risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
services and best practices. Solid understanding of cloud security principles, including shared responsibility model, cloud native security controls, and infrastructure as code security. Experience with security incident response and threat modelling. Google Professional Cloud Security Engineer Azure Security Engineer Associate (AZ-500) Certified Cloud Security Professional (CCSP) This is very much a hands-on role requiring GCP and Azure More ❯
services and best practices. Solid understanding of cloud security principles, including shared responsibility model, cloud native security controls, and infrastructure as code security. Experience with security incident response and threat modelling. Google Professional Cloud Security Engineer Azure Security Engineer Associate (AZ-500) Certified Cloud Security Professional (CCSP) This is very much a hands-on role requiring GCP and Azure More ❯
Business to identify and mitigate risks. Translate complex technical risks into business-friendly language for executive audiences. Improve and evolve security risk assessment methodologies for advanced AI systems. Develop threat models and propose compensatory controls. Present findings to internal governance groups and help shape AI risk frameworks. Required Skills & Experience 10+ years of professional experience, including demonstrable AI/ More ❯
other security product like Trivy Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
security product like Trivy preferred Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
Experience performing secure application configurations of other large ERP type Software packages. Knowledge of configuration and integration security (API, etc.) for SaaS solutions Understanding Secure Architecture Design (Zero Trust, Threat Modeling) Understanding of Application Security (OWASP Top 10) Experience in programming languages and technologies used in web development Proficiency with AGILE techniques, preferably tools: Atlassian/Jira Proficiency in More ❯
Utilizing real-time dashboards to facilitate tracking and reporting to the Technology Leadership Team and the wider organization. Become fully embedded into our engineering teams and practices to: Lead threat modeling, vulnerability prioritization, and hold risk assessment exercises. Monitor zero-day threats and vulnerabilities, ensuring they are properly prioritized and resolved by responsible teams. Guide architectural security reviews to More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise and coordinate with technology and business stakeholders in relation to cybersecurity patching and vulnerability management issues/actions. Maintain a cyber threat assessment methodology, align to evolving industry standards and integrate into BAU and project-based business processes. Support with proactive threat hunting for new and emerging cyber threats. Develop … and maintain dashboards with cybersecurity threat and vulnerability metrics. Support compliance with relevant industry standards, regulations, and best practices, such as GDPR, NIS and ISO 27001. Base location - Hybrid - Clearwater Court Reading. Working pattern - 36 hours Monday to Friday. What you should bring to the role Strong knowledge of manual penetration testing techniques and confident with operating systems and More ❯
of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerability management and ensure threat exposure is minimised. Provide hands-on leadership in data and asset management , including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of … OT environments. Hands-on knowledge of OT technologies and protocols , including experience managing configuration changes. Experience working within incident response frameworks -from coordination to containment and recovery. Familiarity with threatmodelling and architectural reviews , particularly in critical national infrastructure. Relevant certifications or credentials in IEC62443 or cyber security frameworks applicable to OT environments. Understanding of the NCSC Cyber More ❯
Employment Type: Permanent
Salary: £57000 - £60000/annum Pension,Medical,Incentive plan,25 Ho
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerability management and ensure threat exposure is minimised. Provide hands-on leadership in data and asset management , including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of … OT environments. Hands-on knowledge of OT technologies and protocols , including experience managing configuration changes. Experience working within incident response frameworks -from coordination to containment and recovery. Familiarity with threatmodelling and architectural reviews , particularly in critical national infrastructure. Relevant certifications or credentials in IEC62443 or cyber security frameworks applicable to OT environments. Understanding of the NCSC Cyber More ❯
architectures. Review technical designs for security compliance and risk. Establish secure-by-design guidelines and support DevSecOps practices. Evaluate new technologies and lead security tool POCs and integrations. Perform threatmodelling and security risk assessments. Collaborate with cross-functional teams on secure architecture and governance. Provide security expertise, training, and mentorship to technical teams. Support security monitoring and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Hunter Bond
architectures. Review technical designs for security compliance and risk. Establish secure-by-design guidelines and support DevSecOps practices. Evaluate new technologies and lead security tool POCs and integrations. Perform threatmodelling and security risk assessments. Collaborate with cross-functional teams on secure architecture and governance. Provide security expertise, training, and mentorship to technical teams. Support security monitoring and More ❯
Conducting assurance reviews and risk assessments Embedding security into solution designs Supporting incident response and post-incident analysis Ensuring compliance with GDPR, ISO27001, NIST, and other frameworks Advising on threatmodelling and mitigation strategies What We're Looking For: Strong understanding of security principles and frameworks Experience designing and implementing security controls Excellent stakeholder engagement and communication skills More ❯
solutions from design through to delivery. Develop reusable security patterns, architecture principles, and frameworks. Drive security architecture across digital programmes such as ITSM (ServiceNow) and back-office modernisation. Conduct threatmodelling , risk analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with industry standards such as ISO27001 More ❯
your teammates to take ownership of security across the business from hardening and monitoring to governance and incident response Designing and evolving secure architectures using defence in depth and threatmodelling principles across cloud, networks and endpoints Driving vulnerability management and scaling tooling such as CSPM, SIEM, IAM and endpoint protection to manage risk effectively Contributing to compliance More ❯
Key Responsibilities: Lead the design, implementation, and upkeep of the OT Cybersecurity Management System and policies to OG86 and IEC(phone number removed)-1 compliance. Conduct risk assessments and threat modeling for OT environments in accordance with IEC(phone number removed)-2. Manage NIS compliance for OT Networks and produce the NIS annual report. Collaborate withOT Engineers to More ❯
years of experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python More ❯
our culture and success. How will you contribute? Secure SDLC Integration: Embed security within the software development lifecycle, ensuring security is considered at every phase-from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threat modeling and security assessments for new features, architectures, and services. Vulnerability Management & Remediation: Work closely with engineering teams to identify and … Experience working in SaaS, multi-tenant cloud environments. Knowledge of machine learning security (AI/ML model risks, LLM security best practices). Familiarity with attack surface management and threat intelligence. What do we offer? We value our people and offer a competitive salary along with company bonus Strong maternity and paternity scheme A workplace pension scheme Take what More ❯
of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerability management and ensure threat exposure is minimised. Provide hands-on leadership in data and asset management , including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of … OT environments. Hands-on knowledge of OT technologies and protocols , including experience managing configuration changes. Experience working within incident response frameworks —from coordination to containment and recovery. Familiarity with threatmodelling and architectural reviews , particularly in critical national infrastructure. Relevant certifications or credentials in IEC62443 or cyber security frameworks applicable to OT environments. Understanding of the NCSC Cyber More ❯
of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerability management and ensure threat exposure is minimised. Provide hands-on leadership in data and asset management , including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of … OT environments. Hands-on knowledge of OT technologies and protocols , including experience managing configuration changes. Experience working within incident response frameworks —from coordination to containment and recovery. Familiarity with threatmodelling and architectural reviews , particularly in critical national infrastructure. Relevant certifications or credentials in IEC62443 or cyber security frameworks applicable to OT environments. Understanding of the NCSC Cyber More ❯