We are seeking a Threat Analyst to join our rapidly growing Information Security team. This is a unique opportunity for an aspiring and motivated professional to be at the forefront of our cyber defence strategy, protecting our brand from existing and emerging threats. You will combine the expertise of … a Threat Hunter and Cyber Threat Intelligence Analyst, and will work alongside our Senior Threat Analyst to build our threat intelligence and hunting capabilities from the ground up. You'll have a major input on what new tooling and services we use and the backing to … Seize the opportunity to join a dynamic security team, reporting to the Head of Cyber Defence, and lead the development of advanced CTI and threat hunting strategies, seamlessly integrating into our security processes and driving continuous improvements. What you'll be doing In this role, your key responsibilities will More ❯
implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, Identity and Access Management (IAM) or ThreatModelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security initiatives, collaborate with clients or stakeholders … architectures across multi-cloud platforms (AWS, Azure, Google Cloud). Design and deploy IAM solutions to ensure robust authentication, authorisation and access controls. Lead threatmodelling exercises to identify, assess and mitigate risks in systems and applications. Lead the design, implementation and optimisation of SIEM solutions (e.g. Splunk … Sentinel). Integrate SIEM systems with other security tools like EDR, SOAR and threat intelligence feeds. Skills Extensive experience in Cyber Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, Identity & Access Management or threatMore ❯
london, south east england, united kingdom Hybrid / WFH Options
RiverSafe
implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, Identity and Access Management (IAM) or ThreatModelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security initiatives, collaborate with clients or stakeholders … architectures across multi-cloud platforms (AWS, Azure, Google Cloud). Design and deploy IAM solutions to ensure robust authentication, authorisation and access controls. Lead threatmodelling exercises to identify, assess and mitigate risks in systems and applications. Lead the design, implementation and optimisation of SIEM solutions (e.g. Splunk … Sentinel). Integrate SIEM systems with other security tools like EDR, SOAR and threat intelligence feeds. Skills Extensive experience in Cyber Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, Identity & Access Management or threatMore ❯
and network security. Vulnerability Management: Identify and prioritize vulnerabilities across infrastructure and applications, and collaborate with teams to remediate them in a timely manner. ThreatModelling and Risk Assessment: Perform threatmodelling to identify security risks and provide recommendations for mitigation. Monitoring and Incident Response: Develop More ❯
embed security services into real-world operations. You’ll be responsible for overseeing the delivery and integration of key security services — including penetration testing, threatmodelling, logging, and vulnerability scanning — into enterprise platforms and workflows. You’ll work cross-functionally to align technical services with business and risk … Have: At least 3 years of experience in a similar service delivery or cyber consultancy role Deep understanding of enterprise security services: Pen testing, threatmodelling, vulnerability management, logging & monitoring, incident response Strong communication and stakeholder engagement skills Excellent documentation and governance capability CISM or CISSP certification Degree More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
Support traceability of the requirements. Contribute to the system architecture definition, including definition of a system security concept and security mechanisms. Perform security analysis (threatmodelling and risk assessment) to evaluate the sufficiency of the security solutions. Support the HW Verification Lead in verification planning at the system … understanding of embedded systems with software, firmware and hardware components. Experience identifying and mitigating security vulnerabilities in such systems. Experience working to cybersecurity requirements, threatmodelling, development of security mechanisms and incident management. Ability to work with a high level of independence and schedule own work and tasks. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threatmodelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical … security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. What More ❯
the first steps in engaging our clients, helping to influence the board and CxO with top-down buy-in and understanding. Providing insight for threatmodelling, risk management and security overlay approaches by conducting security maturity assessments. Providing a business understanding of technical domains and tailoring these to More ❯
Required Skills & Experience Proven experience in security testing for web applications, APIs, and cloud environments. Strong knowledge of OWASP Top Ten, CVE vulnerabilities, and threat modeling techniques . Hands-on experience with security testing tools such as OWASP ZAP, Burp Suite, Nessus, Metasploit, Nikto, or equivalent . Experience in More ❯
with Cloud Platform Engineers, DevX and Product Engineering to ensure security requirements are integrated into system designs and technology choices from the outset. Perform threatmodelling exercises for cloud-native applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and … security, providing guidance and mentorship to other engineers. Contribute to the incident response planning for complex cloud and application security events. Proactively monitor the threat landscape, evaluate emerging cloud security risks and trends, and translate them into actionable security improvements. What we're looking for Significant (3+ years) hands More ❯
