App security. Ability in software development or programming/scripting Experience in applied security research, cryptography, mathematics, or computer science Skills in application security threatmodelling, source code review, reverse engineering, fuzzing, and cloud service testing (AWS/Azure) Benefits: Life Assurance at 4x Basic Annual Salary; Pension more »
securely and efficiently. Perform thorough security assessments on GCP environments, utilizing GCP-specific security tools and technologies, to identify and address potential vulnerabilities. Conduct threat modeling and risk assessments for GCP deployments, designing effective security solutions tailored to GCP services. Collaborate with cross-functional teams to respond to GCP more »
securely and efficiently. Perform thorough security assessments on GCP environments, utilizing GCP-specific security tools and technologies, to identify and address potential vulnerabilities. Conduct threat modeling and risk assessments for GCP deployments, designing effective security solutions tailored to GCP services. Collaborate with cross-functional teams to respond to GCP more »
level executives. Complementary Technical Skills: Hands-on experience with programming languages, databases, and IoT. Knowledge of containerisation technologies such as Docker. Experience with Attack & Threat Modelling. Familiarity with Red Team testing and social engineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. more »
Greater London, Grange, United Kingdom Hybrid / WFH Options
Remarkable Jobs
Consultant (Pen Tester) Complementary Technical Skills: Hands-on experience with programming languages, databases, and IoT Knowledge of containerization technologies (e.g., Docker) Experience with Attack & Threat Modeling Red Team testing and social engineering methodologies Working knowledge of CobaltStrike Experience with bug bounty programs and vulnerability disclosure policies Security Testing Consultant more »
Greater London, England, United Kingdom Hybrid / WFH Options
Risk Crew
you do. Your complementary technical skills: Hands-on with programming languages, databases and IoT. Knowledge of containerisation technologies, such as Docker. Experience with Attack & Threat Modelling. Red Team testing and social engineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. Your education more »
london, south east england, United Kingdom Hybrid / WFH Options
Risk Crew
you do. Your complementary technical skills: Hands-on with programming languages, databases and IoT. Knowledge of containerisation technologies, such as Docker. Experience with Attack & Threat Modelling. Red Team testing and social engineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. Your education more »
Ideally this person would have Vulnerability management experience. System Admin background desired but not essential, this includes experience across Unix, Windows, Cisco, Networking, etc. ThreatModelling exposure flexible This is a permanent position that operates on a hybrid work setup of 2 days in the office, 3 days more »
london, south east england, United Kingdom Hybrid / WFH Options
Sterlings
Ideally this person would have Vulnerability management experience. System Admin background desired but not essential, this includes experience across Unix, Windows, Cisco, Networking, etc. ThreatModelling exposure flexible This is a permanent position that operates on a hybrid work setup of 2 days in the office, 3 days more »
ideal candidate for the Security Architect will have the following skills and experience: Extensive experience designing security solutions, primarily for on-prem Experience with ThreatModelling frameworks Thorough knowledge of Information Security controls Excellent communication skills, with the ability to translate complex engineering terms into language that business more »
ideal candidate for the Security Architect will have the following skills and experience: Extensive experience designing security solutions, primarily for on-prem Experience with ThreatModelling frameworks Thorough knowledge of Information Security controls Excellent communication skills, with the ability to translate complex engineering terms into language that business more »
ideal candidate for the Security Architect will have the following skills and experience: Extensive experience designing security solutions, primarily for on-prem Experience with ThreatModelling frameworks Thorough knowledge of Information Security controls Excellent communication skills, with the ability to translate complex engineering terms into language that business more »
ideal candidate for the Security Architect will have the following skills and experience: Extensive experience designing security solutions, primarily for on-prem Experience with ThreatModelling frameworks Thorough knowledge of Information Security controls Excellent communication skills, with the ability to translate complex engineering terms into language that business more »
