IT Cyber Security Analyst Ref: YC46941 A highly successful IT and telecommunications services company is currently recruiting an IT Cyber Security Analyst (Threat Intelligence Analyst) to work at their clients site in London. In this role, you will be responsible for identifying, analysing, and communicating cyber threats to support proactive defence strategies. The ideal candidate should have expertise in … threat intelligence analysis, collaboration across teams, familiarity with security tools, and strong analytical skills. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate (X) NOT eligible: Student visa, Requiring visa sponsorship, WORK TYPE: office-based VISA SUPPORT: No TYPE: 6 months rolling contract, full-time WORKING HOURS: Mon-Fri 9:00-17:00 SALARY: up to … 54k, depending on experience START: Nov-Dec 2025 LOCATION: London (office-based) Cyber Security Analyst Main Responsibilities: Monitor and analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and Penetration Testing teams to integrate threat intelligence into testing scenarios More ❯
IT Cyber Security Analyst Ref: YC46941 A highly successful IT and telecommunications services company is currently recruiting an IT Cyber Security Analyst (Threat Intelligence Analyst) to work at their clients site in London. In this role, you will be responsible for identifying, analysing, and communicating cyber threats to support proactive defence strategies. The ideal candidate should have expertise in … threat intelligence analysis, collaboration across teams, familiarity with security tools, and strong analytical skills. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate (X) NOT eligible: Student visa, Requiring visa sponsorship, WORK TYPE: office-based VISA SUPPORT: No TYPE: 6 months rolling contract, full-time WORKING HOURS: Mon-Fri 9:00-17:00 SALARY: up to … 54k, depending on experience START: Nov-Dec 2025 LOCATION: London (office-based) Cyber Security Analyst Main Responsibilities: Monitor and analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and Penetration Testing teams to integrate threat intelligence into testing scenarios More ❯
IT Cyber Security Analyst Ref: YC46941 A highly successful IT and telecommunications services company is currently recruiting an IT Cyber Security Analyst (Threat Intelligence Analyst) to work at their clients site in London. In this role, you will be responsible for identifying, analysing, and communicating cyber threats to support proactive defence strategies. The ideal candidate should have expertise in … threat intelligence analysis, collaboration across teams, familiarity with security tools, and strong analytical skills. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate (X) NOT eligible: Student visa, Requiring visa sponsorship, WORK TYPE: office-based VISA SUPPORT: No TYPE: 6 months rolling contract, full-time WORKING HOURS: Mon-Fri 9:00-17:00 SALARY: up to … 54k, depending on experience START: Nov-Dec 2025 LOCATION: London (office-based) Cyber Security Analyst Main Responsibilities: Monitor and analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and Penetration Testing teams to integrate threat intelligence into testing scenarios More ❯
IT Cyber Security Analyst Ref: YC46941 A highly successful IT and telecommunications services company is currently recruiting an IT Cyber Security Analyst (Threat Intelligence Analyst) to work at their clients site in London. In this role, you will be responsible for identifying, analysing, and communicating cyber threats to support proactive defence strategies. The ideal candidate should have expertise in … threat intelligence analysis, collaboration across teams, familiarity with security tools, and strong analytical skills. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate (X) NOT eligible: Student visa, Requiring visa sponsorship, WORK TYPE: office-based VISA SUPPORT: No TYPE: 6 months rolling contract, full-time WORKING HOURS: Mon-Fri 9:00-17:00 SALARY: up to … 54k, depending on experience START: Nov-Dec 2025 LOCATION: London (office-based) Cyber Security Analyst Main Responsibilities: Monitor and analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and Penetration Testing teams to integrate threat intelligence into testing scenarios More ❯
now, scroll down to read the full role description and make your application. A highly successful IT and telecommunications services company is currently recruiting an IT Cyber Security Analyst (Threat Intelligence Analyst) to work at their clients site in London. In this role, you will be responsible for identifying, analysing, and communicating cyber threats to support proactive defence strategies. … The ideal candidate should have expertise in threat intelligence analysis, collaboration across teams, familiarity with security tools, and strong analytical skills. ELIGIBLE APPLICANTS: (O) Eligible visa: Permanent residence, Spouse, Partner, Working holiday, Graduate (X) NOT eligible: Student visa, Requiring visa sponsorship, WORK TYPE: office-based VISA SUPPORT: No TYPE: 6 months rolling contract, full-time WORKING HOURS: Mon-Fri … SALARY: up to £54k, depending on experience START: Nov-Dec 2025 LOCATION: London (office-based) Cyber Security Analyst Main Responsibilities: Monitor and analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and Penetration Testing teams to integrate threat intelligence More ❯
