Threat Modelling Jobs in the North of England

21 of 21 Threat Modelling Jobs in the North of England

Software engineer

Manchester, Lancashire, United Kingdom
TieTalent
sensor technology. Protecting these systems from security threats is vital to ensuring the safety of both vehicles and passengers. Key Responsibilities: Security SME for threat modelling of cloud-powered vehicle connectivity platforms Ensuring the security of mobile integrations, over-the-air updates, and digital services Collaborating with developers … embed security thinking into every stage of development Requirements: Strong expertise in cloud security, particularly with AWS, authentication, PKI, and related areas Experience in threat modelling, particularly identifying and addressing security risks in cloud-based products Excellent communication skills to collaborate effectively with developers and security teams A More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
The MRJ Group
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threat modelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical … security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. What More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architect

Manchester, UK
Hybrid / WFH Options
Senitor Associates
application landscapes. What you’ll need: 3+ years in a security architecture or cyber consulting role Deep knowledge of enterprise security services – Pen Testing, Threat Modelling, Logging, Vulnerability Mgmt, and Incident Response Proven ability to produce secure design templates and influence technical direction Excellent communication, stakeholder management, and More ❯
Posted:

Security Architect

Manchester Area, United Kingdom
Hybrid / WFH Options
Senitor Associates
application landscapes. What you’ll need: 3+ years in a security architecture or cyber consulting role Deep knowledge of enterprise security services – Pen Testing, Threat Modelling, Logging, Vulnerability Mgmt, and Incident Response Proven ability to produce secure design templates and influence technical direction Excellent communication, stakeholder management, and More ❯
Posted:

Security Solution Architect + Gen AI

Knutsford, Cheshire, North West, United Kingdom
Hybrid / WFH Options
Eteam Workforce Limited
solutions, integrating security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modelling, vulnerability assessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance More ❯
Employment Type: Contract
Rate: £671 per day
Posted:

Technology Manager - Security Architecture

Bradford, UK
Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threat modelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Posted:

Technology Manager - Security Architecture

Bradford, England, United Kingdom
Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threat modelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Posted:

Technology Manager - Security Architecture

Bradford, south west england, united kingdom
Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threat modelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Posted:

Cyber Security Architect

Manchester, United Kingdom
Sarah Harvey
conjunction with solution architects, product owners, technical leads and embedded security champions to identify the security risks associated with our products using application security threat modelling. You will collaborate with stakeholders to identify secure architectures, best practices and requirements that enable us to deploy secure systems at scale. You … conjunction with solution architects, product owners, technical leads and embedded security champions to identify the security risks associated with our products using application security threat modelling. You will collaborate with stakeholders to identify secure architectures, best practices and requirements that enable us to deploy secure systems at scale. You … aligned with our products. Candidates will have a background in software engineering or cyber security, with knowledge of DevSecOps, familiarity of application security and threat modelling, experience implementing SDLC process, technology, and automation in a DevOps environment; ideally making use of OWASP best practice, experience within agile delivery More ❯
Employment Type: Contract
Rate: £69/hour
Posted:

Security Architect - 10942SR

Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Proactive.IT Appointments Limited
/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of the information security standards domain Experience of working with external audit and certification More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architect - 10942SR1

Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Proactive.IT Appointments Limited
Security/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of information security standards Experience working with external audit and certification organizations Familiarity with More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architect

Manchester, UK
Hybrid / WFH Options
Oscar
platforms. Familiar with compliance frameworks such as NIST, ISO 27001 and how they apply to cloud applications. The ability to run risk assessments and threat modelling for cloud-native applications. Excellent communication skills with the ability to translate technical concepts to business stakeholders. Role: Security Analyst (Cloud) Location More ❯
Posted:

Security Architect

Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
Proactive Appointments Limited
/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of the information security standards domain Experience of working with external audit and certification More ❯
Employment Type: Permanent
Salary: £70,000
Posted:

Security Architect

Manchester Area, United Kingdom
Hybrid / WFH Options
Oscar
platforms. Familiar with compliance frameworks such as NIST, ISO 27001 and how they apply to cloud applications. The ability to run risk assessments and threat modelling for cloud-native applications. Excellent communication skills with the ability to translate technical concepts to business stakeholders. Role: Security Analyst (Cloud) Location More ❯
Posted:

Security Architect - CNAPP

Manchester, North West, United Kingdom
Hybrid / WFH Options
Oscar Associates (UK) Limited
platforms. Familiar with compliance frameworks such as NIST, ISO 27001 and how they apply to cloud applications. The ability to run risk assessments and threat modelling for cloud-native applications. Excellent communication skills with the ability to translate technical concepts to business stakeholders. Role: Security Analyst (Cloud) Location More ❯
Employment Type: Contract, Work From Home
Posted:

