Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
ensure the integration of security controls during the product development lifecycle. Develop and implement risk management strategies using relevant risk assessment frameworks & perform security threatmodelling and risk assessments using various threatmodelling tools Communicate risk findings and recommendations to stakeholders, including senior management and product More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Frontier Resourcing Ltd
ensure the integration of security controls during the product development lifecycle. Develop and implement risk management strategies using relevant risk assessment frameworks & perform security threatmodelling and risk assessments using various threatmodelling tools Communicate risk findings and recommendations to stakeholders, including senior management and product More ❯
City Of Bristol, England, United Kingdom Hybrid / WFH Options
Matchtech
by-design principles, ensuring security is embedded throughout the product lifecycle. Key Responsibilities Define and integrate security requirements into the product development lifecycle. Perform threatmodelling, risk assessments, and implement appropriate mitigation strategies. Advise on solution architecture to minimise security risks and ensure compliance with security standards. Collaborate … MOD-specific guidelines (e.g., JSP, Def Stan 05-138/139). Familiarity with HMG security principles and assurance frameworks is advantageous. Comfortable using threatmodelling tools and implementing mitigation strategies. Experience with NIST standards. (this is an absolute must) Key Competencies Strong communicator with the ability to More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
EDF Energy
About the Role Are you a Security Architect who specialises in Microsoft Azure with experience of Secure By Design & threatmodelling? If so, come and join EDF as a Security Architect! The Opportunity As a Security Architect you'll take responsibility for supporting the design and delivery of … security input into projects and technical change, ensuring that security is embedded from the outset, and you'll develop artefacts such a security designs, threat models and risk assessments to support solution delivery. The Security Architect will produce clear and concise documentation, maintaining alignment to internal governance processes and … pragmatic mindset to problem-solving, balancing ideal security outcomes with business priorities. We're looking for someone with hands-on experience in risk assessment, threatmodelling, security control selection, and integrating Secure by Design principles into technical delivery. You'll also have experience working within Agile and DevSecOps More ❯
manage stakeholder expectations. Support the preparation for and participation in technical reviews, audits, and risk acceptance activities. Contribute to delivering security risk management processes, threatmodelling sessions, and security design assessments. Provide subject matter expertise on assurance requirements for secure communications, supply chain security, platform integration, and physical … engineering context. Ability to interpret and apply security requirements across the engineering lifecycle, ensuring traceability and alignment with delivery controls. Capable of contributing to threatmodelling, risk assessments, and technical reviews with clear, structured input. Confident working independently in complex, multi-stakeholder environments while managing priorities and deadlines More ❯
manage stakeholder expectations. Support the preparation for and participation in technical reviews, audits, and risk acceptance activities. Contribute to delivering security risk management processes, threatmodelling sessions, and security design assessments. Provide subject matter expertise on assurance requirements for secure communications, supply chain security, platform integration, and physical … engineering context. Ability to interpret and apply security requirements across the engineering lifecycle, ensuring traceability and alignment with delivery controls. Capable of contributing to threatmodelling, risk assessments, and technical reviews with clear, structured input. Confident working independently in complex, multi-stakeholder environments while managing priorities and deadlines More ❯
draw upon Enterprise Security Architecture or Security Solutions Architecture to: Identify business objectives, user needs, risk appetite and cyber security obligations Identify vulnerabilities, perform threatmodelling, undertake risk assessment, evaluate the effectiveness of security controls Verify and evidence alignment to 'Secure by Design' principles, corporate security policy/… of established patterns, principles and guidelines Research emerging technologies, new products and be able to position these in a coherent manner against the developing threat landscape and client risk appetite Ability to distil complex information and concepts into key discussion points that identifies a path to resolution rather than … practice within Cloud platforms (AWS and/or Microsoft Azure) In-depth knowledge of modern security concepts, common attack vectors, malware, security analytics and threat intelligence. A good understanding of security testing and vulnerability management is important (including pen testing/ITHC, CVSS/CVE) Experience working with security More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & access management, threatmodelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure by Design, and architecture standards. Proven experience leading More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and implement mitigation measures. Integrate secure coding practices into the software development lifecycle. Perform security code reviews and ensure secure-by-design principles. Conduct threatmodelling exercises to identify and mitigate potential risks. Ensure compliance with security regulations such as ISO27001, NIST 800-30/37/ More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and implement mitigation measures. Integrate secure coding practices into the software development lifecycle. Perform security code reviews and ensure secure-by-design principles. Conduct threatmodelling exercises to identify and mitigate potential risks. Ensure compliance with security regulations such as ISO27001, NIST 800-30/37/ More ❯
Bradford, south west england, United Kingdom Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threatmodelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
security strategy and ensure security is embedded at every stage of development. Key Responsibilities: Perform in-depth security reviews, including secure code reviews and threat modelling. Develop and implement security controls to align with frameworks such as ISO 27001, NIST, and CIS benchmarks. Collaborate with development teams to enhance More ❯
Newbury, south west england, United Kingdom Hybrid / WFH Options
Hays
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … network protocols (e.g., TCP/IP, HTTP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
in: Identify security requirements and ensure the integration of security controls during the product development lifecycle Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Matchtech
ll Be Doing: Performing product risk assessments and identifying vulnerabilities across platforms. Collaborating with developers to integrate secure coding practices from the start. Leading threatmodelling exercises and developing mitigation strategies. Conducting security code reviews and offering guidance to ensure a secure-by-design approach. Ensuring products meet More ❯
in: Identify security requirements and ensure the integration of security controls during the product development lifecycle Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & access management, threatmodelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure by Design, and architecture standards. Proven experience leading More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
drive remediation with development and operations teams. Secure Development Practices Partner with software and hardware engineers to integrate secure coding and design principles (e.g., threatmodelling, secure-by-design). Perform security code reviews, provide guidance on secure libraries and frameworks. Standards & Compliance Ensure products meet regulatory and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Frontier Resourcing Ltd
drive remediation with development and operations teams. Secure Development Practices Partner with software and hardware engineers to integrate secure coding and design principles (e.g., threatmodelling, secure-by-design). Perform security code reviews, provide guidance on secure libraries and frameworks. Standards & Compliance Ensure products meet regulatory and More ❯
throughout the software development lifecycle Perform security code reviews and provide security guidance during product design and development to ensure Secure by Design Conduct threatmodelling exercises to prioritise potential risks and develop mitigation strategies to reduce risks Ensure products meet regulatory standards such as ISO27001, NIST More ❯
throughout the software development lifecycle Perform security code reviews and provide security guidance during product design and development to ensure Secure by Design Conduct threatmodelling exercises to prioritise potential risks and develop mitigation strategies to reduce risks Ensure products meet regulatory standards such as ISO27001, NIST More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Pertemps
practices, ensuring products meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure … Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
practices, ensuring products meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure … Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and More ❯
easyJet is overseen by 3 Aviation Regulators, each with their own cyber security control expectations, along with legal compliance requirements and a changing cyber threat landscape. The Technical Assurance team is responsible for overseeing easyJet’s strong cyber security posture. We help functions adopt and improve control adoption as … Safety, Data Teams, IT operations and our IT teams to minimise data breaches or data leaks. Working with the Cyber Architecture to validate the threat models produced as part of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk More ❯