Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bowerford Associates
is essential. Experience working with security issues in software architecture, software development, e.g. static and/or dynamic code analysis and tools, software dependency check, OWASP Top10 testing, application threat modelling. In-depth experience working in an Agile software development environment, with classic applications as well as microservices, using modern code processing and continuous integration and delivery tools (e.g. … Secure by Design, Architecture, Software Development, Engineering, DevOps, InfoSec, Security, Security Strategy, Best Practice, Programming, Code, C++, C#, C, .NET Core, Java, JavaScript, Node.js, Angular, React, OWASP, Agile, Application ThreatModelling, Security Policy, Security Controls, ISO 27001, NIST, GDPR, Cloud, Azure. Please note that due to a high level of applications, we can only respond to applicants whose More ❯
ThreatModelling Engineer - GCP (Senior Associate, Technology) Job Description As a Senior Engineer - ThreatModelling you will be a part of a smart cross-functional team delivering digital business transformation solutions to our clients. This position entails an individual contributor role focused on Security Architecture and ThreatModelling, encompassing governance, evaluation of public cloud … Program Management, and Development teams are essential. The candidate will conduct technical architecture reviews to pinpoint security opportunities, identify exploitable threats, and propose mitigation strategies. Your Impact •Conduct thorough threat modeling exercises utilizing established methodologies and frameworks •Maintain a rigorous standard of excellence in identifying potential threats and specifying effective mitigation controls. •Manage the lifecycle of identified threats and … associated controls, ensuring timely updates and adjustments as necessary. •Deliver comprehensive threat models and related tasks within specified timeframes. •Offer constructive feedback, support, and suggestions for enhancing the existing threat modeling process. •Present findings and progress updates to senior leadership, team members, and relevant technical stakeholders. Qualifications We are seeking an ideal candidate with 8+ years of experience More ❯
servers, VM environments, client machines, and cloud services.o Proficiency in security-related software and tools, understanding of secure network architectures, experience with encryption and security protocols, and familiarity with threatmodelling and risk assessments.o Relevant certifications such as CISSP, CISM, CEH, or equivalent are highly desirable.o Strong analytical skills to identify security threats and implement effective solutions.o Ability More ❯
how technology choices impact Cyber Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate knowledge from outside own area … and layer 3 security) and network protocols (e.g., TCP/IP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation, collaboration, and continuous learning! How to More ❯
with ForgeRock IAM stack: PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing, threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on secure architecture Completion of ForgeRock 4xx-level More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank Limited
creation of RFCs (Request for Comments) and ADR (Architectural Decision Records) , having input into decision-making across frontend technologies. Security & Risk Management: Support Lead and Senior engineers in maintaining Threat Models for any domain changes, ensuring security and risk are at the forefront of development. Continuous Improvement: Engage in continuous learning and improvement within your Community of Practice . More ❯
Head of Security Engineering and lead in the build-out of their cloud-native Infrastructure capability. Highly technical position where you will be responsible for not just assessing and threatmodelling novel concepts and services to introduce across Security and the wider Tech functions; but leading in the actual design, configuration and implementation. Previous experience in Software Security … to put your stamp on one of the most ambitious Tech Transformations for one of the most renowned Investment Management firms in the UK. Responsibilities Perform hands-on security threatmodelling, risk assessment and vulnerability remediation. Evaluate, architect, implement and support security focused tools and services. Work closely with Development teams to ensure security and privacy are built More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
to high profile clients across all industries. The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance, social engineering, vulnerability assessments, penetration testing, threatmodelling, cyber-attack simulation exercises, and more to high profile clients across all industries. You'll benefit from ongoing coaching, career mentoring, and be supported by our career More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
including: How to test for/exploit them, real world mitigations that can be applied Familiarity with vulnerability classification frameworks (e.g. OWASP Top 10, CVSS, MITRE CVE) Ability to threat model systems/applications/platforms to assess design and find flaws that can be exploited What We’ll Give You A team of very skilled and diverse personnel More ❯