Senior Threat Modeler 12 months initially Remote (with occasional visits to Preston or Frimley) £41.94 per hour Role Description • Supports the overall delivery of the threatmodelling function and wider UK SOC by evaluating the clients estate and its capability. • Proactively protects the client through continual testing of security controls. • Understands Cyber Threat Intelligence and Active … Defence techniques and best practices. • Good knowledge of cyber threat landscape, current affairs and geopolitics, including threat groups and how to apply this knowledge within an operational environment. • Understands the MITRE ATT&CK Framework, Threat Intelligence Platforms and the coordination of Advanced Threat Protection (ATP) and tactics, techniques and procedures (TTPs) to support Cyber Operations. • Knowledge … areas, manage own development including participating in on the job training and attending training programmes as appropriate, and support/provide mentorship to others in the team. • Supports the ThreatModelling Lead when required, particularly on forecasting future team operations. • Is a subject matter expert (SME) on emerging threats and will work on complex issues as a fully More ❯
The Role Supports the overall delivery of the threatmodelling function and wider UK SOC by evaluating the BAE Systems' estate and its capability. Proactively protects BAE Systems through continual testing of security controls. Understands Cyber Threat Intelligence and Active Defence techniques and best practices. Role Responsibilities: Note limited to Building and implementing processes and procedures for … continuous and effective threatmodelling capability. Maintains an in-depth understanding of the external and internal security environment and how the organisation reacts to security threats. Performs continuous evaluation of the organisation's estate, assessing function capability, and suggesting improvements where necessary. Identifying security gaps, and building attack simulations to support Purple Team engagements by illustrating potential attack … risk reduction in the long term. Contributes to, plans and delivers activities in support of organisational and security development needs in accordance with regulatory requirements and changes in the threat landscape. The assessment, validation and reporting of information on current and potential cyber threats to maintain an organisation's situational awareness. The verification that systems and processes meet the More ❯
Threat Intelligence AnalystFully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to identify an experienced Threat Intelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threat intelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest cybersecurity … penetration testing, and Breach & Attack Simulation (BAS) platforms. Key Responsibilities: Monitor and analyse global cyber threat landscapes, identifying threats, adversary tactics, and emerging risks Collaborate with Red Team, Blue Team, and Penetration Testing specialists to integrate intelligence into Breach & Attack Simulation (BAS) scenarios Act as a point of contact between threat intelligence, Red/Blue, and SOC teams … to align threatmodelling and adversary simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITRE ATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack surface assessments, and adversary emulation plans Present More ❯
Threat Intelligence Analyst Fully Onsite in London Inside IR35 Contract Deerfoot Recruitment has been engaged to identify an experienced Threat Intelligence Analyst for a leading global banking organisation with an advanced cyber defence function in London. This is a fantastic opportunity to shape threat intelligence, work alongside Red/Blue Teams, and operationalise intelligence using the latest … cybersecurity, penetration testing, and Breach & Attack Simulation (BAS) platforms. Key Responsibilities: Monitor and analyse global cyber threat landscapes, identifying threats, adversary tactics, and emerging risks Collaborate with Red Team, Blue Team, and Penetration Testing specialists to integrate intelligence into Breach & Attack Simulation (BAS) scenarios Act as a point of contact between threat intelligence, Red/Blue, and SOC … teams to align threatmodelling and adversary simulation Support threat hunting activities and provide tactical, contextual intelligence to stakeholders Model and assess threat actors, including motivations, capabilities, attack vectors, and impacts Leverage the MITRE ATT&CK framework for mapping adversary behaviours and detection Develop and update threat profiles, attack surface assessments, and adversary emulation plans More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
and priorities by working closely with your team to identify the most critical focus areas. These include: Improving incident response times Reducing false positives and other extraneous alerts Enhancing threat detection capabilities Oversee your staff's activities and ensure they focus on the right priorities Oversee SOC activities by reviewing your team's performance metrics, incident reports and other … align with the company's goals. Your responsibilities: Manage service and process improvements of SOC, auditing SOC incidents, identifying new use cases and automations POC for SOC engineering team, threat intelligence analyst and Threat exposure management Act as a point of escalation for Level-2 SOC security analysts in support of information security investigations to provide guidance and … response, SIEM monitoring, and other operational tasks (tools, techniques, Procedures) in support of technologies managed by the Security Operations Centre. Document incidents from initial detection through final resolution Ensure threat management, threatmodelling, identify threat vectors and develop use cases for security monitoring Create reports, dashboards, metrics for SOC operations and presentation to Sr. Mgmt. Act More ❯
