London, England, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment)
AntiVirus/AntiMalware for End User devices Antivirus/Malware/Ransomware etc for Product/Platform DDos Protection Access Management/Review (IAM) Threatmodelling Setup Bug Bounty program Application Security/Testing Brand monitoring (domans etc) Whitelist client access Encryption in Transit (confirm 100%) Social Engineering more »
will engineering teams to create solutions that solve or remediate security problems. This will involve a range of activities, including (but not limited to) threatmodelling, selection and configuration of DevSecOps tools, high-level and detailed security designs. About you We are looking for a Senior Security Engineer … with experience in design and implementing cloud native applications in the cloud. You should have demonstrable experience in Threatmodelling, design and implementing security controls in the cloud environment (AWS or Azure) Design and implementing cloud native and hybrid solutions in major public cloud platforms. Understanding of cryptographic more »
doing: Identify security vulnerabilities from a wide pool of technological solutions Perform risk analysis to triage and manage the remediation or mitigation activity Perform threat modeling activities across a variety of applications and environments Perform security assessments of existing architecture and make security recommendations for new deployments or changes more »
firms enterprise estate. Responsibilities Own and consistently develop the monitoring detection and response tooling, automating and fine-tuning wherever possible. Utilize and ingest relevant threat intel feeds mapped out against their estate and MITRE ATT&CK framework Perform hands-on security threatmodelling, risk assessment and vulnerability more »
varied role where you'll lead and manage the day to day operations of the Security Operations Centre (SOC); this includes security event monitoring, threat monitoring and response activities. You'll also provide guidance in the event of escalations to help ensure Legal and General’s cyber threats are … process adherence and identifying continuous improvement activities needed to achieve operational performance and risk management objectives related to the SOC Driving the development of threat management, threatmodelling and identification of new threat vectors by keeping up to date with industry activity and methodology, to help … revising and re-defining SOC service catalogue and the associated technologies, processes, talent (people) and data requirements to ensure it meets the continually evolving threat and business landscapes Managing, motivating and developing employees at all levels to maximise the performance of the area Qualifications Naturally you will come from more »
Identify security breaches, implement corrective actions, and devise strategies to prevent future incidents. Collaborate with developers across Sportradar for in-depth security reviews and threat modeling. Work in an international team and environment. Automate application and infrastructure scanning and reporting. Mentor junior penetration testers and provide guidance on best … review in line with CIS benchmarks or other well-known standards. Advanced proficiency in scripting languages (e.g., PowerShell, Python, Perl). Excellent understanding of threat modeling and SDLC/SSDLC processes. Effective communication skills across all organizational levels. Proven leadership and team mentoring experience. Desirable Qualifications: Advanced certifications such more »
you interested in helping an innovative cybersecurity function to defend a large firm from cyber threats? Are you looking to apply your cybersecurity and threat analysis expertise? We’re looking for a Cyber Threat Intelligence Analyst to: - Proactively monitor and analyze the cyber threat landscape to assess … Research, model and analyze and prioritize emerging adversarial tactics, techniques, and procedures (TTPs) and their likelihood and impact to the firm. - Consume and evaluate threat intel to understand the evolving threat landscape, adversarial tactics, techniques, and procedures (TTPs), and areas of concern/targeting that could potentially impact … our environment. - Create threat intelligence reports with thorough and accurate analysis leveraging a variety of open-sources and commercial tools. - Engage with other functions to provide specialized knowledge and requirements to influence threat mitigation strategies. - Manage and consolidate cyber threat knowledge based on industry-level frameworks and more »
ability to design and implement complex security solutions in line with company policies and standards. • Familiarity with various security techniques and methodologies, such as threat modeling and vulnerability management. • Proficiency in automation and scripting using Python, Shell, Ansible, Jenkins, etc. • Industry certifications in information security or information technology preferred more »
role, you will be instrumental in providing Cyber Security services globally, focusing on driving the Cyber Assurance programme to reduce the bank’s cyber threat landscape and ensure robust "Business As Usual" cyber assurance processes. Key Responsibilities: Cyber Test and Validation Management: Oversee the Cyber Test and Validation process … and cryptography. Security Solutions: Experience in architecting and engineering complex security solutions, implementing global policies and standards. Methodologies: Familiar with "Attack and Defensive" methods, Threat Hunting, Threat modeling, Reverse engineering, Vulnerability Management, Data modeling, and security metrics. Automation and Scripting: Skilled in Python, Shell, Ansible, Jenkins. Cloud Technologies more »
ideal candidate for the Security Architect will have the following skills and experience: Extensive experience designing security solutions, primarily for on-prem Experience with ThreatModelling frameworks Thorough knowledge of Information Security controls Excellent communication skills, with the ability to translate complex engineering terms into language that business more »
