ThreatModelling Engineer - GCP (Senior Associate, Technology) Job Description As a Senior Engineer - ThreatModelling you will be a part of a smart cross-functional team delivering digital business transformation solutions to our clients. This position entails an individual contributor role focused on Security Architecture and … ThreatModelling, encompassing governance, evaluation of public cloud services, and conducting security reviews for Public Cloud Providers. Collaboration and partnership with Engineering, Information Security, Program Management, and Development teams are essential. The candidate will conduct technical architecture reviews to pinpoint security opportunities, identify exploitable threats, and propose mitigation … strategies. Your Impact •Conduct thorough threat modeling exercises utilizing established methodologies and frameworks •Maintain a rigorous standard of excellence in identifying potential threats and specifying effective mitigation controls. •Manage the lifecycle of identified threats and associated controls, ensuring timely updates and adjustments as necessary. •Deliver comprehensive threat models More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
Job title Senior Cyber Threat Intelligence Analyst Ref 40789 Division Digital Transformation Location Reading - Clearwater Court - RG1 8DB Contract type Permanent Full/Part-time Full-time Hours 36 Salary Offering up to £65,000 per annum depending on experience Job grade B Closing date 15/05/… As a Senior Cyber Threat Intelligence Analyst , you will play a key role in protecting Thames Water's digital infrastructure by researching, analysing, and communicating the latest cyber threats facing the organisation. You'll evaluate global risks, provide actionable intelligence to stakeholders, and support the development of a robust … threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes to align with More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
GCS
As a Senior Cyber Threat Intelligence Analyst , you will play a key role in protecting the company's digital infrastructure by researching, analysing, and communicating the latest cyber threats facing the organisation. You'll evaluate global risks, provide actionable intelligence to stakeholders, and support the development of a robust … threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes to align with … to address evolving cyber threats while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
GCS
As a Senior Cyber Threat Intelligence Analyst , you will play a key role in protecting the company's digital infrastructure by researching, analysing, and communicating the latest cyber threats facing the organisation. You'll evaluate global risks, provide actionable intelligence to stakeholders, and support the development of a robust … threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes to align with … to address evolving cyber threats while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response More ❯
role in making .UK the safest ccTLD in the world. The ideal candidate will be an experienced cyber professional in the fields of cyber threat intelligence, good awareness of the complex cyber threat landscape, and a good understanding of DNS, to lead its team of Domain Abuse Analysts. … and will directly contribute to enhancing Nominet's reputation in the global internet community. This role is ideal for someone with a deep cyber threat intelligence background, but is not typical and offers unique challenges and opportunities. Responsibilities Oversee and direct the execution of Nominet's domain abuse strategy. … Domain Abuse Lead will work closely with the Nominet Security team on a range of different initiatives that are likely to span areas of threatmodelling, threat intelligence acquisition and dissemination, amongst others. About you and your experience Substantial experience in cyber threat intelligence, ideally with More ❯
and vulnerability management to protect critical systems. Design, implement, and maintain security architectures and frameworks aligned with government standards. Lead and support risk assessments, threatmodelling, and incident response initiatives. Work closely with stakeholders to ensure compliance with NCSC and other relevant security policies. Develop and deliver security … technical expertise in areas such as network security, endpoint security, cloud security, and secure system architecture. Experience in penetration testing, vulnerability management, and cyber threat intelligence. Solid knowledge of security technologies such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR). Strong understanding of risk More ❯
Bexhill-On-Sea, East Sussex, South East, United Kingdom Hybrid / WFH Options
Hastings Direct
of designing, developing, and maintaining secure Azure cloud architectures that meet stringent business and compliance requirements. Your role will involve leading security reviews and threat modeling activities for cloud-based solutions, implementing robust Azure-native security controls such as Microsoft Defender for Cloud, Sentinel, Key Vault, Azure Policy, and More ❯
Andover, Hampshire, United Kingdom Hybrid / WFH Options
Deloitte - Recruitment
and typical associated SOC Level 2 duties. Support 1st line analyst triage and escalation. Build/Develop Use Cases - Develop use case and facilitation, threatmodelling and translation of operational requirements into SOC SIEM tool. Focus on insider threat and Data Loss Prevention use case to demonstrate More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bowerford Associates
