have a solid background in Cyber Security, with the following skills and experience: Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable ThreatModelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incident response, and forensic analysis. Ability to perform triage of security More ❯
what you will be involved in: Identify security requirements and ensure the integration of security controls during the product development lifecycle Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure by Design principles Identify security More ❯
what you will be involved in: Identify security requirements and ensure the integration of security controls during the product development lifecycle Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure by Design principles Identify security More ❯
what you will be involved in: Identify security requirements and ensure the integration of security controls during the product development lifecycle Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure by Design principles Identify security More ❯
what you will be involved in: Identify security requirements and ensure the integration of security controls during the product development lifecycle Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure by Design principles Identify security More ❯
what you will be involved in: Identify security requirements and ensure the integration of security controls during the product development lifecycle Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure by Design principles Identify security More ❯
other security product like Trivy Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Carrington Recruitment Solutions Limited
security product like Trivy preferred Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
standards (e.g., GDPR, PCI-DSS, SOX). Lead integration efforts with identity providers (IdPs), service providers (SPs), and third-party systems using SAML, OAuth2, OpenID Connect. Conduct security assessments, threat modeling, and performance tuning of ForgeRock AM components. Enable and support product upgrade and engineering aspects for Authentication platform and associated components Provide technical leadership and mentoring to IAM More ❯
in cybersecurity management. A deep understanding of at least three of the following areas - information security, cryptography, communication security, service-orientated architectures, cloud-based systems, security risk assessments, or threat modelling. Degree or equivalent experience in (Computer Science, Engineering, Cyber Security, IT Security Management, Security Risk Management) a related security field. Experience in implementing security industry frameworks, policies and More ❯
cloud platforms. • Collaborate with enterprise and domain to align solutions. Security & Compliance • Implement robust API security practices (e.g. OAuth2, OIDC). • Ensure compliance with financial and regional regulations. • Conduct threat modeling and risk assessments for API exposure. Leadership & Collaboration • Mentor and guide development teams on API best practices. • Act as a technical liaison between business stakeholders and engineering teams. More ❯
cloud platforms. • Collaborate with enterprise and domain to align solutions. Security & Compliance • Implement robust API security practices (e.g. OAuth2, OIDC). • Ensure compliance with financial and regional regulations. • Conduct threat modeling and risk assessments for API exposure. Leadership & Collaboration • Mentor and guide development teams on API best practices. • Act as a technical liaison between business stakeholders and engineering teams. More ❯
cloud platforms. • Collaborate with enterprise and domain to align solutions. Security & Compliance • Implement robust API security practices (e.g. OAuth2, OIDC). • Ensure compliance with financial and regional regulations. • Conduct threat modeling and risk assessments for API exposure. Leadership & Collaboration • Mentor and guide development teams on API best practices. • Act as a technical liaison between business stakeholders and engineering teams. More ❯
london (city of london), south east england, united kingdom
Pontoon Solutions
cloud platforms. • Collaborate with enterprise and domain to align solutions. Security & Compliance • Implement robust API security practices (e.g. OAuth2, OIDC). • Ensure compliance with financial and regional regulations. • Conduct threat modeling and risk assessments for API exposure. Leadership & Collaboration • Mentor and guide development teams on API best practices. • Act as a technical liaison between business stakeholders and engineering teams. More ❯
cloud platforms. • Collaborate with enterprise and domain to align solutions. Security & Compliance • Implement robust API security practices (e.g. OAuth2, OIDC). • Ensure compliance with financial and regional regulations. • Conduct threat modeling and risk assessments for API exposure. Leadership & Collaboration • Mentor and guide development teams on API best practices. • Act as a technical liaison between business stakeholders and engineering teams. More ❯
Senior Threat Modeler 12 months initially Remote (with occasional visits to Preston or Frimley) £41.94 per hour Role Description • Supports the overall delivery of the threatmodelling function and wider UK SOC by evaluating the clients estate and its capability. • Proactively protects the client through continual testing of security controls. • Understands Cyber Threat Intelligence and Ac... More ❯
assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerability management and ensure threat exposure is minimised. Provide hands-on leadership in data and asset management, including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of … OT environments. Hands-on knowledge of OT technologies and protocols, including experience managing configuration changes. Experience working within incident response frameworks-from coordination to containment and recovery. Familiarity with threatmodelling and architectural reviews, particularly in critical national infrastructure. Relevant certifications or credentials in IEC62443 or cyber security frameworks applicable to OT environments. Understanding of the NCSC Cyber More ❯
Employment Type: Permanent
Salary: £57000 - £60000/annum Pension,Medical,Incentive Plan,25 Ho
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
assessment of OT network architecture, protocols, and change management processes. Lead incident response and remediation for cyber events detected by OT SIEM systems. Actively support vulnerability management and ensure threat exposure is minimised. Provide hands-on leadership in data and asset management, including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of … OT environments. Hands-on knowledge of OT technologies and protocols, including experience managing configuration changes. Experience working within incident response frameworks-from coordination to containment and recovery. Familiarity with threatmodelling and architectural reviews, particularly in critical national infrastructure. Relevant certifications or credentials in IEC62443 or cyber security frameworks applicable to OT environments. Understanding of the NCSC Cyber More ❯
following skills and experience: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable ThreatModelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority, and impact, while More ❯
following skills and experience: Experience in SOC operations, incident response, and forensic analysis. Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable ThreatModelling System solutions, as well as with IDS/IPS and vulnerability scanners. Ability to perform triage of security events to determine their scope, priority, and impact, while More ❯
North West London, London, United Kingdom Hybrid / WFH Options
SCALERS GROUP LIMITED
trusted advisor to development teams, architects, and stakeholders across our clients organisation. Design and review security architectures for applications, ensuring the implementation of effective security controls and countermeasures. Conduct threatmodelling exercises to identify potential security risks and vulnerabilities early in the development lifecycle. Conduct in-depth security assessments, code reviews, and penetration testing of applications to identify More ❯
security requirement input is provided across the programme to ensure that the new technology is secure by design Support the teams to interpret security requirements of the project Conduct threatmodelling and pen testing to identify threats and establish controls Support wider teams with security advice and guidance in both a verbal and written format Lead delivery of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MLC Partners
delivery, UX, and vendor teams (incl. a HubSpot Elite Implementation Partner) to land working, secure solutions. Produce architecture docs (C4, sequence/data flow diagrams), non-functional requirements, and threat models. Experience: Deep hands-on with HubSpot CRM, Service Hub, Sales Hub Enterprise , Custom Objects , calculated properties , reports/dashboards , and complex workflows . Strong integration design using HubSpot More ❯
Senior Threat Modeler 12 months initially Remote (with occasional visits to Preston or Frimley) £41.94 per hour Role Description • Supports the overall delivery of the threatmodelling function and wider UK SOC by evaluating the clients estate and its capability. • Proactively protects the client through continual testing of security controls click apply for full job details More ❯
build a scalable, adaptable, and proactive approach to securing customer's mobile apps, enabling mobile engineers across the bank to operate with confidence and agility in an ever-evolving threat landscape. We're passionate about our shared passion for delivering new features for customers across our brands in the mobile space. This role will be pivotal in building, delivering … role is the design and delivery of a world-class security framework, including associated services (penetration testing, research, consultancy etc.). Essential skills & experience: Experience of Mobile platform security, threatmodelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts More ❯