Threat Modelling Jobs in Yorkshire

17 of 17 Threat Modelling Jobs in Yorkshire

Cyber Threat Intelligence Lead

bradford, yorkshire and the humber, united kingdom
HMRC
to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. Cyber Threat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers a diverse range of responsibilities across the span … of anti-phishing, brand abuse management, cyber threat intelligence, data science, and threat hunting. We are seeking an G7 Cyber Threat Intelligence Lead, who will report to the G6 Head of CTO. The successful candidate will manage three SO Cyber Threat Intelligence Managers and one SO … Threat Hunting Manager. Job descriptionAs the Cyber Threat Intelligence Lead, on a day-to-day basis you will be overseeing and directing the work of Cyber Threat Intelligence and Threat Hunting which will involve: Overseeing the delivery of high quality cyber threat analysis at the More ❯
Posted:

Cyber Threat Intelligence Lead

Leeds, West Yorkshire, Yorkshire, United Kingdom
HMRC
to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. Cyber Threat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers a diverse range of responsibilities across the span … of anti-phishing, brand abuse management, cyber threat intelligence, data science, and threat hunting. We are seeking an G7 Cyber Threat Intelligence Lead, who will report to the G6 Head of CTO. The successful candidate will manage three SO Cyber Threat Intelligence Managers and one SO … Threat Hunting Manager. Job description As the Cyber Threat Intelligence Lead, on a day-to-day basis you will be overseeing and directing the work of Cyber Threat Intelligence and Threat Hunting which will involve: Overseeing the delivery of high quality cyber threat analysis at More ❯
Employment Type: Permanent
Salary: £60,000
Posted:

Technology Manager - Security Architecture (Bradford)

Bradford, UK
Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threat modelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Employment Type: Part-time
Posted:

Technology Manager - Security Architecture

bradford, yorkshire and the humber, United Kingdom
Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threat modelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Posted:

Technology Manager - Security Architecture

Bradford, south west england, United Kingdom
Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threat modelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Posted:

Security Architect

doncaster, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threat modelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
Posted:

Security Architect

leeds, west yorkshire, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threat modelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
Posted:

Security Architect

wakefield, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threat modelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
Posted:

Security Architect

bradford, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threat modelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
Posted:

Security Architect

york, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threat modelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
Posted:

Security Architect

sheffield, south yorkshire, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threat modelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
Posted:

Security Architect

kingston upon hull, east yorkshire, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threat modelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
Posted:

Information Security Consultant

Portsmouth, yorkshire and the humber, United Kingdom
TalentHawk
through formal tender process, feasibilities phases, design phases, implementation, and validation phases, including risk assessments Security Architecture and Design- Review of design documents, performing threat modelling and risk assessments, incorporating security non-functional requirements and be a standing member of Technical Design Authority Be the Security touchpoint for More ❯
Posted:

Cloud Security Specialist

Leeds, Yorkshire, United Kingdom
Hybrid / WFH Options
Jet2.com Limited
Shape, create or own cloud security strategy, policies, tools and services. Evaluate and shape responses to cloud alerts and events from security tools. Conduct threat modelling and develop cloud security incident response plans. Provide security consultation as a cloud security SME in forums and to other teams. Provide More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Information Security Consultant (Leeds)

Leeds, UK
TransUnion
people, process and technology within the TransUnion Monevo portfolio. Day to Day You’ll Be: Guides and advises technology teams on infrastructure vulnerability and threat management principles, secure coding practices, secure software development methodologies, and secure development lifecycle (SDLC) processes Works with engineering and development team to ensure in … and partners with functional areas and leadership across the business and Global Technology to raise awareness and support for Product Security When necessary, conducts Threat Modeling of products and applications within the organization to identify potential threats and vulnerabilities Provides periodic updates, education and presentations to staff and management … on compliance with policies, standard, regulations and best practices 3+ years of information security experience in cloud environments. In depth experience secure coding practices, threat modeling, secure architecture design, and secure SDLC/CICD pipelines In-depth technical experience with identifying and advising on the remediation of application security More ❯
Employment Type: Part-time
Posted:

Senior Information Security Consultant

leeds, west yorkshire, yorkshire and the humber, United Kingdom
TransUnion
people, process and technology within the TransUnion Monevo portfolio. Day to Day You’ll Be: Guides and advises technology teams on infrastructure vulnerability and threat management principles, secure coding practices, secure software development methodologies, and secure development lifecycle (SDLC) processes Works with engineering and development team to ensure in … and partners with functional areas and leadership across the business and Global Technology to raise awareness and support for Product Security When necessary, conducts Threat Modeling of products and applications within the organization to identify potential threats and vulnerabilities Provides periodic updates, education and presentations to staff and management … on compliance with policies, standard, regulations and best practices 3+ years of information security experience in cloud environments. In depth experience secure coding practices, threat modeling, secure architecture design, and secure SDLC/CICD pipelines In-depth technical experience with identifying and advising on the remediation of application security More ❯
Posted:

Senior Control Manager Cyber Security

Sheffield, Yorkshire, United Kingdom
Hybrid / WFH Options
HSBC
Strong cybersecurity experience and/or controls and governance experience, especially in Vulnerability Management (scanning, assessment, remediation) and Security Assurance (automated scanning, penetration testing, threat modeling). Experience in identifying control design and implementation deficiencies, recommending remedial actions, and assuring the adequacy of remediation. Knowledge of cybersecurity principles such … as identity access management, threat and incident management, network security, and contemporary application development methodologies (e.g., Agile). Deep understanding of control design and common implementations in heterogeneous and complex technology environments. Strong interpersonal skills, with the ability to succeed within a matrix management structure. Ability to work well More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted: