6 months: ThreatModelling and Risk Assessment Continuous Improvement Initiatives Security Incident Management Whats in it for you? We operate a Flexible Working Policy and this more »
security procedures and standards to be reviewed and approved by executive management and/or formally authorised by the chief information security officer (CISO) Threatmodelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in … leading/mentoring teams in “secure by design” including a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identity management, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security patterns more »
Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. • Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs …/Cisco/PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • Identity and Access Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell/building dashboards/au- tomating common tasks) Preferred: • Experience in designing more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
Birmingham, West Midlands (County), United Kingdom
Smart Sourcer Ltd
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threatmodelling, vulnerability assessment, control effectiveness review and risk assessment of a proposal or design and deliver a comprehensive, easy consumable report targeted to more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
controls and NIST Guidelines Experience in implementing security automation using Scripting languages eg Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
App security. Ability in software development or programming/Scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threatmodelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life Assurance at 4x Basic Annual Salary; Pension more »
App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threatmodelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life Assurance at 4x Basic Annual Salary; Pension more »
Luton, England, United Kingdom Hybrid / WFH Options
Hays
the companies’ clients, who are mainly in the defence sector, but can include government and non-defence clients. Conducting cyber risk assessment activities including threatmodelling, vulnerability analysis and analysis of mitigation solutions. Coordinating with other product engineers, system architects, and developers to provide oversight in the development more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Erin Associates
processes. Core skills & experience for this Security Analyst role: Security review methodologies: SAST, DAST, SBOM, SCA Implementing security tooling in CI/CD pipelines Threat modeling Code review (Java or C#) Familiarity with security frameworks like PCI, ISO 27001, Cyber Essentials This company offers structured training, career development opportunities … details, call 0161 438 1177 or follow us on Twitter @erinassociates for similar roles. Key words: Security Reviews, ISO Standards, SBOM, SCA, SAST, DAST, ThreatModelling, Security Tooling, Code Review, Manchester, North West, Java C#, Infosec, IT Security analyst Please get in touch on 0161 438 1177 if more »
record of producing highly competent professionals. What you'll learn: A range of roles and methodologies in the tech industry What is Cyber Security ThreatModelling throughout the SDLC Vulnerabilities - social, hardware, software, networking, including the related technology Vulnerability scanning of operating systems, applications, and networks. Web Application more »
record of producing highly competent professionals. What you'll learn: A range of roles and methodologies in the tech industry What is Cyber Security ThreatModelling throughout the SDLC Vulnerabilities - social, hardware, software, networking, including the related technology Vulnerability scanning of operating systems, applications, and networks. Web Application more »
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Met Office
activities for projects, services, and third party suppliers. Leading the evaluation of business-supporting cyber security needs, undertake cyber security related risk assessments, conduct threatmodelling, and ensure activities are consistent with applicable regulations and legislation. Providing advice to a range of stakeholders on how to remedy identified more »
development of secure software, focus on embedded systems or complete solutions Have detailed experience in the security concept/design, thread analysis, risk/threatmodelling and mitigation strategies Have professional knowledge of software languages (C, Java, Java Card, Phyton, Ruest) Be familiar with "state of the art more »
Bristol Area, South West, United Kingdom Hybrid / WFH Options
Electus Recruitment Solutions Limited
Develop cutting-edge technology to safeguard our nation's security as an Electromagnetic Warfare Modelling and System Engineer. This leading defence company that produces military weapons systems will reward your hard work significantly with bonuses, annual salary reviews and paid overtime among other benefits. You will play a vital … role in modelling EW Weapon Systems as well as supporting critical weapon systems and missile programmes. About the Role: Develop cutting-edge modelling techniques for EW Weapon Systems Collaborate with experts across the company on essential defence programmes Potential for travel within the UK and Europe (depending on … systems engineering principles It would be desirable for you to have one of the following as well: Knowledge of Integrated Air Defence Systems (IADS) Threat analysis experience Knowledge of EW techniques and tactics Experience working with relevant government agencies, such as DSTL Key Information: Role: Electromagnetic Warfare and System more »
all product teams, dealing with complex projects daily and serving as the escalation point for the Product Security Specialist (PSS). You will lead threatmodelling workshops and engag... APCT1_UKTJ more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Reed Technology
projects and processes across the business in a rapidly changing environment. Key areas of the role are: IT Governance & Compliance Risk Management Phishing Controls ThreatModelling Incident Management Security Product Development Vulnerability scanning The role offers: Hybrid working Company bonus Training and development If you are on the more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
for each assigned product team/squad, and will support the implementation of secure solutions throughout the development life-cycle. You will also facilitate threat modeling workshops assisting product teams in identifying and mitigating threats. What you will be doing Oversee security related issues across multiple product teams/… Cloud serverless transformation projects. You will have the ability to work with infrastructure as code and understand complex architectures. You will Lead/facilitate threat modeling workshops with SMEs Engage with key stakeholders to identify threats and recommend countermeasures. Participate in architectural reviews of Product cloud implementations against security … such as OWASP, NIST, and ISO. Awareness of security tools and technologies, such as SAST, DAST, IAST, SCA, WAF, IDS, IPS. Experience in conducting threat modeling and risk assessments. Interview process The interview process for this role is two stages including a technical competency-based questions and a task. more »