will engineering teams to create solutions that solve or remediate security problems. This will involve a range of activities, including (but not limited to) threatmodelling, selection and configuration of DevSecOps tools, high-level and detailed security designs. Key Responsibilities: We are seeking a Senior Security Engineer who … secure software. You should possess verifiable experience in: Strong technical knowledge - a comprehensive understanding of software engineering principles, system architecture, and contemporary development frameworks. Threat modeling, as well as the design and implementation of security controls (either in a cloud environment or on-premises). Familiarity with cryptographic primitives More ❯
years experience in vulnerability management and remediation roles PREFERRED QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Extensive experience in vulnerability management and remediation operations More ❯
and decentralized finance solutions. Familiarity with CI/CD pipelines and end-to-end testing frameworks like Cypress. Strong understanding of software security, including threat modeling and security issue reporting. Bonus Qualifications: Experience contributing to award-winning hackathon projects involving on-chain credit solutions and zero-knowledge proofs. Experience More ❯
Experience learning software, frameworks and APIs. Preferred Qualifications Understanding of implementation and scaling of access controls across both host and network layers. Understanding of threat models to better protect against attacks or detect new vectors. Experience leading network efforts to investigate, prevent, and mitigate security incidents. Experience evaluating and More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Sycurio
are the thought leader on all matters within the security and compliance domain such that the company remains secure against the ever-changing security threat and compliance landscape. Information Security Strategy Create and maintain the Company's strategy, ensuring alignment to the Company's strategy and business goals. Work … and propose remediation and mitigation plans and solutions. Responsible for the Company's information security capability, ensuring it remains secure against an ever-changing threat landscape. Operational Input Contribute to design and architectural decisions and improve the approach to the Company's threat modelling. Lead on information security … incidents and work directly with internal teams and external parties on containment and mitigation activities. Execute threat simulations. Assess emerging and potential security threats and act proactively to mitigate relevant threats. End-to-end vulnerability management. Manage the security toolset. Act as the security "face" of Sycurio to its More ❯
a crucial role in safeguarding our environment. You'll also contribute to building custom security tools to enhance our capabilities and support security assessments, threatmodelling, and penetration testing. You'll come with hands-on experience with AWS and Cloudflare and be comfortable working with Infrastructure as Code More ❯
Collaborate effectively with third-party vendors to maintain trusted security partnerships Oversee and guide teams in identifying, probing, and exploiting potential security weaknesses Drive threatmodelling initiatives and deliver clear, actionable reports on key security metrics Main Skills/Requirements: CREST certification (required for this role) Must hold More ❯
impact on a fast-growing global platform. Joining as a Product Security Engineer, you'll take charge of securing infrastructure at scale. From performing threat modeling and security assessments to helping developers understand and remediate vulnerabilities, you'll be the go-to expert for keeping systems resilient. You'll More ❯
URGENT! Are you an experienced Threat Intelligence professional with a deep understanding of global cyber threats? Do you have a proven track record of analyzing, reporting, and presenting critical intelligence to both technical and non-technical stakeholders? If so, we want to hear from you! About the Role: As … a Threat Intelligence Manager, you will play a crucial role in monitoring, analyzing, and reporting on global cyber threats that could impact the firm. You will be responsible for delivering clear, concise, and actionable intelligence to senior leadership, security teams, and other key stakeholders. Your expertise will help drive … proactive risk mitigation strategies and ensure the firm remains resilient in an evolving threat landscape. Key Responsibilities: Monitor and assess global cyber threats, geopolitical risks, and emerging attack trends. Develop and deliver comprehensive intelligence reports tailored for technical teams and executive leadership. Collaborate with cybersecurity, risk, and compliance teams More ❯
years in product security Strong object orientated programming experience across languages such as Python, C++, Java, Go or Rust Extensive cloud experience Knowledge of threatmodelling and risk assessment Please contact james.griffin@stanfordblack.com for more information If this role isn't right for you, but you know of More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Stanford Black Limited
years in product security Strong object orientated programming experience across languages such as Python, C++, Java, Go or Rust Extensive cloud experience Knowledge of threatmodelling and risk assessment Please contact james.griffin@stanfordblack.com for more information If this role isn't right for you, but you know of More ❯
to maintain and improve our leadership in the industry. Your mission Research and demonstrate cutting-edge hardware supply chain attacks. Perform security evaluations and threatmodelling on supply chain processes for Ledger hardware wallets. Define and implement best practices to enhance supply chain security for manufacturing, distribution, and More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
TransUnion
people, process and technology within the TransUnion Monevo portfolio. Day to Day You’ll Be: Guides and advises technology teams on infrastructure vulnerability and threat management principles, secure coding practices, secure software development methodologies, and secure development lifecycle (SDLC) processes Works with engineering and development team to ensure in … and partners with functional areas and leadership across the business and Global Technology to raise awareness and support for Product Security When necessary, conducts Threat Modeling of products and applications within the organization to identify potential threats and vulnerabilities Provides periodic updates, education and presentations to staff and management … on compliance with policies, standard, regulations and best practices 3+ years of information security experience in cloud environments. In depth experience secure coding practices, threat modeling, secure architecture design, and secure SDLC/CICD pipelines In-depth technical experience with identifying and advising on the remediation of application security More ❯
must be an individual who understands modern software development trends, understands engineering-led software security practices, and keeps up with the evolving cyber security threat landscape. The successful candidate will liaise with internal groups and our regional partners to ensure that program deliverables are met. Success in the role … make strategic recommendations to senior manager on standards and policy changes Qualifications Experience or deep knowledge of key activities within software security group such Threat Modeling/Application Risk Assessment, Vulnerability Assessments, Governance and Metrics, Training, etc. Pre-requisites for this position are a Bachelor's Degree with More ❯
