4 of 4 Contract Threat Modelling Jobs in London

CyberArk PAM Self-Hosted Architect

Hiring Organisation
CBSbutler Holdings Limited trading as CBSbutler
Location
London, United Kingdom
Employment Type
Contract
Contract Rate
GBP 750 - 950 Daily
Lead installation, configuration, testing and handover of CyberArk secrets-management solutions into Run & Maintain teams. Provide architectural leadership on privileged access risk reduction through threat modelling, control selection and adherence to security policies . Act as a trusted advisor to senior stakeholders (CISO, security architects, platform owners, programme ...

DevSecOps Lead

Hiring Organisation
Huxley
Location
London, South East, England, United Kingdom
Employment Type
Contractor
Contract Rate
£900 per day
SAST, DAST, SCA, secrets management). Collaborate with development, operations, and security teams to implement and ensure secure coding and deployment practices. Advise on threat modelling, risk assessments, and vulnerability management. Provide expert guidance on cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes). Develop ...

DevSecOps Lead

Hiring Organisation
Huxley Associates
Location
City of London, London, United Kingdom
Employment Type
Contract
Contract Rate
£900/day
SAST, DAST, SCA, secrets management). Collaborate with development, operations, and security teams to implement and ensure secure coding and deployment practices. Advise on threat modelling, risk assessments, and vulnerability management. Provide expert guidance on cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes). Develop ...

CYBER SECURITY ENGINEER

Hiring Organisation
Summer Browning Associates
Location
London, United Kingdom
Employment Type
Contract
Contract Rate
£NEG Excellent Day Rates
Hybrid| Remote The ideal candidate will hold an active DV clearance and have a solid background in Cyber Security Engineering working within a high-threat government environment, with the following skills and experience: Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, Sentinel … Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in Protective Monitoring & SOC operation Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or GIAC are highly desirable. ...