in mixed SaaS, bespoke and platform environments. Technical aspects include Azure cloud, Azure Data Lake, Data Warehouse, Integration architectures (event, messaging, API), security models, threatmodelling, IDP integration and security designs, MI platforms, portals, MS Power platform and SharePoint. Work closely with Programme Managers, Business Domain leads and … lifecycle Key Requirements: Extensive integration architecture experience Experience integrating SAAS tools Experience working with different finance products e.g. SAP or Workday Actuarial or risk modelling experience Ideally you will have working within Insurance or financial services For a full consultation on this role please email your CV to Arc more »
and champion security within your current role, you're very likely to be successful. You will be training developers on writing secure code, perform threatmodelling and security testing of applications, run SAST, DAST, SCA and secret scanning tools, manage the bug bounty program and lead incident response more »
In-depth knowledge of security concepts, OWASP Top 10 and CWE 25 Understanding of current and emerging security technologies and threats. Proven experience with threatmodelling and risk analysis Experience with penetration testing and vulnerability analysis frameworks and tools Well versed with driving and implementing secure development practices more »
areas to address pain points and continuously improve connectivity capabilities. Communicate effectively with stakeholders to promote secure communication practices. Maintain an up-to-date threat model and cyber view of the network and connectivity landscape. Perform network assessments, audits, and optimisations to ensure performance, security, and compliance standards are more »
be aligned to a product area and will be responsible for embedding security. This is a varied role which will see you carrying out threatmodelling, reviewing solution designs and challenging everything to find security issues. The role will require you to regularly engage and challenge key senior more »
development of secure software, focus on embedded systems or complete solutions Have detailed experience in the security concept/design, thread analysis, risk/threatmodelling and mitigation strategies Have professional knowledge of software languages (C, Java, Java Card, Phyton, Ruest) Be familiar with "state of the art more »
/SoC security architecture development. Good understanding of SoC architecture, embedded systems, and hardware/software co-design principles. Expericence in developing and reviewing threat modeling. Deep knowledge on microarchitectural attacks, side channels, fault injections. Proficiency in Verilog RTL coding and scripting languages, such as: Perl, Python Experience in more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
/exploit them, real world mitigations that can be applied Familiarity with vulnerability classification frameworks (e.g. OWASP Top 10, CVSS, MITRE CVE) Ability to threat model systems/applications/platforms to assess design and find flaws that can be exploited What We’ll Give You A team of …/exploit them, real world mitigations that can be applied Familiarity with vulnerability classification frameworks (e.g. OWASP Top 10, CVSS, MITRE CVE) Ability to threat model systems/applications/platforms to assess design and find flaws that can be exploited What We’ll Give You A team of more »
activities on relevant weapon system and missile programmes, with specific responsibilities for: Weapon system design and verification System and equipment integration RF system design Threat analysis Modelling & simulation activities associated with EW capability and performance We are recruiting to support two key areas of EW capability: Integrating Electromagnetic more »
Executed comprehensive GCP security assessments and vulnerability scans, driving threat modeling and risk assessment initiatives to design bespoke security solutions. • Developed and deployed comprehensive GCP Cloud Armor policies to enhance security across the organization’s cloud infrastructure. • Implemented rate limiting to manage and control incoming traffic, ensuring optimal performance … and protection against DDoS attacks. • Identified and blocked malicious IP addresses using threat intelligence feeds, reducing the risk of unauthorized access and potential breaches. • Configured custom security policies to defend against common web vulnerabilities and exploits, maintaining the integrity and availability of web applications. • Integrated threat intelligence to more »
London, England, United Kingdom Hybrid / WFH Options
Sportradar
Identify security breaches, implement corrective actions, and devise strategies to prevent future incidents. Collaborate with developers across Sportradar for in-depth security reviews and threat modeling. Work in an international team and environment. Automate application and infrastructure scanning and reporting. Mentor junior penetration testers and provide guidance on best … and IT infrastructure security best practices, including methodologies like OWASP Testing Guide andPTES Knowledgeof scripting languages (e.g., PowerShell, Python, Perl). Excellent understanding of threat modeling and SDLC/SSDLC processes. Effective communication skills across all organizational levels. Proven leadership and team mentoring experience. Preferred Qualifications and Skills: Demonstrable more »
risk and vulnerabilities from cyber-attacks by developing a security road-map tailored to your unique needs. We help organisations improve processes such as threat management by building an identity management programme, and establishing prevention, detection and response capabilities to cyber-attacks. Requirements Ability to research, articulate, pitch complex … analysis for specific domains, identify gaps in existing capabilities, service maturity. Identify missing cybersecurity and cyber-resiliency capabilities in alignment with changing business needs, threat land scape and technical requirements to increase the quality of the selected solutions also including topics such as products' convergence over time and products … decommissioning. Expert knowledge of identifying, developing and communicating threatmodelling and understanding the impact of decisions, balancing requirements and deciding between approaches Research and apply innovative security architecture solutions to new or existing problems and be able to justify and communicate subtle design decisions Able to develop vision more »
software systems by reviewing designs, auditing code, and performing penetration tests. The role involves developing and implementing vulnerability mitigation strategies, conducting risk assessments and threatmodelling, and managing vulnerabilities using industry standards. You will act as a security expert, proactively identifying and addressing potential threats, and integrating robust more »
