required projects Manage security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threatmodelling, and vulnerability management and risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security more »
london (city of london), south east england, United Kingdom
Barclay Simpson
required projects Manage security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threatmodelling, and vulnerability management and risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security more »
the CI/CD pipeline and automate security testing and compliance checks. Provide guidance and support to development teams on secure coding practices and threatmodelling techniques. Collaborate with cloud architects to design and implement secure cloud environments. To be considered for this role, you should have: Must more »
the CI/CD pipeline and automate security testing and compliance checks. Provide guidance and support to development teams on secure coding practices and threatmodelling techniques. Collaborate with cloud architects to design and implement secure cloud environments. To be considered for this role, you should have: Must more »
Ideally experience of securing Github and Github actions (or similar). Ideally experience in securing data platforms (e.g. Databricks, Dagster, Snowflake). Experience in Threat Modelling. Exposure to Agile working and DevSecOps. Knowledge of ISO 27001. Relevant certifications, such as: Microsoft certifications (MS-500, AZ-500, AZ-700, SC more »
Azure - A solid understanding of cloud computing and its security concerns - Ability to articulate complex security concepts to a non-technical audience - Experience in threatmodelling and risk assessment - Strong analytical skills and attention to detail - Excellent communication and stakeholder management abilities Requirements: - Security clearance is essential for more »
ability to design and implement complex security solutions in line with company policies and standards. • Familiarity with various security techniques and methodologies, such as threat modeling and vulnerability management. • Proficiency in automation and scripting using Python, Shell, Ansible, Jenkins, etc. • Industry certifications in information security or information technology preferred more »
ability to design and implement complex security solutions in line with company policies and standards. • Familiarity with various security techniques and methodologies, such as threat modeling and vulnerability management. • Proficiency in automation and scripting using Python, Shell, Ansible, Jenkins, etc. • Industry certifications in information security or information technology preferred more »
effective authorization concepts for SAP systems. Administer SAP roles and analyze user access to ensure compliance with segregation of duties (SoD) policies. Produce detailed threat models after reviewing technical design documents. Review and input security into solution architecture and high-level designs. Advise and consult with development teams on more »
effective authorization concepts for SAP systems. Administer SAP roles and analyze user access to ensure compliance with segregation of duties (SoD) policies. Produce detailed threat models after reviewing technical design documents. Review and input security into solution architecture and high-level designs. Advise and consult with development teams on more »
security risk management & compliance in ISO 27001, GDPR, PCI DSS. Strong understanding of network security principles and practices. Experience in conducting risk assessments and threat modelling. Proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu). Professional certifications, such as CISSP, CISA, CRISC, or similarDesirable - Demonstrable knowledge more »
lakes, data warehouses, and data pipelines. Implement encryption, access controls, and auditing for Kafka topics and data streams & monitor anomalies in clusters. Produce Detailed Threat models after reviewing technical design documents. Design and implement authentication mechanisms (e.g., OAuth, JWT) for APIs and services. Key skills: Should have proven experience more »
london, south east england, United Kingdom Hybrid / WFH Options
Maclean Moore
lakes, data warehouses, and data pipelines. Implement encryption, access controls, and auditing for Kafka topics and data streams & monitor anomalies in clusters. Produce Detailed Threat models after reviewing technical design documents. Design and implement authentication mechanisms (e.g., OAuth, JWT) for APIs and services. Key skills: Should have proven experience more »
doing: Identify security vulnerabilities from a wide pool of technological solutions Perform risk analysis to triage and manage the remediation or mitigation activity Perform threat modeling activities across a variety of applications and environments Perform security assessments of existing architecture and make security recommendations for new deployments or changes more »
doing: Identify security vulnerabilities from a wide pool of technological solutions Perform risk analysis to triage and manage the remediation or mitigation activity Perform threat modeling activities across a variety of applications and environments Perform security assessments of existing architecture and make security recommendations for new deployments or changes more »
Chichester, West Sussex, South East, United Kingdom
Natures Way Foods
IT Security Engineer role. preferably manufacturing but not essential. Key Responsibilities Responsible for educating the workforce on information security through training and building awareness. Threatmodelling, mitigation, validation, including software and hardware penetration testing. Work with all functions of the IT department to design security into the system … and drive security reviews. Develop tools to assist in modelling, analysis, detection, and prevention of security threats. Secure the system while ensuring ease of use for the user and network operations. Stay current on industry developments affecting security and privacy policy. Implement security measures, plans and polices to resolve more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
controls and NIST Guidelines Experience in implementing security automation using Scripting languages eg Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
with Windows as well as Red Hat Linux Operating System analytical, troubleshooting, and problem-solving skills basic understanding of cloud security best practices, Forensics, threatmodelling, and offensive techniques. with Scrum/Agile development. understanding of and experience with CI/CD pipelines. are a plus but not more »
the Governance, Risk, and Compliance (GRC) team to inform on risk, compliance, and assurance matters related to the portfolio of change initiatives. Ensure that Threat Modeling is implemented for identified programs, projects, and engineering initiatives within the portfolio. Work closely with the Security Culture team to ensure alignment and more »
london, south east england, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
the Governance, Risk, and Compliance (GRC) team to inform on risk, compliance, and assurance matters related to the portfolio of change initiatives. Ensure that Threat Modeling is implemented for identified programs, projects, and engineering initiatives within the portfolio. Work closely with the Security Culture team to ensure alignment and more »
controls and NIST Guidelines Experience in implementing security automation using Scripting languages eg Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threatmodelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life Assurance at 4x Basic Annual Salary; Pension more »