bradford, yorkshire and the humber, united kingdom
HMRC
to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. Cyber Threat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers a diverse range of responsibilities across the span … of anti-phishing, brand abuse management, cyber threat intelligence, data science, and threat hunting. We are seeking an G7 Cyber Threat Intelligence Lead, who will report to the G6 Head of CTO. The successful candidate will manage three SO Cyber Threat Intelligence Managers and one SO … Threat Hunting Manager. Job descriptionAs the Cyber Threat Intelligence Lead, on a day-to-day basis you will be overseeing and directing the work of Cyber Threat Intelligence and Threat Hunting which will involve: Overseeing the delivery of high quality cyber threat analysis at the More ❯
to protect and preserve the ability of HMRC to function and serve the public against threats posed by possible cyber-attacks is critical. Cyber Threat Operations (CTO) is part of the Cyber Security Delivery (CSD) function in HMRC Security. CTO covers a diverse range of responsibilities across the span … of anti-phishing, brand abuse management, cyber threat intelligence, data science, and threat hunting. We are seeking an G7 Cyber Threat Intelligence Lead, who will report to the G6 Head of CTO. The successful candidate will manage three SO Cyber Threat Intelligence Managers and one SO … Threat Hunting Manager. Job description As the Cyber Threat Intelligence Lead, on a day-to-day basis you will be overseeing and directing the work of Cyber Threat Intelligence and Threat Hunting which will involve: Overseeing the delivery of high quality cyber threat analysis at More ❯
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threatmodelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
bradford, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threatmodelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Bradford, south west england, United Kingdom Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threatmodelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
doncaster, yorkshire and the humber, united kingdom Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threatmodelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
leeds, west yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threatmodelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
wakefield, yorkshire and the humber, united kingdom Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threatmodelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
bradford, yorkshire and the humber, united kingdom Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threatmodelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
york, yorkshire and the humber, united kingdom Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threatmodelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threatmodelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
Harvey Nash
delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threatmodelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with More ❯
Portsmouth, yorkshire and the humber, United Kingdom
TalentHawk
through formal tender process, feasibilities phases, design phases, implementation, and validation phases, including risk assessments Security Architecture and Design- Review of design documents, performing threatmodelling and risk assessments, incorporating security non-functional requirements and be a standing member of Technical Design Authority Be the Security touchpoint for More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Jet2.com Limited
Shape, create or own cloud security strategy, policies, tools and services. Evaluate and shape responses to cloud alerts and events from security tools. Conduct threatmodelling and develop cloud security incident response plans. Provide security consultation as a cloud security SME in forums and to other teams. Provide More ❯
people, process and technology within the TransUnion Monevo portfolio. Day to Day You’ll Be: Guides and advises technology teams on infrastructure vulnerability and threat management principles, secure coding practices, secure software development methodologies, and secure development lifecycle (SDLC) processes Works with engineering and development team to ensure in … and partners with functional areas and leadership across the business and Global Technology to raise awareness and support for Product Security When necessary, conducts Threat Modeling of products and applications within the organization to identify potential threats and vulnerabilities Provides periodic updates, education and presentations to staff and management … on compliance with policies, standard, regulations and best practices 3+ years of information security experience in cloud environments. In depth experience secure coding practices, threat modeling, secure architecture design, and secure SDLC/CICD pipelines In-depth technical experience with identifying and advising on the remediation of application security More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
TransUnion
people, process and technology within the TransUnion Monevo portfolio. Day to Day You’ll Be: Guides and advises technology teams on infrastructure vulnerability and threat management principles, secure coding practices, secure software development methodologies, and secure development lifecycle (SDLC) processes Works with engineering and development team to ensure in … and partners with functional areas and leadership across the business and Global Technology to raise awareness and support for Product Security When necessary, conducts Threat Modeling of products and applications within the organization to identify potential threats and vulnerabilities Provides periodic updates, education and presentations to staff and management … on compliance with policies, standard, regulations and best practices 3+ years of information security experience in cloud environments. In depth experience secure coding practices, threat modeling, secure architecture design, and secure SDLC/CICD pipelines In-depth technical experience with identifying and advising on the remediation of application security More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
HSBC
Strong cybersecurity experience and/or controls and governance experience, especially in Vulnerability Management (scanning, assessment, remediation) and Security Assurance (automated scanning, penetration testing, threat modeling). Experience in identifying control design and implementation deficiencies, recommending remedial actions, and assuring the adequacy of remediation. Knowledge of cybersecurity principles such … as identity access management, threat and incident management, network security, and contemporary application development methodologies (e.g., Agile). Deep understanding of control design and common implementations in heterogeneous and complex technology environments. Strong interpersonal skills, with the ability to succeed within a matrix management structure. Ability to work well More ❯