Overview Senior Threat Modeler - Job Title: Senior Threat Modeler Location: Preston or Frimley. We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role What you'll be doing: Maintains an in-depth understanding of the external and internal security environment and how the organisation reacts to … security threats Contributes to, plans and delivers activities in support of organisational and security development needs in accordance with regulatory requirements and changes in the threat landscape The assessment, validation and reporting of information on current and potential cyber threats to maintain an organisation's situational awareness Identifying security gaps and building attack simulations to support Purple Team engagements … attack patterns to prioritise future remediation efforts Is a subject matter expert (SME) on emerging threats and will work on complex issues as a fully contributory member of the ThreatModelling Team, with limited guidance from the Line Manager Produces reports detailing key threats and risks to the organisation at a strategic level for business units to digest More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
You will champion secure development practices throughout the software development lifecycle, with a strong emphasis on 'shift-left' principles to embed security early in the process. You will facilitate threatmodelling workshops to help product teams identify, assess, and mitigate potential threats. You will also collaborate closely with other functions within the CISO organisation, including Application Security, Offensive … daily significant change to complex Cloud serverless transformation projects. You will have the ability to work with infrastructure as code and understand complex architectures. You will Lead/facilitate threatmodelling workshops with SMEs. Engage with key stakeholders to identify threats and recommend countermeasures. Participate in architectural reviews of Product cloud implementations against security best practice, relevant threats … security principles, practices, and frameworks, such as OWASP, NIST, and ISO. Awareness of security tools and technologies, such as SAST, DAST, IAST, SCA, WAF, IDS, IPS. Experience in conducting threatmodelling and risk assessments. Interview process The interview process for this role is two stages including a technical competency-based question and a task. Working Schedule This role More ❯
Validate the effectiveness of security controls and recommend improvements. Deliver security architecture for cloud and hybrid environments. Scope and review IT Health Checks (ITHC) and produce remediation plans. Conduct threatmodelling, risk assessments, and design proportional controls. Produce security architecture artefacts including standards and blueprints. Travel to client sites (approx. 40-60%) as required for classified system access. … HMG, NPSA, NCSC policies and guidance Cloud security (Azure, AWS), containerisation, KMS, WAFs Event-driven microservices, network infrastructure, IDS/IPS AI security (ISO42001 desirable), ITHC scoping and remediation Threatmodelling (Kill Chain, attack trees), HLD/LLD reviews Certifications: SABSA, TOGAF, AWS/Azure Architect, CISSP, CISM. Working towards or holding CIISEC Full Membership or UK Cyber More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Validate the effectiveness of security controls and recommend improvements. Deliver security architecture for cloud and hybrid environments. Scope and review IT Health Checks (ITHC) and produce remediation plans. Conduct threatmodelling, risk assessments, and design proportional controls. Produce security architecture artefacts including standards and blueprints. Travel to client sites (approx. 40-60%) as required for classified system access. … HMG, NPSA, NCSC policies and guidance Cloud security (Azure, AWS), containerisation, KMS, WAFs Event-driven microservices, network infrastructure, IDS/IPS AI security (ISO42001 desirable), ITHC scoping and remediation Threatmodelling (Kill Chain, attack trees), HLD/LLD reviews Certifications: SABSA, TOGAF, AWS/Azure Architect, CISSP, CISM. Working towards or holding CIISEC Full Membership or UK Cyber More ❯
technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls (primarily Azure, including cloud-native apps). Champion secure development, threatmodelling, and DevSecOps integration. Research emerging threats and recommend proactive mitigations. Provide mentoring, training, and security awareness support to internal teams. Essential Skills & Experience Strong hands-on experience … principles such as Zero Trust and risk-based security. Relevant certifications such as CISSP, CompTIA Security+, GIAC, or equivalent. Excellent documentation, communication, and stakeholder collaboration skills. Desirable Background in threatmodelling or secure software design. Knowledge of ISO27001, Cyber Essentials Plus, or cloud security certifications. Experience in large-scale or regulated environments. What's on Offer Competitive salary More ❯
technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls (primarily Azure, including cloud-native apps). Champion secure development, threatmodelling, and DevSecOps integration. Research emerging threats and recommend proactive mitigations. Provide mentoring, training, and security awareness support to internal teams. Essential Skills & Experience Strong hands-on experience … principles such as Zero Trust and risk-based security. Relevant certifications such as CISSP, CompTIA Security+, GIAC, or equivalent. Excellent documentation, communication, and stakeholder collaboration skills. Desirable Background in threatmodelling or secure software design. Knowledge of ISO27001, Cyber Essentials Plus, or cloud security certifications. Experience in large-scale or regulated environments. What's on Offer Competitive salary More ❯