compliance in ISO 27001, GDPR, PCI DSS Have a strong understanding of network security principles and practices Be experienced in conducting risk assessments and threatmodelling Be generally proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusion detection more »
environments Set up Network Access Control Lists (NACLs) to control inbound and outbound traffic and apply subnetting principles for secure network segmentation Produce Detailed Threat models after reviewing technical design documents Skills: Should have proven experience as a Security Architect working in a large, complex organization. Ideally, this experience more »
environments Set up Network Access Control Lists (NACLs) to control inbound and outbound traffic and apply subnetting principles for secure network segmentation Produce Detailed Threat models after reviewing technical design documents Skills: Should have proven experience as a Security Architect working in a large, complex organization. Ideally, this experience more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Erin Associates
processes. Core skills & experience for this Security Analyst role: Security review methodologies: SAST, DAST, SBOM, SCA Implementing security tooling in CI/CD pipelines Threat modeling Code review (Java or C#) Familiarity with security frameworks like PCI, ISO 27001, Cyber Essentials This company offers structured training, career development opportunities … details, call 0161 438 1177 or follow us on Twitter @erinassociates for similar roles. Key words: Security Reviews, ISO Standards, SBOM, SCA, SAST, DAST, ThreatModelling, Security Tooling, Code Review, Manchester, North West, Java C#, Infosec, IT Security analyst Please get in touch on 0161 438 1177 if more »
activities for projects, services, and third party suppliers. Leading the evaluation of business-supporting cyber security needs, undertake cyber security related risk assessments, conduct threatmodelling, and ensure activities are consistent with applicable regulations and legislation. Providing advice to a range of stakeholders on how to remedy identified more »
Epsom, Surrey, South East, United Kingdom Hybrid / WFH Options
Reed Technology
Skills & Qualifications: Proven experience in API development and integration technologies such as REST and SOAP. Extensive knowledge of secure coding principles, including OWASP and Threat Modelling. Excellent hands-on coding skills using ASP.NET, the .NET ecosystem, and tools like C#, Visual Studio, and dotnet CLI. A deep understanding of more »
role, you will be instrumental in providing Cyber Security services globally, focusing on driving the Cyber Assurance programme to reduce the bank’s cyber threat landscape and ensure robust "Business As Usual" cyber assurance processes. Key Responsibilities: Cyber Test and Validation Management: Oversee the Cyber Test and Validation process … and cryptography. Security Solutions: Experience in architecting and engineering complex security solutions, implementing global policies and standards. Methodologies: Familiar with "Attack and Defensive" methods, Threat Hunting, Threat modeling, Reverse engineering, Vulnerability Management, Data modeling, and security metrics. Automation and Scripting: Skilled in Python, Shell, Ansible, Jenkins. Cloud Technologies more »
and champion security within your current role, you're very likely to be successful. You will be training developers on writing secure code, perform threatmodelling and security testing of applications, run SAST, DAST, SCA and secret scanning tools, manage the bug bounty program and lead incident response more »
and champion security within your current role, you're very likely to be successful. You will be training developers on writing secure code, perform threatmodelling and security testing of applications, run SAST, DAST, SCA and secret scanning tools, manage the bug bounty program and lead incident response more »
Tadworth, Surrey, South East, United Kingdom Hybrid / WFH Options
Proactive Appointments Limited
Key Skills: Proven API Development experience In depth knowledge of API Integration Technologies, e.g. REST, SOAP Extensive exposure to secure coding principles e.g. OWASP, ThreatModelling High skills level in the ASP.NET and the .NET ecosystem and tools e.g. C#, Visual Studio, dotnet CLI Deep understanding of SOLID more »
Key Skills: Proven API Development experience In depth knowledge of API Integration Technologies, e.g. REST, SOAP Extensive exposure to secure coding principles e.g. OWASP, ThreatModelling High skills level in the ASP.NET and the .NET ecosystem and tools e.g. C#, Visual Studio, dotnet CLI Deep understanding of SOLID more »
cloud platforms and be well-versed in security protocols, including SSH and HTTP. Complementary skills that will enhance your role include programming, containerisation, and threatmodelling, enabling you to provide a holistic approach to cybersecurity challenges. To qualify for this role, it is essential to hold one of more »