this important new role as a key member of the Cyber Security team. Responsible for operational cyber security including logging and monitoring, incident response, threat and vulnerability management, the team also works on intelligence-led penetration testing, the development of cyber security policies and standards, security architecture, forensic investigations … and risk management. Gathering threat intelligence to provide answers to specific requests, you'll work closely with your colleagues in the Cyber Security Operations Centre as you: work to create and answer priority intelligence requirements, delivering intelligence reports to stakeholders within the team and the wider organisation use our … security information, event management and threat intelligence platform to hunt for threats, enriching our defensive capabilities with indicators of compromise and detection rules use relevant frameworks and modelling techniques to represent threats against Parliamentary assets from a range of actors and technologies enrich areas such as risk and more »
South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
AntiVirus/AntiMalware for End User devices Antivirus/Malware/Ransomware etc for Product/Platform DDos Protection Access Management/Review (IAM) Threatmodelling Setup Bug Bounty program Application Security/Testing Brand monitoring (domans etc) Whitelist client access Encryption in Transit (confirm 100%) Social Engineering more »
securely and efficiently. Perform thorough security assessments on GCP environments, utilizing GCP-specific security tools and technologies, to identify and address potential vulnerabilities. Conduct threat modeling and risk assessments for GCP deployments, designing effective security solutions tailored to GCP services. Collaborate with cross-functional teams to respond to GCP more »
compliance in ISO 27001, GDPR, PCI DSS Have a strong understanding of network security principles and practices Be experienced in conducting risk assessments and threatmodelling Be generally proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusion detection more »
with various other Security personnel Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise on … 7pm on a shift basis to ensure that full coverage is achieved. The ideal candidate will have: Incident response and security monitoring Understanding of threatmodelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/ more »
required projects Manage security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threatmodelling, and vulnerability management and risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security more »
the CI/CD pipeline and automate security testing and compliance checks. Provide guidance and support to development teams on secure coding practices and threatmodelling techniques. Collaborate with cloud architects to design and implement secure cloud environments. To be considered for this role, you should have: Must more »
effective authorization concepts for SAP systems. Administer SAP roles and analyze user access to ensure compliance with segregation of duties (SoD) policies. Produce detailed threat models after reviewing technical design documents. Review and input security into solution architecture and high-level designs. Advise and consult with development teams on more »
ideal candidate for the Security Architect will have the following skills and experience: Extensive experience designing security solutions, primarily for on-prem Experience with ThreatModelling frameworks Thorough knowledge of Information Security controls Excellent communication skills, with the ability to translate complex engineering terms into language that business more »
environments Set up Network Access Control Lists (NACLs) to control inbound and outbound traffic and apply subnetting principles for secure network segmentation Produce Detailed Threat models after reviewing technical design documents Skills: Should have proven experience as a Security Architect working in a large, complex organization. Ideally, this experience more »
software systems by reviewing designs, auditing code, and performing penetration tests. The role involves developing and implementing vulnerability mitigation strategies, conducting risk assessments and threatmodelling, and managing vulnerabilities using industry standards. You will act as a security expert, proactively identifying and addressing potential threats, and integrating robust more »
side encryption for data stored in Amazon S3 buckets. Ensure data at rest and data in transit are encrypted using appropriate mechanisms. Produce Detailed Threat models after reviewing technical design documents. Design and implement authentication mechanisms (e.g., OAuth, JWT) for APIs and services. Key skills: Should have proven experience more »
overseeing application security testing, prioritising the resolution of security vulnerabilities, and increasing automation Show experience identifying potential threats and attacks to applications systems through threatmodelling (PASTA and STRIDE) Demonstrate experience with threatmodelling theories and application architecture reviews Have experience of monitoring security systems for more »
and champion security within your current role, you're very likely to be successful. You will be training developers on writing secure code, perform threatmodelling and security testing of applications, run SAST, DAST, SCA and secret scanning tools, manage the bug bounty program and lead incident response more »
risks. Act as a subject matter expert on security-related matters, collaborating with stakeholders to address security concerns and implement effective solutions. Participate in threat hunting and threatmodelling activities. To be considered for this role, you should have: Must have a strong background in a security more »