Ideally experience of securing Github and Github actions (or similar). Ideally experience in securing data platforms (e.g. Databricks, Dagster, Snowflake). Experience in Threat Modelling. Exposure to Agile working and DevSecOps. Knowledge of ISO 27001. Relevant certifications, such as: Microsoft certifications (MS-500, AZ-500, AZ-700, SC more »
Azure - A solid understanding of cloud computing and its security concerns - Ability to articulate complex security concepts to a non-technical audience - Experience in threatmodelling and risk assessment - Strong analytical skills and attention to detail - Excellent communication and stakeholder management abilities Requirements: - Security clearance is essential for more »
ability to design and implement complex security solutions in line with company policies and standards. • Familiarity with various security techniques and methodologies, such as threat modeling and vulnerability management. • Proficiency in automation and scripting using Python, Shell, Ansible, Jenkins, etc. • Industry certifications in information security or information technology preferred more »
ability to design and implement complex security solutions in line with company policies and standards.• Familiarity with various security techniques and methodologies, such as threat modeling and vulnerability management.• Proficiency in automation and scripting using Python, Shell, Ansible, Jenkins, etc.• Industry certifications in information security or information technology preferred more »
doing: Identify security vulnerabilities from a wide pool of technological solutions Perform risk analysis to triage and manage the remediation or mitigation activity Perform threat modeling activities across a variety of applications and environments Perform security assessments of existing architecture and make security recommendations for new deployments or changes more »
Chichester, West Sussex, South East, United Kingdom
Natures Way Foods
IT Security Engineer role. preferably manufacturing but not essential. Key Responsibilities Responsible for educating the workforce on information security through training and building awareness. Threatmodelling, mitigation, validation, including software and hardware penetration testing. Work with all functions of the IT department to design security into the system … and drive security reviews. Develop tools to assist in modelling, analysis, detection, and prevention of security threats. Secure the system while ensuring ease of use for the user and network operations. Stay current on industry developments affecting security and privacy policy. Implement security measures, plans and polices to resolve more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
ISO 27001 controls and NIST GuidelinesExperience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) toolsAbility to perform security threatmodelling and risk assessments to identify and prioritize security risksExperience with security incident response and handling, including log analysis and forensicsOutstanding business stakeholder more »
with Windows as well as Red Hat Linux Operating System analytical, troubleshooting, and problem-solving skills basic understanding of cloud security best practices, Forensics, threatmodelling, and offensive techniques. with Scrum/Agile development. understanding of and experience with CI/CD pipelines. are a plus but not more »
ongoing security needs: Continuously assess the organization's security requirements and establish standard operating procedures to respond to inbound security issues. Develop and implement threat models: Stay informed about new threats and attack vectors, and proactively address them. Perform routine security assessments/audits: Evaluate networks, systems, code, controls more »
ongoing security needs: Continuously assess the organization's security requirements and establish standard operating procedures to respond to inbound security issues. Develop and implement threat models: Stay informed about new threats and attack vectors, and proactively address them. Perform routine security assessments/audits: Evaluate networks, systems, code, controls more »
the Governance, Risk, and Compliance (GRC) team to inform on risk, compliance, and assurance matters related to the portfolio of change initiatives. Ensure that Threat Modeling is implemented for identified programs, projects, and engineering initiatives within the portfolio. Work closely with the Security Culture team to ensure alignment and more »
level executives. Complementary Technical Skills: Hands-on experience with programming languages, databases, and IoT. Knowledge of containerisation technologies such as Docker. Experience with Attack & Threat Modelling. Familiarity with Red Team testing and social engineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. more »
Greater London, Grange, United Kingdom Hybrid / WFH Options
Remarkable Jobs
Consultant (Pen Tester) Complementary Technical Skills: Hands-on experience with programming languages, databases, and IoT Knowledge of containerization technologies (e.g., Docker) Experience with Attack & Threat Modeling Red Team testing and social engineering methodologies Working knowledge of CobaltStrike Experience with bug bounty programs and vulnerability disclosure policies Security Testing Consultant more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
controls and NIST Guidelines Experience in implementing security automation using Scripting languages eg Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
Ipswich, England, United Kingdom Hybrid / WFH Options
James Adams
Collaborate with development, operations, and product teams to embed security into agile development cycles. Provide expert guidance on security best practices, including secure coding, threatmodelling, vulnerability management, and incident response. Develop and implement security policies, standards, and procedures tailored to agile and DevSecOps environments. Conduct security training more »
App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threatmodelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life Assurance at 4x Basic Annual Salary; Pension more »
securely and efficiently. Perform thorough security assessments on GCP environments, utilizing GCP-specific security tools and technologies, to identify and address potential vulnerabilities. Conduct threat modeling and risk assessments for GCP deployments, designing effective security solutions tailored to GCP services. Collaborate with cross-functional teams to respond to GCP more »
You will have the opportunity to foster the growth and advancement of team members within the Application Security domain. You will also lead on threat modeling and conducting comprehensive security reviews of system designs. Skills Previously worked as an Application Security Engineer or similar position. Experience in either C# … and standards, e.g. OWASP, PCI-DSS, ISO 27001, GDPR. Strong knowledge of GitLab pipelines and Akamai security software is a major advantage. Experience in threatmodelling and automated security testing. Senior Application Security Engineer - Hybrid - £500 Outside IR35 more »
Ideally this person would have Vulnerability management experience. System Admin background desired but not essential, this includes experience across Unix, Windows, Cisco, Networking, etc. ThreatModelling exposure flexible This is a permanent position that operates on a hybrid work setup of 2 days in the office, 3 days more »
deployment (CI/CD) practices. Security Practices: In-depth understanding of security best practices and standards (e.g., OWASP, NIST). Experience with security assessments, threat modeling, and proactive security mitigation. Problem Solving: Excellent analytical and problem-solving skills, capable of troubleshooting complex security issues. Communication and Collaboration: Strong communication more »
South East London, England, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
with the Governance, Risk, and Compliance (GRC) team to inform on risk, compliance, and assurance matters related to the portfolio of change initiatives.Ensure that Threat Modeling is implemented for identified programs, projects, and engineering initiatives within the portfolio.Work closely with the Security Culture team to ensure alignment and consistent more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Erin Associates
processes. Core skills & experience for this Security Analyst role: Security review methodologies: SAST, DAST, SBOM, SCA Implementing security tooling in CI/CD pipelines Threat modeling Code review (Java or C#) Familiarity with security frameworks like PCI, ISO 27001, Cyber Essentials This company offers structured training, career development opportunities … details, call 0161 438 1177 or follow us on Twitter @erinassociates for similar roles. Key words: Security Reviews, ISO Standards, SBOM, SCA, SAST, DAST, ThreatModelling, Security Tooling, Code Review, Manchester, North West, Java C#, Infosec, IT Security analyst Please get in touch on 0161 438 1177 if more »
compliance in ISO 27001, GDPR, PCI DSS Have a strong understanding of network security principles and practices Be experienced in conducting risk assessments and threatmodelling Be generally proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusion detection more »