technology stack. Perform security testing (SAST, DAST, SCA) and work with developers to remediate findings. Support cloud security controls (primarily Azure, including cloud-native apps). Champion secure development, threatmodelling, and DevSecOps integration. Research emerging threats and recommend proactive mitigations. Provide mentoring, training, and security awareness support to internal teams. Essential Skills & Experience Strong hands-on experience … principles such as Zero Trust and risk-based security. Relevant certifications such as CISSP, CompTIA Security+, GIAC, or equivalent. Excellent documentation, communication, and stakeholder collaboration skills. Desirable Background in threatmodelling or secure software design. Knowledge of ISO27001, Cyber Essentials Plus, or cloud security certifications. Experience in large-scale or regulated environments. What's on Offer Competitive salary More ❯
software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerability management and remediation. Acting as the go-to expert for secure design, threatmodelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to build securely from the start. Alongside this, you'll maintain clear documentation and … of cloud platforms , CI/CD pipelines , and scripting (PowerShell, YAML, JSON, etc.) Familiarity with frameworks and standards such as OWASP , NIST SSDF , ISO27001 , or NCSC Practical experience with threatmodelling , security tooling , and risk assessments Excellent communication skills, able to influence and engage at all levels from developers to execs A collaborative, proactive approach to solving problems More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
software development lifecycle - from designing controls and integrating testing into CI/CD pipelines to supporting vulnerability management and remediation. Acting as the go-to expert for secure design, threatmodelling, and compliance, you'll make sure teams have the knowledge, tools, and confidence to build securely from the start. Alongside this, you'll maintain clear documentation and … of cloud platforms , CI/CD pipelines , and scripting (PowerShell, YAML, JSON, etc.) Familiarity with frameworks and standards such as OWASP , NIST SSDF , ISO27001 , or NCSC Practical experience with threatmodelling , security tooling , and risk assessments Excellent communication skills, able to influence and engage at all levels from developers to execs A collaborative, proactive approach to solving problems More ❯
Hampshire, England, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threatmodelling, or related fields within Public Sector and MOD and will have achieved or be working towards Full Membership of CIISEC and UK Cyber Security Council professional registration … and CIS Controls v8. HMG, NPSA and NCSC security policies, standards and guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). ThreatModelling – Kill Chain – Attack tree analysis. Certifications: AWS/Azure Security Professional, CCSP, CISSP, CISM, CIISEC, UK Cyber Security Council registration (Chartered or Principal). What’s in More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threatmodelling, or related fields within Public Sector and MOD and will have achieved or be working towards Full Membership of CIISEC and UK Cyber Security Council professional registration … and CIS Controls v8. HMG, NPSA and NCSC security policies, standards and guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). ThreatModelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, Key Management Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
design across technology platforms including cloud infrastructures. Contribute to blogs and research within the Cyberfort community. Experience Required The successful candidate will possess proven experience in cybersecurity, security architecture, threatmodelling, or related fields within Public Sector and MOD and will have achieved or be working towards Full Membership of CIISEC and UK Cyber Security Council professional registration … and CIS Controls v8. HMG, NPSA and NCSC security policies, standards and guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). ThreatModelling - Kill Chain - Attack tree analysis. Working understanding of: Cloud security including Azure, Amazon Web Service, Key Management Systems, Containerisation, Network Security Groups, Host based firewalls, Web Application More ❯
development - not after someone clicks deploy. Leading the charge on application security - from secure coding principles to automated AppSec testing in CI/CD pipelines. Running (or helping run) threatmodelling sessions and ensuring they're more than just drawing spiders on whiteboards. Working with devs and testers to embed security controls early in the lifecycle. Bringing DevSecOps … know your way around. DevSecOps practices – secure pipelines, IaC security, dependency scanning, GitHub/Jenkins integrations. Application security – OWASP Top 10, SAST/DAST tooling, secrets management, API security. Threatmodelling – Ideally STRIDE, or something better. And you can do it with a dev team, not just in theory. Vulnerability and risk management – and how to avoid both More ❯
planning, dependency/risk management, quality gates). Establish and enforce best-in-class DevOps, trunk-based, CI/CD, and monitoring standards. Sponsor the adoption of secure SDLC, threatmodelling, vulnerability management, identity/authorisation, privacy by design; ISO27001/9001, security posture and customer due diligence. Cross-functional leadership Partner closely with Product leaders to ensure … career ladders, performance management, and fostering a high-bar engineering culture. Ability to drive reliability, performance, and cost efficiency in cloud environments. Skilled sponsor and champion of secure SDLC, threatmodelling, vulnerability management, and privacy by design. Ability to partner with product and legal teams on security trade-offs and customer due diligence. Skilled in agile delivery, quarterly More ❯
