systems. The Security Architect will draw upon Enterprise Security Architecture or Security Solutions Architecture to: - Identify business objectives, user needs, risk appetite and cyber security obligations - Identify vulnerabilities, perform threatmodelling, undertake risk assessment, evaluate the effectiveness of security controls - Verify and evidence alignment to 'Secure by Design' principles, corporate security policy/standards as well as industry … Contribute to a reference architecture of established patterns, principles and guidelines Research emerging technologies, new products and be able to position these in a coherent manner against the developing threat landscape and client risk appetite Ability to distil complex information and concepts into key discussion points that identifies a path to resolution rather than only the identification of challenges … native security capabilities and good practice within Cloud platforms (AWS and/or Microsoft Azure) In-depth knowledge of modern security concepts, common attack vectors, malware, security analytics and threat intelligence. A good understanding of security testing and vulnerability management is important (including pen testing/ITHC, CVSS/CVE) Experience working with security standards such as ISO More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
also contribute to security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and …/53, OWASP) . Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
also contribute to security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and …/53, OWASP) . Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
Conduct risk assessments, identify vulnerabilities, and implement mitigation measures. Integrate secure coding practices into the software development lifecycle. Perform security code reviews and ensure secure-by-design principles. Conduct threatmodelling exercises to identify and mitigate potential risks. Ensure compliance with security regulations such as ISO27001, NIST 800-30/37/53, JSP 440, 604, and Defence More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
Conduct risk assessments, identify vulnerabilities, and implement mitigation measures. Integrate secure coding practices into the software development lifecycle. Perform security code reviews and ensure secure-by-design principles. Conduct threatmodelling exercises to identify and mitigate potential risks. Ensure compliance with security regulations such as ISO27001, NIST 800-30/37/53, JSP 440, 604, and Defence More ❯
Threat Hunter UK (Manchester, Cheltenham or London) We are seeking a highly capable and hands-on Threat Hunter to design and lead a professional threat hunting capability focused on identifying sophisticated adversaries through hypothesis-driven analysis and automation. You will be responsible for proactively detecting and analysing advanced threats across the customers environment. Ensuring our threat models and threat hunts are tightly aligned to industry risks to the customer. This is a high-impact role with significant autonomy. You’ll need to think critically, and hunt methodically. As a Threat Hunter, you will actively search for cyber threats that evade traditional security solutions. Your role will involve conducting in-depth analysis, identifying indicators … of compromise (IOCs), and working cross-functionally with the Security Operations Centre Analysts, Detection Engineers, Privacy Team and Engineering Team to mitigate risks. Summary Threat Detection and Monitoring: Design, build, and own a formal threat hunting program with a strong emphasis on hypothesis-based hunting methodologies. Use threat intelligence, MITRE ATT&CK, and risk models to form More ❯
mission-driven Data Scientist to join our team supporting high-impact initiatives in the Defence and National Security sector. You will apply advanced analytical techniques, machine learning, and statistical modelling to solve complex operational challenges. Working within a secure, multidisciplinary environment, you'll help deliver data-driven insights to support decision-making, threat detection, intelligence analysis, and national … algorithms, and statistical analyses to support defence and national security operations. Work with structured and unstructured data from diverse sources such as sensors, ISR feeds, satellite imagery, communications, cyber threat logs, and intelligence reports. Collaborate with domain experts, analysts, and engineers to understand mission needs and translate them into actionable data science problems. Design and build data pipelines and … C security clearance. Proficient in Python and/or R, with experience using data science libraries (e.g., Pandas, NumPy, Scikit-learn, TensorFlow, PyTorch). Strong statistical, mathematical, and data modelling skills. Experience with data visualisation tools (e.g., Power BI, Tableau, matplotlib, Plotly). Familiarity with big data tools and cloud platforms (e.g., Hadoop, Spark, Azure, AWS). Ability to More ❯
Old Down, Gloucestershire, United Kingdom Hybrid / WFH Options
Matchtech
thrive in a collaborative, high-impact environment - this is your chance to make a real difference. Key Responsibilities Define and embed security requirements throughout the product development lifecycle. Conduct threatmodelling, risk assessments, and drive mitigation strategies. Advise on solution architecture, minimising security risks and ensuring compliance. Collaborate with cross-functional teams to implement security best practices. Support … by Design principles and MOD-specific guidelines (e.g. JSP, Def Stan 05-138/139). Familiarity with HMG security and assurance frameworks is a strong plus. Comfortable using threatmodelling tools and risk assessment methodologies. Key Competencies: Excellent communicator - confident, clear, and influential. Proactive problem-solver with critical thinking skills. Organised, resilient, and delivery-focused. Strong team More ❯
is embedded throughout the SDLC. Main Responsibilities: Define and enforce secure architecture standards and frameworks across web, mobile, and cloud-native applications. Provide security guidance throughout product development, including threat modeling, secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static … for this role, you should have: Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threatmodelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. More ❯
is embedded throughout the SDLC. Main Responsibilities: Define and enforce secure architecture standards and frameworks across web, mobile, and cloud-native applications. Provide security guidance throughout product development, including threat modeling, secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static … for this role, you should have: Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threatmodelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Be Doing: Actively identifying vulnerabilities in applications, especially around authentication flows, payments, and sensitive data handling Thinking creatively and adversarially – “breaking the app” to protect it Performing penetration testing, threatmodelling, and secure code reviews Working directly with developers to integrate security best practices into an already-operational DevSecOps pipeline Advising on product and architectural design from a More ❯
stakeholders to embed security throughout the SDLC. Main Responsibilities: Define and enforce secure architecture standards across web, mobile, and cloud-native applications. Provide security guidance during product development, including threat modeling, secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/… for code analysis and runtime protection. Qualifications: Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding More ❯
