doing: Identify security vulnerabilities from a wide pool of technological solutions Perform risk analysis to triage and manage the remediation or mitigation activity Perform threat modeling activities across a variety of applications and environments Perform security assessments of existing architecture and make security recommendations for new deployments or changes more »
Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. • Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs …/Cisco/PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • Identity and Access Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell/building dashboards/au- tomating common tasks) Preferred: • Experience in designing more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
Birmingham, West Midlands (County), United Kingdom
Smart Sourcer Ltd
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threatmodelling, vulnerability assessment, control effectiveness review and risk assessment of a proposal or design and deliver a comprehensive, easy consumable report targeted to more »
/coach less experienced members of the team and fulfil this opportunity? Responsibilities: Provide support and consultation across all elements of Cyber Security including Threat intelligence, cyber risk management, security operations, data loss and fraud preventions, IDAM, vulnerability management and more. Arrange materials for the Cyber Risk and Information … threats, controls, gaps, and opportunities for improvement. Develop a Cyber risk and information security strategy. Oversee and manage the Security operations - KPIs/KRIs, threat analysis, ensuring quality of security control operations, develop security tooling etc. Responsible for the risk management and Governance Develop the NIST-based Cyber Security … the insurance/financial service industry. Security Frameworks - NIST Security standards - ISO 27001 Previous leadership experience - leading on teams and projects, assigning tasks etc. Threatmodelling - understand the threats to financial service businesses. Please get in touch - jenna@pioneer-search.com Cyber Security and Risk Consultant - 6-month contract more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
App security. Ability in software development or programming/Scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threatmodelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life Assurance at 4x Basic Annual Salary; Pension more »
App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threatmodelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life Assurance at 4x Basic Annual Salary; Pension more »
Luton, England, United Kingdom Hybrid / WFH Options
Hays
the companies’ clients, who are mainly in the defence sector, but can include government and non-defence clients. Conducting cyber risk assessment activities including threatmodelling, vulnerability analysis and analysis of mitigation solutions. Coordinating with other product engineers, system architects, and developers to provide oversight in the development more »
securely and efficiently. Perform thorough security assessments on GCP environments, utilizing GCP-specific security tools and technologies, to identify and address potential vulnerabilities. Conduct threat modeling and risk assessments for GCP deployments, designing effective security solutions tailored to GCP services. Collaborate with cross-functional teams to respond to GCP more »
You will have the opportunity to foster the growth and advancement of team members within the Application Security domain. You will also lead on threat modeling and conducting comprehensive security reviews of system designs. Skills Previously worked as an Application Security Engineer or similar position. Experience in either C# … and standards, e.g. OWASP, PCI-DSS, ISO 27001, GDPR. Strong knowledge of GitLab pipelines and Akamai security software is a major advantage. Experience in threatmodelling and automated security testing. Senior Application Security Engineer - Hybrid - £500 Outside IR35 more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Erin Associates
processes. Core skills & experience for this Security Analyst role: Security review methodologies: SAST, DAST, SBOM, SCA Implementing security tooling in CI/CD pipelines Threat modeling Code review (Java or C#) Familiarity with security frameworks like PCI, ISO 27001, Cyber Essentials This company offers structured training, career development opportunities … details, call 0161 438 1177 or follow us on Twitter @erinassociates for similar roles. Key words: Security Reviews, ISO Standards, SBOM, SCA, SAST, DAST, ThreatModelling, Security Tooling, Code Review, Manchester, North West, Java C#, Infosec, IT Security analyst Please get in touch on 0161 438 1177 if more »
within your current role, my client will be very interested in speaking with you. You will be training developers on writing secure code, perform threatmodelling and security testing of applications, run SAST, DAST, SCA and secret scanning tools, manage the bug bounty program and lead incident response more »
working withing the Financial Services Industry (Insurance or Exchange highly desirable) Hands on experience Operating application tools Must have subject matter expertise in application threatmodelling, secure coding practices in Java and C++, and DevSecOps practices. Must have current experience of operating SAST, SCA, DAST, IAST, MAST. Logistics more »
compliance in ISO 27001, GDPR, PCI DSS Have a strong understanding of network security principles and practices Be experienced in conducting risk assessments and threatmodelling Be generally proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusion detection more »
technology and business colleagues. Products that have the right security culture will strive to prioritize sustainable controls and driving real risk reduction outcomes.? Embed threatmodelling, solutions architecture, secure code review into product and application teams so they adopt our control products and create products that are secure more »
Greater London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
strategies. Master the art of penetration testing with tools like Burp Suite, OWASP ZAP, and/or Kali Linux. Experience with secure coding practices, threat modeling, and API security is highly desirable. Are a skilled communicator and collaborator, able to bridge the gap between technical and non-technical audiences. more »
needs Ability to translate technical detail into language board-level executives can understand. Ability to write deliverables to a high standard Experience with Attack & ThreatModelling Red Team testing and social engineering attack methodologies Extensive knowledge of the OWASP Testing Methodology Knowledge of networking protocols and the OSI more »
record of producing highly competent professionals. What you'll learn: A range of roles and methodologies in the tech industry What is Cyber Security ThreatModelling throughout the SDLC Vulnerabilities - social, hardware, software, networking, including the related technology Vulnerability scanning of operating systems, applications, and networks. Web Application more »
record of producing highly competent professionals. What you'll learn: A range of roles and methodologies in the tech industry What is Cyber Security ThreatModelling throughout the SDLC Vulnerabilities - social, hardware, software, networking, including the related technology Vulnerability scanning of operating systems, applications, and networks. Web Application more »
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Met Office
activities for projects, services, and third party suppliers. Leading the evaluation of business-supporting cyber security needs, undertake cyber security related risk assessments, conduct threatmodelling, and ensure activities are consistent with applicable regulations and legislation. Providing advice to a range of stakeholders on how to remedy identified more »
business. Responsibilities: Strategic Security Design : Develop comprehensive security architectures, integrating advanced security practices, to safeguard against emerging threats. Focus on cloud security, AI-driven threat detection, and the adoption of zero-trust principles. Standards and Frameworks : Define and update technical security standards and principles, incorporating industry best practices and … compliance requirements from frameworks such as NIST, ISO, and GDPR. Security Reviews and Threat Modeling : Conduct rigorous security assessments and threat modeling for ongoing and new projects, ensuring designs meet stringent security standards. Implement continuous improvement practices for threat identification and mitigation. Cross-functional Leadership : Lead cross more »
be aligned to a product area and will be responsible for embedding security. This is a varied role which will see you carrying out threatmodelling, reviewing solution designs and challenging everything to find security issues. The role will require you to regularly engage and challenge key senior more »