Chichester, West Sussex, South East, United Kingdom
Natures Way Foods
IT Security Engineer role. preferably manufacturing but not essential. Key Responsibilities Responsible for educating the workforce on information security through training and building awareness. Threatmodelling, mitigation, validation, including software and hardware penetration testing. Work with all functions of the IT department to design security into the system … and drive security reviews. Develop tools to assist in modelling, analysis, detection, and prevention of security threats. Secure the system while ensuring ease of use for the user and network operations. Stay current on industry developments affecting security and privacy policy. Implement security measures, plans and polices to resolve more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
for each assigned product team/squad, and will support the implementation of secure solutions throughout the development life-cycle. You will also facilitate threat modeling workshops assisting product teams in identifying and mitigating threats. What you will be doing Oversee security related issues across multiple product teams/… Cloud serverless transformation projects. You will have the ability to work with infrastructure as code and understand complex architectures. You will Lead/facilitate threat modeling workshops with SMEs Engage with key stakeholders to identify threats and recommend countermeasures. Participate in architectural reviews of Product cloud implementations against security … such as OWASP, NIST, and ISO. Awareness of security tools and technologies, such as SAST, DAST, IAST, SCA, WAF, IDS, IPS. Experience in conducting threat modeling and risk assessments. Interview process The interview process for this role is two stages including a technical competency-based questions and a task. more »
Tadworth, Surrey, South East, United Kingdom Hybrid / WFH Options
Proactive Appointments Limited
Key Skills: Proven API Development experience In depth knowledge of API Integration Technologies, e.g. REST, SOAP Extensive exposure to secure coding principles e.g. OWASP, ThreatModelling High skills level in the ASP.NET and the .NET ecosystem and tools e.g. C#, Visual Studio, dotnet CLI Deep understanding of SOLID more »
Epsom, Surrey, South East, United Kingdom Hybrid / WFH Options
Reed Technology
Skills & Qualifications: Proven experience in API development and integration technologies such as REST and SOAP. Extensive knowledge of secure coding principles, including OWASP and Threat Modelling. Excellent hands-on coding skills using ASP.NET, the .NET ecosystem, and tools like C#, Visual Studio, and dotnet CLI. A deep understanding of more »
Threat Analyst with Security Clearance needed !!! The threat of Cyber attack is rising daily, companies specifically in the Defense industry dealing with sensitive information are in a constant battle to stay ahead of the oncoming threats. In this role you will be building and implementing processes and procedures … for continuous and effective threatmodelling, you will have to keep up to date with the global threat landscape, identify security gaps within this company and build attack simulations to support Purple Team engagements by outlining potential attack patterns. To be successful in this role you will … need an in-depth understanding of the external security environment and how the organisation reacts to the security threat. Good knowledge of the cyber threat landscape, global current affairs and geopolitics. The ideal candidate has served in the Armed Forces. If you or someone you know fits the description more »
Knowledge and experience of applying best practice for solution security (e.g., OWASP, NCSC cloud security principles) Strong understanding and practical experience of performing security threatmodelling and articulating risk profiles Deep understanding of security concepts and demonstrated application to technical solutions Knowledge and experience of applying best practice more »
Vulnerability assessment and penetration testing methodologies and processes for web, thick-client and mobile applications Experience with Splunk and/or other SIEM platforms Threatmodelling, intelligence and incident response Management, monitoring and operations of technology (backups, change management, system monitoring, incident/problem Management) Operational resilience, business more »
Developing cyber defence capabilities to protect LSEG from cyber threats that impact the confidentiality, integrity, and availability of group assets. Domain area is Vulnerability & Threat Management. Reports to Senior Manager, Vulnerability & Threat Management No direct FTE reports, but may handle contingents and vendor/partner resources. Location/… Key Risk Indicators, are delivered and handled. Technical/Job Functional Knowledge Knowledge and experience of the architecture, engineering and operation of vulnerability and threat management technology. Discovery and classification of vulnerabilities across systems and platforms. Guidance & assurance aspects of remediation. Level of knowledge in the domain technology area … level. A solid grasp of information security principles and standard methodologies. Adversary Tools, Techniques and Procedures. A deep understanding of TTP s is required. ThreatModelling experience. Broad technology knowledge across non-core domain area. Modern engineering practices, automation to drive efficiencies. Infrastructure as Code mentality. Code/ more »
Systems Security Professional (CISSP) Certified Authorization Professional (CAP) Certified Secure Software Lifecycle Professional (CSSLP) HealthCare Information Security and Privacy Practitioner (HCISPP) Experience Experience in Threat Modeling. A proven track record as engineer and consultant, capable of working directly with teams, embedded in the delivery model. Experience with Kubernetes, Openshift more »
the CI/CD pipeline and automate security testing and compliance checks. Provide guidance and support to development teams on secure coding practices and threatmodelling techniques. Collaborate with cloud architects to design and implement secure cloud environments. To be considered for this role, you should have: Must more »
required. At least 12 years of experience in Information Security and risk related work preferable in large organization especially banking environment. Deep understanding of threat modeling and risk management principles and best practices, and able to explain it in a structured and easy-to-understand manner. Strong understanding of more »