Bexhill-On-Sea, East Sussex, South East, United Kingdom Hybrid / WFH Options
Hastings Direct
of designing, developing, and maintaining secure Azure cloud architectures that meet stringent business and compliance requirements. Your role will involve leading security reviews and threat modeling activities for cloud-based solutions, implementing robust Azure-native security controls such as Microsoft Defender for Cloud, Sentinel, Key Vault, Azure Policy, and More ❯
brighton, south east england, united kingdom Hybrid / WFH Options
Hastings Direct
of designing, developing, and maintaining secure Azure cloud architectures that meet stringent business and compliance requirements. Your role will involve leading security reviews and threat modeling activities for cloud-based solutions, implementing robust Azure-native security controls such as Microsoft Defender for Cloud, Sentinel, Key Vault, Azure Policy, and More ❯
bexhill, south east england, united kingdom Hybrid / WFH Options
Hastings Direct
of designing, developing, and maintaining secure Azure cloud architectures that meet stringent business and compliance requirements. Your role will involve leading security reviews and threat modeling activities for cloud-based solutions, implementing robust Azure-native security controls such as Microsoft Defender for Cloud, Sentinel, Key Vault, Azure Policy, and More ❯
Andover, Hampshire, United Kingdom Hybrid / WFH Options
Deloitte - Recruitment
and typical associated SOC Level 2 duties. Support 1st line analyst triage and escalation. Build/Develop Use Cases - Develop use case and facilitation, threatmodelling and translation of operational requirements into SOC SIEM tool. Focus on insider threat and Data Loss Prevention use case to demonstrate More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bowerford Associates
security issues in software architecture, software development, e.g. static and/or dynamic code analysis and tools, software dependency check, OWASP Top10 testing, application threat modelling. In-depth experience working in an Agile software development environment, with classic applications as well as microservices, using modern code processing and continuous … Development, Engineering, DevOps, InfoSec, Security, Security Strategy, Best Practice, Programming, Code, C++, C#, C, .NET Core, Java, JavaScript, Node.js, Angular, React, OWASP, Agile, Application ThreatModelling, Security Policy, Security Controls, ISO 27001, NIST, GDPR, Cloud, Azure. Please note that due to a high level of applications, we can More ❯
of products and components. Examples of the tasks, include, but are not limited to; assessment to latest cybersecurity standards, penetration testing (IoT and WebApp), threatmodelling, firmware investigation, code analysis etc. This service will be provided to external clients, who will predominantly be manufacturers of wired and wireless … related controls (encryption, digital signatures, secure boot, access control, password management). Understanding how to implement security activities such as vulnerability and patch management, threat intelligence etc. Hands-on practical knowledge with reverse engineering and/or vulnerability testing tools and techniques. Experience in common scripting languages such as More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Senitor Associates
application landscapes. What you’ll need: 3+ years in a security architecture or cyber consulting role Deep knowledge of enterprise security services – Pen Testing, ThreatModelling, Logging, Vulnerability Mgmt, and Incident Response Proven ability to produce secure design templates and influence technical direction Excellent communication, stakeholder management, and More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
solutions, integrating security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threatmodelling, vulnerability assessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and implement mitigation measures. Integrate secure coding practices into the software development lifecycle. Perform security code reviews and ensure secure-by-design principles. Conduct threatmodelling exercises to identify and mitigate potential risks. Ensure compliance with security regulations such as ISO27001, NIST 800-30/37/ More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and implement mitigation measures. Integrate secure coding practices into the software development lifecycle. Perform security code reviews and ensure secure-by-design principles. Conduct threatmodelling exercises to identify and mitigate potential risks. Ensure compliance with security regulations such as ISO27001, NIST 800-30/37/ More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & access management, threatmodelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure by Design, and architecture standards. Proven experience leading More ❯
newport, wales, united kingdom Hybrid / WFH Options
Eteam Workforce Limited
Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & access management, threatmodelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure by Design, and architecture standards. Proven experience leading More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Eteam Workforce Limited
Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & access management, threatmodelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure by Design, and architecture standards. Proven experience leading More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Eteam Workforce Limited
Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & access management, threatmodelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure by Design, and architecture standards. Proven experience leading More ❯