Cyber Security Lead

Immingham, Lincolnshire, North East, United Kingdom
Hybrid / WFH Options
Rullion Limited
Responsibilities Lead cyber risk assessment activities across IT and OT environments, correlating outputs into strategic risk tracking. Manage the cyber security risk toolkit , including threat modelling, attack trees, and scenario-based exercises. Develop and implement cyber security policies, processes, and staff training aligned with Secure by Design principles. … Oversee first-line security operations , including outsourced 24/7 SOC management . Define and manage cyber threat intelligence requirements . Provide cyber risk consultancy for business development projects, ensuring regulatory compliance. Contribute to supply chain risk management , assessing supplier security risks. Act as Deputy NIS Reporting Officer (NRO More ❯
Employment Type: Permanent, Work From Home
Salary: £75,000
Posted:

Senior Information Security Specialist

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
慨正橡扯
tools. Excellent understanding and experience with manual security testing to find vulnerabilities and logical issues. Knowledge and understanding of OWASP and its utilisation within threat modelling. Experience of software development and languages. Working knowledge of CI and CD pipelines and associated security tooling. Use of planned structured methodologies for … considered throughout the lifecycle. Identifying and managing any security flaws within our software through appropriately liaising with external bodies where necessary. Performing risk assessments, threat modelling and design reviews to ensure effective security controls. Identifying opportunities for converting manual tasks into automated processes and identify tooling to support More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Security Specialist

Leeds, Yorkshire, United Kingdom
Hybrid / WFH Options
Jet2.com Limited
Shape, create or own cloud security strategy, policies, tools and services. Evaluate and shape responses to cloud alerts and events from security tools. Conduct threat modelling and develop cloud security incident response plans. Provide security consultation as a cloud security SME in forums and to other teams. Provide More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Consultant - Cyber Security

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
RSM UK
trends, cyber threats, and industry issues. Excellent written and oral communication, report writing, and presentation skills. Experience of executing security testing techniques such as threat modelling, reconnaissance, social engineering, enumeration, attack path mapping, exploitation, and clean up from a variety of adversarial perspectives (white/grey/black More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Architect

Manchester, Lancashire, United Kingdom
Accenture
one of the following areas: IP networking & OT On-premises architecture and Virtualization Cloud platforms and Containerization Databases and LLMs Mobile Technologies & Application security Threat modeling techniques to identify security threats to systems, leading to the definition of Security requirements. Managing security requirements through the delivery and operational life … cycle of a system. Provision of authoritative specialist security advice in: Risk and threat-based mitigation to system designs. Control frameworks such as NIST, ISO, CIS. Protective monitoring, Authentication and authorization best practices. Develop excellent working relationships with key stakeholders, peers and subordinates. Communicating effectively verbally and in writing More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Incident Response Team (CSIRT) Specialist

Capenhurst, Cheshire, United Kingdom
Morson Talent
OT security monitoring, alerting, and investigations. Collaborate with diverse stakeholders and functions to address cybersecurity incidents, alerts, and the implementation of security technologies. Conduct threat hunting, develop threat models, identify threat vectors, and create use cases for effective security monitoring. What do you need to thrive in More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Incident Response Team (CSIRT) Specialist

Chester, Capenhurst, Cheshire, United Kingdom
Morson Talent
OT security monitoring, alerting, and investigations. Collaborate with diverse stakeholders and functions to address cybersecurity incidents, alerts, and the implementation of security technologies. Conduct threat hunting, develop threat models, identify threat vectors, and create use cases for effective security monitoring. What do you need to thrive in More ❯
Employment Type: Permanent
Posted:

Senior Engineer - PKI, Security, Trust Engineering

Manchester, Lancashire, United Kingdom
Roku, Inc
directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design principles to cloud environments … web apps, and mobile apps Proficiency in understanding authentication, authorization, and cryptography, with familiarity around modern security standards and best practices. Proficiency in data modelling of roles, permissions, and capabilities Experience with OAuth 2.0 nuances, best practices, and shortcomings Experience securely running and operating web applications, web services, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Software Engineer - Cryptographic - Key Management Systems

Manchester, Lancashire, United Kingdom
Roku, Inc
designing secure systems. Experience implementing and integrating with secure RESTful Web Services. Experience with AWS security services such as KMS and ACM. Experience with threat modeling and an awareness of the Internet threat model. Experience with DevOps environments that support security at speed, i.e., SecDevOps. Ability to accurately More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Threat Modelling
the North of England
10th Percentile
£62,500
25th Percentile
£63,750
Median
£70,996
75th Percentile
£88,784
90th Percentile
£93,750