of data sources from cloud, on-prem, endpoint, network and application layers Create and maintain detection rules, correlation logic and alerts tailored to specific threat scenarios Provide technical leadership and mentorship to team members Work closely with SOC teams to align SIEM capabilities with business objectives Conduct SIEM health … more major SIEM platforms (e.g. Splunk, Sentinel etc.) Deep understanding of log ingestion, parsing, normalisation and enrichment Strong grasp of MITRE ATT&CK framework, threat detection and alert logic Solid scripting/automation skills (e.g., Python, PowerShell, Bash) Experience with cloud logging and monitoring (AWS CloudTrail, Azure Monitor, GCP … etc.) Experience with threatmodelling, cloud security or Identity and Access Management is desirable More ❯
design and cloud-native architecture Acting as a key escalation point for vulnerability triage and remediation Delivering developer enablement through workshops and hands-on threatmodelling What you’ll bring: 3+ years in application or product security roles Strong grasp of application-level threats, secure design, and remediation More ❯
design and cloud-native architecture Acting as a key escalation point for vulnerability triage and remediation Delivering developer enablement through workshops and hands-on threatmodelling What you’ll bring: 3+ years in application or product security roles Strong grasp of application-level threats, secure design, and remediation More ❯
the Blockchain space as a DevSecOps Engineer or Platform Engineer Expertise in AWS and experience with Infrastructure-as-Code Understanding of risk assessment and threatmodelling to identify threats within the digital trading space across the public cloud Security awareness with the ability to understand requirements from the More ❯
the Blockchain space as a DevSecOps Engineer or Platform Engineer Expertise in AWS and experience with Infrastructure-as-Code Understanding of risk assessment and threatmodelling to identify threats within the digital trading space across the public cloud Security awareness with the ability to understand requirements from the More ❯
Networks, VMware, etc. Excellent knowhow of common cyber threats and vulnerabilities (e.g., malware, phishing, DDoS attacks). Sound knowledge of emerging security threats and threatmodelling will be advantage. Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced More ❯
London, England, United Kingdom Hybrid / WFH Options
Client Server
Azure, hybrid infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threatmodelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Client Server
Azure, hybrid infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threatmodelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide More ❯
complex infrastructure environments A strong technical background across Networks, Security, Firewall, Vulnerability Management, SIEM and EDR technologies Experience with cyber security concepts, such as ThreatModelling, Incident Response, Penetration Testing (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft 365 Emotionally intelligent and able More ❯
robust program of vulnerability testing, penetration testing, and security reviews Manage security-related infrastructure across AWS, GCP, Google Workspace, and other related platforms Lead threat modeling exercises with the product engineering teams Manage and lead our pentesters and engineering audits Lead security- and privacy-related incident response Develop security More ❯
Develop and deliver a strategy for building a cutting-edge crime and social destabilisation research agenda; Develop cutting edge evaluations which relate to these threat-models which can reliably assess the capability of Frontier AI systems; Deliver additional impactful research by overseeing a diverse portfolio of research projects, potentially More ❯
collaborate with diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency More ❯
collaborate with diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency More ❯
collaborate with diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency More ❯
collaborate with diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency More ❯
all product teams/tribes. In this role, you will be directly managing a 3-person team. The role will see you working on threatmodelling, building security into the SDLC, and managing the full product security life cycle including cloud security (AWS) and supply chain security. The More ❯
scalable GCP environments using Terraform Ensure GCP security best practices and perform compliance checks Key Requirements: Expertise in GCP and Terraform Proficiency in GCP ThreatModelling, CSP, and REGO policies Excellent communication skills This position is an urgent hire, and our client prefers candidates available immediately or nearing More ❯
scalable GCP environments using Terraform Ensure GCP security best practices and perform compliance checks Key Requirements: Expertise in GCP and Terraform Proficiency in GCP ThreatModelling, CSP, and REGO policies Excellent communication skills This position is an urgent hire, and our client prefers candidates available immediately or nearing More ❯
and governance for Azure Landing Zones. Provide expert security advisory to cloud architects, engineers, and operational teams. Conduct security architecture reviews, risk assessments, and threatmodelling activities. Design and embed security controls within Azure Landing Zone frameworks and services. Maintain and evolve security patterns, guardrails, and reference architectures. More ❯
through formal tender process, feasibilities phases, design phases, implementation, and validation phases, including risk assessments Security Architecture and Design- Review of design documents, performing threatmodelling and risk assessments, incorporating security non-functional requirements and be a standing member of Technical Design Authority Be the Security touchpoint for More ❯
Portsmouth, yorkshire and the humber, united kingdom
TalentHawk
through formal tender process, feasibilities phases, design phases, implementation, and validation phases, including risk assessments Security Architecture and Design- Review of design documents, performing threatmodelling and risk assessments, incorporating security non-functional requirements and be a standing member of Technical Design Authority Be the Security touchpoint for More ❯
practice to assist with baking security into architectural standards. Essential Skills & Experience: Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct More ❯
practice to assist with baking security into architectural standards. Essential Skills & Experience: Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct More ❯
throughout the software development lifecycle Perform security code reviews and provide security guidance during product design and development to ensure Secure by Design Conduct threatmodelling exercises to prioritise potential risks and develop mitigation strategies to reduce risks Ensure products meet regulatory standards such as ISO27001, NIST More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Jet2.com Limited
Shape, create or own cloud security strategy, policies, tools and services. Evaluate and shape responses to cloud alerts and events from security tools. Conduct threatmodelling and develop cloud security incident response plans. Provide security consultation as a cloud security SME in forums and to other teams. Provide More ❯