design, and implementation of cloud-native security solutions. You will work closely with stakeholders to ensure that security controls and strategies align with organisational objectives, regulatory requirements, and evolving threat landscapes. This role is especially suited for professionals with a blend of hands-on expertise in Mist (Juniper Networks) and a strong technical foundation in Microsoft Azure security services. … security best practices, including identity and access management (IAM), data encryption, and monitoring Collaborate across teams to ensure consistent implementation of security controls and governance frameworks Lead risk assessments, threatmodelling exercises, and security posture evaluations for cloud and hybrid environments Provide architectural guidance on network segmentation, secure integration, and secure connectivity between Mist and Azure ecosystems Monitor More ❯
and practices into DevOps workflows (SAST, DAST, SCA, secrets management). Collaborate with development, operations, and security teams to implement secure coding and deployment practices. Provide practical guidance on threatmodelling, risk assessments, and vulnerability management. Advise on cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes) with a hands-on delivery mindset. Develop, implement, and enforce More ❯
ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threatmodelling To apply for this position please submit your CV. Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this More ❯
ensure Azure-based solutions meet enterprise security standards and compliance requirements, dealing with the following: Security Planning & Risk Assessment Analyze and define security requirements for Azure-based projects. Conduct threat modeling and risk assessments for cloud workloads. Support the secure configuration of Azure services (e.g., Azure AD, Key Vault, Defender for Cloud). Project Delivery Support Act as the More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
Risk Treatment Plan, Risk Business Case & Security Management Plan). Experience of implementing vulnerability management processes. Experience of security assurance and the measurement of controls. Experience in risk and threatmodelling within a high-threat government environment. More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
Risk Treatment Plan, Risk Business Case & Security Management Plan). Experience of implementing vulnerability management processes. Experience of security assurance and the measurement of controls. Experience in risk and threatmodelling within a high-threat government environment. More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
AVENSYS CONSULTING (UK) LTD
developers and data scientists to establish service-level quality metrics and observability hooks. ? Validate services against AI regulatory frameworks and ensure traceability, fairness, and robustness in outcomes. ? Participate in threatmodelling and security validation of exposed APIs and AI services. ? Provide feedback early in the lifecycle to reduce defects and improve design. ? Mentor junior testers, encourage continuous learning More ❯
Please be aware that RRP is non contractual and subject to review. Main duties of the job As a Senior Cyber Security Advisor, you will: Conduct security assessments and threatmodelling, articulate cyber risk and recommend mitigating controls to ensure systems are designed securely. Provide specialist cyber security guidance aligned to NHSE security policy and industry best practice More ❯
have a solid background in Cyber Security, with the following skills and experience: Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable ThreatModelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incident response, and forensic analysis. Ability to perform triage of security More ❯
following skills and experience: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable ThreatModelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority, and impact, while More ❯
following skills and experience: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable ThreatModelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority, and impact, while More ❯
Senior Threat Modeler 12 months initially Remote (with occasional visits to Preston or Frimley) £41.94 per hour Role Description • Supports the overall delivery of the threatmodelling function and wider UK SOC by evaluating the clients estate and its capability. • Proactively protects the client through continual testing of security controls click apply for full job details More ❯
in code, containers, APIs, and infrastructure-as-code before they reach production. Collaborates with development, security, and operations teams to implement remediation and improve security posture. Stays current with threat landscapes, tools, and methodologies to proactively defend against evolving cyber risks in general and more specific to an airline industry, transportation sector. Your Responsibilities Integrate security practices and tools … identify flaws in CI/CD, IaC, and cloud/containerized environments. Perform manual and automated security testing on web apps, APIs, pipelines. Participate in agile ceremonies (sprint planning, threat modeling, grooming). Create detailed reports, providing actionable advice to clients on how to address the identified vulnerabilities and improve their security posture; outlining identified vulnerabilities, their potential impact … background (OWASP Top 10, API security). Manual pentesting of modern web apps, APIs, and CI/CD pipelines. Deep understanding of DevSecOps practices, secure SDLC and proficient in threat modeling and secure design review. Proficiency in automating security checks within the CI/CD pipeline using tools like Jenkins, GitLab, and Ansible is vital. Knowledge of secure coding More ❯
Initial We are looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate … Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update … detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise (IOCs More ❯
defined OT penetration testing engagements. What You'll Do: Conduct thorough penetration tests on client systems, applications, and networks - specifically OT/ICS systems - to identify security weaknesses. Perform threatmodelling and adversarial simulations. Collaborate with clients to understand their security needs and provide tailored recommendations. Develop and execute test plans, ensuring all testing is carried out ethically More ❯