planning, dependency/risk management, quality gates). Establish and enforce best-in-class DevOps, trunk-based, CI/CD, and monitoring standards. Sponsor the adoption of secure SDLC, threatmodelling, vulnerability management, identity/authorisation, privacy by design; ISO27001/9001, security posture and customer due diligence. Cross-functional leadership Partner closely with Product leaders to ensure … career ladders, performance management, and fostering a high-bar engineering culture. Ability to drive reliability, performance, and cost efficiency in cloud environments. Skilled sponsor and champion of secure SDLC, threatmodelling, vulnerability management, and privacy by design. Ability to partner with product and legal teams on security trade-offs and customer due diligence. Skilled in agile delivery, quarterly More ❯
a key contributor to the Cyber team by focusing on application security architecture and implementing a robust risk management programme. Collaborating closely with different teams to devise plans, perform threatmodelling, adopt architecture best practices, drive secure development lifecycles, and manage risk remediation. Providing expertise in security best practices and compliance while undertaking hands-on security testing. Identifying … review sprints to ensure application security is prioritised before deployment. Partnering with architecture and development teams to review application design and code for security vulnerabilities. Establishing and promoting a threatmodelling capability to evangelise secure coding practices in the development lifecycle. Delivering technical advice to ensure security standards are fully understood and complied with across teams. Developing and More ❯
practice across the practice. What you'll be doing: Leading application security architecture for high-profile public sector clients. Advising on and implementing secure development practices aligned with OWASP, threatmodelling, and secure SDLC frameworks. Supporting pre-sales, solution design, and client engagements across consulting projects. Mentoring and upskilling client teams and internal consultants on application security. Experience … required: Consulting experience in application security architecture, preferably with exposure to public sector clients. Deep knowledge of OWASP Top 10, secure coding practices, threatmodelling, and vulnerability management. Experience influencing design and security strategy across large programmes. Strong communication and client-facing skills; able to present to both technical and executive stakeholders. The package: Up to More ❯
drive awareness of security from the earliest stages of design through to deployment. You'll help integrate automated security tooling and checks into our CI/CD pipelines, facilitate threatmodelling sessions, and review security-sensitive design decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and … in CI/CD Hands-on experience with security tools like SAST, DAST, and SCA Familiar with cloud environments (especially AWS), containers, and microservices Comfortable reviewing technical designs, performing threatmodelling, and advising on secure architecture Strong communicator who collaborates well with engineers and promotes secure-by-default practices We might not be right for you if: You More ❯
software testing, QA, Quality Assurance, .NET, Azure DevOps, CI/CD pipeline, API testing, Security testing, RAG, Model orchestration, hallucination detection, NIST AI RMF, EU AI Act, security validation, threatmodelling, Microsoft Azure, £450 - £500 Inside IR35, Contract, On-site, CambridgeIncrease your chances of an interview by reading the following overview of this role before making an application. … developers and data scientists to establish service-level quality metrics and observability hooks. Validate services against AI regulatory frameworks and ensure traceability, fairness, and robustness in outcomes. Participate in threatmodelling and security validation of exposed APIs and AI services. Provide feedback early in the lifecycle to reduce defects and improve design. Mentor junior testers, encourage continuous learning More ❯
governance and identity lifecycle processes in a highly View job & apply CTI Analyst Location: London Job type: Permanent Financial Services firm seeks an Operational CTI Analyst to join its Threat Intelligence team. Th View job & apply Senior Manager - BCM Second Line Location: Frankfurt Salary: 125,000 + Benefits Job type: Permanent Sector: Banking We are seeking a Senior Manager … hybrid Job type: Permanent Leading banking group seeks a Cryptography Analyst to join their security team. As an Analyst in We are seeking a highly motivated and skilled Insider Threat Investigations Lead to join a newly formed Insider Threat Team. This role focuses on identifying, preventing, and responding to risks posed by individuals with authorized access to organisational … This role suits someone with strong investigative skills, an analytical mindset, the ability to interpret and act on data, and the capability to execute initiatives that strengthen the insider threat programme. Key Responsibilities Support the delivery of the insider threat programme, including developing tools, standards, and procedures to detect, prevent, and respond to insider threats. Utilise advanced detection More ❯