stakeholders to embed security throughout the SDLC. Main Responsibilities: Define and enforce secure architecture standards across web, mobile, and cloud-native applications. Provide security guidance during product development, including threat modeling, secure coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application vulnerabilities through static/… code analysis and runtime protection. Qualifications: Proven experience in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding More ❯
what you will be involved in: Identify security requirements and ensure the integration of security controls during the product development lifecycle Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure by Design principles Identify security More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Grid, or Event Hub Practical experience with Infrastructure as Code tools like Terraform and Bicep Excellent communication skills and the ability to support and mentor junior colleagues Experience with threatmodelling Background working on globally distributed systems Exposure to financial services or highly regulated environments Who Should Apply: This role is suited to individuals seeking a challenging, high More ❯
and mentoring junior team members, will play a key role in fostering a proactive security culture. Preferred Skills, Qualifications and Experience Demonstrated mastery in securing iOS platforms, including advanced threatmodelling and the design of sophisticated anti-cheat mechanisms. Excellent command of low-level systems programming and operating system internals. Extensive experience in reverse engineering, with additional knowledge … work efficiently with development, infrastructure, and information security teams, ensuring seamless integration of security features. Creative approach to security challenges with a relentless drive to stay ahead of emerging threat landscapes. Main Responsibilities Leading initiatives to identify, analyse, and reverse engineer sophisticated exploits, vulnerabilities, and cheat mechanisms, formulating and executing robust countermeasures. Defining, designing and implementing advanced, scalable anti … robust security features, setting strategic direction on secure development practices. Providing technical leadership and mentorship to junior developers and security engineers, fostering a culture of continuous learning and proactive threat mitigation. Assessing emerging threat vectors and hacker tactics, then updating and refining security strategies and policies to maintain the Company’s competitive edge. Guiding the creation and maintenance More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
to identify weaknesses, assess risks, and develop mitigation strategies. What You'll Be Doing Researching, designing, and building resilient systems to support National Security objectives. Conducting vulnerability assessments and threatmodelling on software and hardware components. Reverse engineering a wide range of technologies to uncover vulnerabilities and improve security. Writing secure, high-performance code that integrates deeply with More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Thales Group
the delivery of high-quality, secure, and scalable applications on the cloud with automated tools and scripts Work with the product owner to address user needs Participate in agile threatmodelling and vulnerability management Ensure compliance with security and regulatory requirements for MOD and high Design assurance software Support the Customer Enterprise/Solution Data Architects in coordinating More ❯
About the role Do you want to be at the forefront of cyber security, protecting people, data and systems from the evolving digital threat landscape? Are you looking to apply your technical expertise in a collaborative and forward-thinking environment? As a Technical Security Analyst, you'll be part of our Security team who are responsible for keeping our … ensuring that findings are managed appropriately and remediated according to agreed timescales. Assisting in the creation, testing, and implementation of response and recovery plans in support of incident management threat modelling. Researching and investigating attack techniques and recommending ways to defend against them. Supporting the Security function in all aspects of Security operations and management reporting. Performing technical assessments More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
and experience: - Experience designing a Security Operations Centre (SOC) within a secure environment Experience implementing a target operating model for a Security Operations Centre Expertise in security monitoring design, threat detection, and incident response Experience in selecting tools for Security Information and Event Management (SIEM) Proficiency in IT security documentation, including policies, standards, processes, procedures, and patterns Experience in … risk and threatmodelling within a high-threat government environment To apply, please submit your latest CV for review More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
in a start-up or scale-up previously) You'll be skilled in building and working with security tools and automation solutions. You'll have a solid foundation in threatmodelling, risk assessment, and penetration testing. Amazing if you've came from a software engineering background, but at the very least you'll be able to read code More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
mentoring junior team members will play a key role in fostering a proactive security culture. Preferred Skills, Qualifications and Experience Demonstrated mastery in securing web client platforms, including advanced threatmodelling and the design of sophisticated anti-cheat mechanisms. Excellent command in low-level systems programming, with extensive understanding of virtualisation and bytecode interpreter. Proven experience in architecting … and secure key management practices. Passionate for uncovering vulnerabilities and staying ahead of potential attackers. Creative approach to security challenges, with a relentless drive to stay ahead of emerging threat landscapes. Demonstrable ability to lead, coach, and inspire security engineering teams, driving best practices and ensuring continuous knowledge sharing. Main Responsibilities Leading initiatives to identify, analyse and reverse engineer … threats and hacker behaviour to refine and adapt security strategies. Providing technical leadership and mentorship to junior developers and security engineers, fostering a culture of continuous learning and proactive threat mitigation. Assessing emerging threat vectors and hacker tactics, then update and refine security strategies and policies to maintain the Company’s competitive edge. Guiding the creation and maintenance More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
techniques. This role will challenge you to leverage your Android platform knowledge, reverse engineering and mobile security expertise to keep the Business one step ahead in today’s dynamic threat landscape. Preferred skills and experience Experience in Android security, mobile threatmodelling and developing anti-cheat measures. Proficient in low-level systems programming, operating system internals and More ❯
techniques. This role will challenge you to leverage your iOS platform knowledge, reverse engineering and mobile security expertise to keep the Business one step ahead in today’s dynamic threat landscape. Preferred Skills, Qualifications and Experience Experience in iOS security, mobile threatmodelling and developing anti-cheat measures. Proficient in low-level systems programming, operating system internals More ❯