3 of 3 Threat Modelling Jobs in the East of England

Cyber GRC Consultant (DV Cleared)

Hiring Organisation
Sanderson Government and Defence
Location
Cambridgeshire, East Anglia, United Kingdom
Employment Type
Permanent
cloud infrastructures. Contribute to blogs and research within the business community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threat modelling, or related fields within Public Sector and MOD and will have achieved or be working towards Full Membership of CIISEC … NPSA and NCSC security policies, standards and guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, Key Management Systems, Containerisation, Network Security Groups ...

SOC Threat Detection Analyst

Hiring Organisation
Certain Advantage
Location
Stevenage, Hertfordshire, United Kingdom
Employment Type
Contract
Contract Rate
£45 - £85/hour Overtime Rate of time and a quarter
World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 8x SOC Threat Detection Analyst subcontractors on an initial 6 month contract. This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone … from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background. Hourly Rate: £45ph - £85 per hour. There are 8 positions being recruited across the mid-senior level. Overtime rate of time and a quarter. Contract Duration: 6 Months initially and long-term thereafter. Shift pattern ...

IAM Security Architect

Hiring Organisation
Hays
Location
Cambridge, Cambridgeshire, East Anglia, United Kingdom
Employment Type
Permanent, Work From Home
ensure compliance and security standard processes. Evaluate and integrate new identity tools, authentication platforms and access capabilities. Drive continuous improvement through risk assessments, threat modelling, and automation. What you'll need to succeed Strong practical experience in designing and running Identity and Access Management (IAM) solutions for both ...