Warwickshire, England, United Kingdom Hybrid / WFH Options
Pontoon
technology capabilities into business products and services, with a focus on ensuring the security of gas operations Define and document security architecture blueprints for new systems and applications, including threatmodelling and risk assessments Establish security standards, best practices, and design patterns to support cloud, physical and operational technologies Collaborate with development teams to integrate security controls into … application design Lead security architecture reviews and provide expert technical guidance on complex security challenges Keep up-to date with the latest security threat assessment frameworks such as OWASP, MITRE ATT&CK Assess security posture against industry regulations and compliance requirements Identify and mitigate security risks associated with new technologies and initiatives Perform security assessments to identify vulnerabilities Communicate More ❯
Warwickshire, England, United Kingdom Hybrid / WFH Options
Pontoon
technology capabilities into business products and services, with a focus on ensuring the security of gas operations Define and document security architecture blueprints for new systems and applications, including threatmodelling and risk assessments Establish security standards, best practices, and design patterns to support cloud, physical and operational technologies Collaborate with development teams to integrate security controls into … application design Lead security architecture reviews and provide expert technical guidance on complex security challenges Keep up-to date with the latest security threat assessment frameworks such as OWASP, MITRE ATT&CK Assess security posture against industry regulations and compliance requirements Identify and mitigate security risks associated with new technologies and initiatives Perform security assessments to identify vulnerabilities Communicate More ❯
or data leakage. • Integrate cloud-native security tools ( AWS Macie) for data discovery and classification. Security Monitoring & SIEM: • Integrate with SIEM platforms e.g., Splunk for real-time monitoring and threat detection. • Integrate logs and telemetry from Pega CRM, telephony/contact center platforms, and cloud data services. • Define correlation rules and alerts for proactive incident detection and response. Application … Security: • Conduct secure code reviews, threatmodelling, and vulnerability assessments. • Work with development and operations teams to integrate security into the SDLC and CI/CD pipelines. More ❯
will be able to demonstrate significant experience in working with senior stakeholders and within a Global team. You will have expertise in Network Security Architecture, with particular emphasis assessing threat landscapes, performing risk and impact assessment, defining security network zones, applying security tools and controls and managing any residual risk, both at a program and individual project level. Key … and governance improvements. Promote and support the embedding of security best practice in network architecture development processes to improve standardization. Track developments and changes in the digital business and threat environments to ensure that they are adequately addressed in security strategy plans and architecture artifacts. Monitor trends in information security and incorporate into Security Architecture Strategy. Work closely with … conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property (IP), as well as regulated or other protected data. Conduct or facilitate threatmodelling of network services and applications that ties to the risk, data and industry drivers associated with the service or application. Establish and deliver methods and tools which More ❯
of new technology. Your role and responsibilities As a Cybersecurity Architect, you will specialize in DevSecOps, integrating security into the software development lifecycle, automating security practices, and ensuring robust threat modeling and vulnerability management. Your primary focus will be on cloud-native and on-premises environments, with a strong emphasis on application security, infrastructure as code (IaC) security, and More ❯
deployment, and ongoing operations. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk registers, control implementation evidence, and compliance documentation. Provide … skills In-depth understanding of operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threatmodelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within large engineering More ❯
deployment, and ongoing operations. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk registers, control implementation evidence, and compliance documentation. Provide … skills In-depth understanding of operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threatmodelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within large engineering More ❯
domains as required across the business to continually improve the quality and potential of security solutions Demonstrable level of expertise of service management that may include compliance, standards, risk, threatmodelling, metric implementation, and maturity model management Collaborates with both enterprise and solution architects, bringing managed security services to life, sharing knowledge and bringing specific expertise into decision More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
risual Limited
organizational skills. Able to build and maintain strong relationships with clients, becoming a trusted advisor. Strong understanding of foundational IT and networking concepts Confident writing SIEM queries and performing threat-hunting Excellent communication skills, both written and oral, to a range of audiences, including senior management. Responsibilities Compiling and presenting high quality monthly reports for our clients, combining data … in-line with feedback from clients. Assisting with training and support for our junior analysts Proactively suggesting improvements for existing SIEM alarms and develop new use-cases based on threat intelligence and client threat models. Creating and improving SOC dashboards to give real time visibility for clients and stakeholders Onboarding new clients, including deploying technical resources, liaising with More ❯