easyJet is overseen by 3 Aviation Regulators, each with their own cyber security control expectations, along with legal compliance requirements and a changing cyber threat landscape. The Technical Assurance team is responsible for overseeing easyJet’s strong cyber security posture. We help functions adopt and improve control adoption as … Safety, Data Teams, IT operations and our IT teams to minimise data breaches or data leaks. Working with the Cyber Architecture to validate the threat models produced as part of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk More ❯
easyJet is overseen by 3 Aviation Regulators, each with their own cyber security control expectations, along with legal compliance requirements and a changing cyber threat landscape. The Technical Assurance team is responsible for overseeing easyJet’s strong cyber security posture. We help functions adopt and improve control adoption as … Safety, Data Teams, IT operations and our IT teams to minimise data breaches or data leaks. Working with the Cyber Architecture to validate the threat models produced as part of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk More ❯
easyJet is overseen by 3 Aviation Regulators, each with their own cyber security control expectations, along with legal compliance requirements and a changing cyber threat landscape. The Technical Assurance team is responsible for overseeing easyJet’s strong cyber security posture. We help functions adopt and improve control adoption as … Safety, Data Teams, IT operations and our IT teams to minimise data breaches or data leaks. Working with the Cyber Architecture to validate the threat models produced as part of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk More ❯
easyJet is overseen by 3 Aviation Regulators, each with their own cyber security control expectations, along with legal compliance requirements and a changing cyber threat landscape. The Technical Assurance team is responsible for overseeing easyJet’s strong cyber security posture. We help functions adopt and improve control adoption as … Safety, Data Teams, IT operations and our IT teams to minimise data breaches or data leaks. Working with the Cyber Architecture to validate the threat models produced as part of the project design process. Conduct security assessments and work with Digital Safety Risk function to raise identified cyber risk More ❯
architectures, ensuring compliance with security, performance, and industry standards. Develop and implement a comprehensive cloud security strategy aligned with best practices and frameworks. Conduct threat modeling and risk assessments for new projects, identifying and mitigating security risks. Define and enforce security policies for IAM, encryption, network segmentation, and threat … S3, IAM, Lambda, RDS). Proven experience in designing secure, scalable cloud architectures with a focus on security at every layer. Experience in conducting threat modeling, vulnerability assessments, and developing risk mitigation strategies. In-depth knowledge of AWS security best practices for IAM, encryption, and data protection. Familiarity with … or AWS CDK for automating security and infrastructure provisioning. Hands-on experience with AWS security services (GuardDuty, Inspector, WAF) and third-party tools for threat detection. Proficiency in scripting languages (Python, Bash, PowerShell) to automate security tasks. Experience designing incident response plans and managing security events in cloud environments. More ❯
Gloucester, Gloucestershire, UK Hybrid / WFH Options
uk7 UTC
that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: STARA(R) - Enterprise Security Threat and Risk Consultant Location: London - Guildford, Gloucester, London, Manchester, Leeds (Hybrid working) Grade: GG10-GG13 Referral Bonus: £5000 What You'll Be Doing As … an Enterprise Security Threat and Risk Consultant, you will lead and deliver advanced threat and risk assessments across physical, personnel, cyber, and governance domains. Working on mission-critical programmes in government, financial, CNI, and defence, your role will shape how organisations understand and manage threats in the context … of a hybrid threat environment and evolving adversary tactics. You'll collaborate with internal and external stakeholders, advise on strategic risk posture, and ensure delivery of high-impact STARA® engagements. Responsibilities Lead, deliver and support Security Threat and Risk Assessments (STARA®) across ICT, Operational Technology, physical, and personnel More ❯
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat … business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security Standards. Stakeholder Communication and More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat … business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security Standards. Stakeholder Communication and More ❯
one of the following areas: IP networking & OT On-premises architecture and Virtualization Cloud platforms and Containerization Databases and LLMs Mobile Technologies & Application security Threat modeling techniques to identify security threats to systems, leading to the definition of Security requirements. Managing security requirements through the delivery and operational life … cycle of a system. Provision of authoritative specialist security advice in: Risk and threat-based mitigation to system designs. Control frameworks such as NIST, ISO, CIS. Protective monitoring, Authentication and authorization best practices. Develop excellent working relationships with key stakeholders, peers and subordinates. Communicating effectively verbally and in writing More ❯
one of the following areas: IP networking & OT On-premises architecture and Virtualization cloud platforms and Containerization Databases and LLMs Mobile Technologies & Application security Threat modeling techniques to identify security threats to systems, leading to the definition of Security requirements. Managing security requirements through the delivery and operational life … cycle of a system Provision of authoritative specialist security advice in Risk and threat-based mitigation to system designs Control frameworks such as NIST, ISO, CIS Protective monitoring, Authentication and authorization best practices. Develop excellent working relationships with key stakeholders, peers and subordinates. Communicating effectively verbally and in writing More ❯
Understanding - and quickly synthesising - information on new technologies across hardware and software to enable the business to make informed decisions on strategic roadmaps Conducting threat models and risk assessments to identify vulnerabilities, evaluating the business impact and recommending mitigation strategies to reduce identified risks Ensuring security controls are fit … cryptography, security assessment and testing, identity and access management and security detection/response/forensics Cloud security knowledge and experience Ability to undertake threat models and risk assessments and communicate their findings Experience in applying quantitative and qualitative methodologies for calculating security risk Drive, enthusiasm and the ability More ❯