security issues in software architecture, software development, e.g. static and/or dynamic code analysis and tools, software dependency check, OWASP Top10 testing, application threat modelling. In-depth experience working in an Agile software development environment, with classic applications as well as microservices, using modern code processing and continuous … Development, Engineering, DevOps, InfoSec, Security, Security Strategy, Best Practice, Programming, Code, C++, C#, C, .NET Core, Java, JavaScript, Node.js, Angular, React, OWASP, Agile, Application ThreatModelling, Security Policy, Security Controls, ISO 27001, NIST, GDPR, Cloud, Azure. Please note that due to a high level of applications, we can More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
TieTalent
security issues in software architecture, software development, e.g. static and/or dynamic code analysis and tools, software dependency check, OWASP Top10 testing, application threat modelling. In-depth experience working in an Agile software development environment, with classic applications as well as microservices, using modern code processing and continuous More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Risk Crew
you do. Your complementary technical skills: Hands-on with programming languages, databases and IoT. Knowledge of containerisation technologies, such as Docker. Experience with Attack & Threat Modelling. Red Team testing and social engineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. Your education More ❯
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … and network protocols (e.g., TCP/IP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
newbury, south east england, United Kingdom Hybrid / WFH Options
Hays
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … network protocols (e.g., TCP/IP, HTTP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
secure Azure architectures across IaaS, PaaS, and SaaS. Define and enforce security best practices, frameworks, and policies (e.g., Zero Trust, NIST, CIS). Perform threat modeling, risk assessments, and security reviews for cloud solutions. Implement and manage tools such as Microsoft Defender for Cloud, Sentinel, Azure Security Center, and More ❯
of data sources from cloud, on-prem, endpoint, network and application layers Create and maintain detection rules, correlation logic and alerts tailored to specific threat scenarios Provide technical leadership and mentorship to team members Work closely with SOC teams to align SIEM capabilities with business objectives Conduct SIEM health … more major SIEM platforms (e.g. Splunk, Sentinel etc.) Deep understanding of log ingestion, parsing, normalisation and enrichment Strong grasp of MITRE ATT&CK framework, threat detection and alert logic Solid scripting/automation skills (e.g., Python, PowerShell, Bash) Experience with cloud logging and monitoring (AWS CloudTrail, Azure Monitor, GCP … etc.) Experience with threatmodelling, cloud security or Identity and Access Management is desirable More ❯
the Blockchain space as a DevSecOps Engineer or Platform Engineer Expertise in AWS and experience with Infrastructure-as-Code Understanding of risk assessment and threatmodelling to identify threats within the digital trading space across the public cloud Security awareness with the ability to understand requirements from the More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
all industries. The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance, social engineering, vulnerability assessments, penetration testing, threatmodelling, cyber-attack simulation exercises, and more to high profile clients across all industries. You'll benefit from ongoing coaching, career mentoring, and More ❯
design and cloud-native architecture Acting as a key escalation point for vulnerability triage and remediation Delivering developer enablement through workshops and hands-on threatmodelling What you’ll bring: 3+ years in application or product security roles Strong grasp of application-level threats, secure design, and remediation More ❯
Portsmouth, yorkshire and the humber, United Kingdom
TalentHawk
through formal tender process, feasibilities phases, design phases, implementation, and validation phases, including risk assessments Security Architecture and Design- Review of design documents, performing threatmodelling and risk assessments, incorporating security non-functional requirements and be a standing member of Technical Design Authority Be the Security touchpoint for More ❯
portsmouth, hampshire, south east england, United Kingdom
TalentHawk
through formal tender process, feasibilities phases, design phases, implementation, and validation phases, including risk assessments Security Architecture and Design- Review of design documents, performing threatmodelling and risk assessments, incorporating security non-functional requirements and be a standing member of Technical Design Authority Be the Security touchpoint for More ❯
practice to assist with baking security into architectural standards. Essential Skills & Experience: Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Sanderson
areas: AWS security controls, policies and automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threatmodelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerability scanning, tools, approaches, vulnerability patching and vendor management for security. Strong experience More ❯
infrastructure teams to embed security into everything they build. Responsibilities: Lead secure architecture and design reviews for critical products and digital finance infrastructure Conduct threat modeling, risk assessments, and security controls reviews across trading, custody, and DeFi platforms Build and implement security test plans and pipelines using modern tools More ❯
collaborate with diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