sensor technology. Protecting these systems from security threats is vital to ensuring the safety of both vehicles and passengers. Key Responsibilities: Security SME for threatmodelling of cloud-powered vehicle connectivity platforms Ensuring the security of mobile integrations, over-the-air updates, and digital services Collaborating with developers … embed security thinking into every stage of development Requirements: Strong expertise in cloud security, particularly with AWS, authentication, PKI, and related areas Experience in threatmodelling, particularly identifying and addressing security risks in cloud-based products Excellent communication skills to collaborate effectively with developers and security teams A More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threatmodelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical … security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. What More ❯
application landscapes. What you’ll need: 3+ years in a security architecture or cyber consulting role Deep knowledge of enterprise security services – Pen Testing, ThreatModelling, Logging, Vulnerability Mgmt, and Incident Response Proven ability to produce secure design templates and influence technical direction Excellent communication, stakeholder management, and More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Senitor Associates
application landscapes. What you’ll need: 3+ years in a security architecture or cyber consulting role Deep knowledge of enterprise security services – Pen Testing, ThreatModelling, Logging, Vulnerability Mgmt, and Incident Response Proven ability to produce secure design templates and influence technical direction Excellent communication, stakeholder management, and More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
solutions, integrating security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threatmodelling, vulnerability assessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance More ❯
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threatmodelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threatmodelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Bradford, south west england, united kingdom Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threatmodelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
conjunction with solution architects, product owners, technical leads and embedded security champions to identify the security risks associated with our products using application security threat modelling. You will collaborate with stakeholders to identify secure architectures, best practices and requirements that enable us to deploy secure systems at scale. You … conjunction with solution architects, product owners, technical leads and embedded security champions to identify the security risks associated with our products using application security threat modelling. You will collaborate with stakeholders to identify secure architectures, best practices and requirements that enable us to deploy secure systems at scale. You … aligned with our products. Candidates will have a background in software engineering or cyber security, with knowledge of DevSecOps, familiarity of application security and threatmodelling, experience implementing SDLC process, technology, and automation in a DevOps environment; ideally making use of OWASP best practice, experience within agile delivery More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Proactive.IT Appointments Limited
/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of the information security standards domain Experience of working with external audit and certification More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Proactive.IT Appointments Limited
Security/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of information security standards Experience working with external audit and certification organizations Familiarity with More ❯
platforms. Familiar with compliance frameworks such as NIST, ISO 27001 and how they apply to cloud applications. The ability to run risk assessments and threatmodelling for cloud-native applications. Excellent communication skills with the ability to translate technical concepts to business stakeholders. Role: Security Analyst (Cloud) Location More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
Proactive Appointments Limited
/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of the information security standards domain Experience of working with external audit and certification More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Oscar
platforms. Familiar with compliance frameworks such as NIST, ISO 27001 and how they apply to cloud applications. The ability to run risk assessments and threatmodelling for cloud-native applications. Excellent communication skills with the ability to translate technical concepts to business stakeholders. Role: Security Analyst (Cloud) Location More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
platforms. Familiar with compliance frameworks such as NIST, ISO 27001 and how they apply to cloud applications. The ability to run risk assessments and threatmodelling for cloud-native applications. Excellent communication skills with the ability to translate technical concepts to business stakeholders. Role: Security Analyst (Cloud) Location More ❯
Immingham, Lincolnshire, North East, United Kingdom Hybrid / WFH Options
Rullion Limited
Responsibilities Lead cyber risk assessment activities across IT and OT environments, correlating outputs into strategic risk tracking. Manage the cyber security risk toolkit , including threatmodelling, attack trees, and scenario-based exercises. Develop and implement cyber security policies, processes, and staff training aligned with Secure by Design principles. … Oversee first-line security operations , including outsourced 24/7 SOC management . Define and manage cyber threat intelligence requirements . Provide cyber risk consultancy for business development projects, ensuring regulatory compliance. Contribute to supply chain risk management , assessing supplier security risks. Act as Deputy NIS Reporting Officer (NRO More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
慨正橡扯
tools. Excellent understanding and experience with manual security testing to find vulnerabilities and logical issues. Knowledge and understanding of OWASP and its utilisation within threat modelling. Experience of software development and languages. Working knowledge of CI and CD pipelines and associated security tooling. Use of planned structured methodologies for … considered throughout the lifecycle. Identifying and managing any security flaws within our software through appropriately liaising with external bodies where necessary. Performing risk assessments, threatmodelling and design reviews to ensure effective security controls. Identifying opportunities for converting manual tasks into automated processes and identify tooling to support More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Jet2.com Limited
Shape, create or own cloud security strategy, policies, tools and services. Evaluate and shape responses to cloud alerts and events from security tools. Conduct threatmodelling and develop cloud security incident response plans. Provide security consultation as a cloud security SME in forums and to other teams. Provide More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
RSM UK
trends, cyber threats, and industry issues. Excellent written and oral communication, report writing, and presentation skills. Experience of executing security testing techniques such as threatmodelling, reconnaissance, social engineering, enumeration, attack path mapping, exploitation, and clean up from a variety of adversarial perspectives (white/grey/black More ❯
one of the following areas: IP networking & OT On-premises architecture and Virtualization Cloud platforms and Containerization Databases and LLMs Mobile Technologies & Application security Threat modeling techniques to identify security threats to systems, leading to the definition of Security requirements. Managing security requirements through the delivery and operational life … cycle of a system. Provision of authoritative specialist security advice in: Risk and threat-based mitigation to system designs. Control frameworks such as NIST, ISO, CIS. Protective monitoring, Authentication and authorization best practices. Develop excellent working relationships with key stakeholders, peers and subordinates. Communicating effectively verbally and in writing More ❯
OT security monitoring, alerting, and investigations. Collaborate with diverse stakeholders and functions to address cybersecurity incidents, alerts, and the implementation of security technologies. Conduct threat hunting, develop threat models, identify threat vectors, and create use cases for effective security monitoring. What do you need to thrive in More ❯
OT security monitoring, alerting, and investigations. Collaborate with diverse stakeholders and functions to address cybersecurity incidents, alerts, and the implementation of security technologies. Conduct threat hunting, develop threat models, identify threat vectors, and create use cases for effective security monitoring. What do you need to thrive in More ❯
directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design principles to cloud environments … web apps, and mobile apps Proficiency in understanding authentication, authorization, and cryptography, with familiarity around modern security standards and best practices. Proficiency in data modelling of roles, permissions, and capabilities Experience with OAuth 2.0 nuances, best practices, and shortcomings Experience securely running and operating web applications, web services, and More ❯
designing secure systems. Experience implementing and integrating with secure RESTful Web Services. Experience with AWS security services such as KMS and ACM. Experience with threat modeling and an awareness of the Internet threat model. Experience with DevOps environments that support security at speed, i.e., SecDevOps. Ability to accurately More ❯