4 of 4 Threat Modelling Jobs in Gloucestershire

Security Architect

Hiring Organisation
Matchtech
Location
Bradley Stoke, Gloucestershire, United Kingdom
Employment Type
Permanent
Salary
GBP Annual
Design principles are embedded from the ground up. Key Responsibilities: Identify and integrate security requirements throughout the product and system development lifecycle. Lead threat modelling and risk assessments, applying frameworks such as ISO/IEC 27001, NIST 800-30/53, and ISO 31000. Advise on secure architectures ...

Product Security Engineering Lead

Hiring Organisation
Renishaw PLC
Location
Wotton-Under-Edge, Gloucestershire, South West, United Kingdom
Employment Type
Permanent, Work From Home
Salary
£60,000
vulnerability assessment Experience securing hardware products controlled by software would be an advantage Experience applying AI to security and development use cases Familiar with threat modelling frameworks, and having experience with automated tools Knowledge and skills Excellent communication and collaboration skills to work effectively with cross-functional teams ...

Cybersecurity Assurance Consultant

Hiring Organisation
Expleo UK LTD
Location
Bristol, Gloucestershire, United Kingdom
Employment Type
Permanent
Salary
GBP Annual
manage stakeholder expectations. Support the preparation for and participation in technical reviews, audits, and risk acceptance activities. Contribute to delivering security risk management processes, threat modelling sessions, and security design assessments. Provide subject matter expertise on assurance requirements for secure communications, supply chain security, platform integration, and physical ...

Associate Cybersecurity Analyst - Third Party Technology Risk Management (3PTRM)

Hiring Organisation
Visa
Location
Cheltenham, Gloucestershire, UK
Employment Type
Full-time
UK. Essential Functions: Conduct comprehensive security reviews and assessments for suppliers and third-party partners, with particular emphasis on systems processing sensitive data. Perform threat modeling and detailed walkthroughs of cybersecurity controls to substantiate risk mitigation measures. Participate in and support security audits and onsite assessments, with a focus … cybersecurity, IT audit, or IT risk management, including a demonstrable understanding of third-party risk and supply chain security. Proven experience conducting security reviews, threat modeling, and risk assessments of systems containing sensitive data. Demonstrated experience performing security audits or assessments, with an emphasis on identifying threats and cybersecurity ...