help shape and drive our security strategy and will develop architecture and designs to support NATS' overall business strategy. Duties: Lead the definition and modelling of security architecture for current and future capabilities to identify areas for improvement and guide Service Designs and comply with corporate, legislative, contractual or … on delivering outcomes. Demonstrable experience in cloud architectures and operational technology. Experience in systems delivery including analysis, design, implementation, testing and support. Experience of threatmodelling and how it can be applied effectively to designs. Good working knowledge of an Information Security Management System and the ISO2700x/ More ❯
a deep understanding of AI/ML concepts, algorithms, models, regulations and controls and extensive technical experience in AI/ML Security Architecture. Proven threatmodelling, risk analysis, and architectural validations and an in-depth knowledge of adversarial machine learning mitigation is also essential for this role. Please More ❯
YAML, JSON Expertise in application security tools and DevSecOps processes Understanding of key frameworks and standards (e.g. OWASP, NIST SSDF, ISO27001, NCSC) Experience with threatmodelling, risk assessments, and secure design reviews Comfortable owning security strategy and tooling across complex, modern product landscapes Strong communicator - able to engage More ❯
YAML, JSON Expertise in application security tools and DevSecOps processes Understanding of key frameworks and standards (e.g. OWASP, NIST SSDF, ISO27001, NCSC) Experience with threatmodelling, risk assessments, and secure design reviews Comfortable owning security strategy and tooling across complex, modern product landscapes Strong communicator - able to engage More ❯
as data storage, databases and data processing technologies, and identity & access management suites on Azure, GCP and AWS. - Proven experience of security reviews and threatmodelling for cloud hosted solutions leveraging Generative AI cloud services. - Demonstrated experience and understanding of cyber security principles, IT security controls, and related More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
security strategy and ensure security is embedded at every stage of development. Key Responsibilities: Perform in-depth security reviews, including secure code reviews and threat modelling. Develop and implement security controls to align with frameworks such as ISO 27001, NIST, and CIS benchmarks. Collaborate with development teams to enhance More ❯
Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience in regulatory reporting. 3-5 years of More ❯
Conduct reviews of application architecture, infrastructure-as-code, and security configurations to identify risks and support remediation planning. Provide input into security design decisions, threatmodelling sessions, and architectural governance forums. To support engineering teams and deliver clear, practical documentation, including secure development standards, integration guidelines, and process … artefacts. Stay informed on the evolving threat landscape, cloud security trends, and software security vulnerabilities to ensure contemporary and effective delivery. Qualifications A degree (or equivalent experience) in Cybersecurity, Computer Science, Software Engineering, or a related technical discipline. Recognised industry certifications in cybersecurity or application security (CompTIA, ISC2, GIAC More ❯
security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology, regulatory and threat drivers • Advise business stakeholders and support teams in their development of effective security strategies for their areas, providing proper advice and counselling on security … development, or cloud development • Previous experience developing architecture blueprints, strategies, and roadmaps. • Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services. • Practical knowledge of the information security standards domain. • Experience of working with external audit and certification More ❯
Shiremoor, England, United Kingdom Hybrid / WFH Options
Northern Powergrid
security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology, regulatory and threat drivers • Advise business stakeholders and support teams in their development of effective security strategies for their areas, providing proper advice and counselling on security … development, or cloud development • Previous experience developing architecture blueprints, strategies, and roadmaps. • Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services. • Practical knowledge of the information security standards domain. • Experience of working with external audit and certification More ❯
shiremoor, north east england, United Kingdom Hybrid / WFH Options
Northern Powergrid
security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology, regulatory and threat drivers • Advise business stakeholders and support teams in their development of effective security strategies for their areas, providing proper advice and counselling on security … development, or cloud development • Previous experience developing architecture blueprints, strategies, and roadmaps. • Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services. • Practical knowledge of the information security standards domain. • Experience of working with external audit and certification More ❯
cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk registers, control implementation … operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threatmodelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/ More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Crimson
assisting the business with understanding the security implications of design decisions. Experience in supporting the implementation of security requirements within the business. Understanding of threatmodelling frameworks, such as STRIDE Interested? Submit your updated CV to Dean Sadler-Parkes at Crimson. Not interested? Refer a friend and earn More ❯
Hat Linux, Amazon Linux, Debian, git, SSH, rsync, nginx, apache, etc) Familiarity and experience with core Information Security principles and ISO 27001 accreditation (E.g. threatmodelling, compartmentalisation, separation of concerns, principle of least privilege, etc) Ability to work independently and as part of a team. Excellent problem-solving More ❯
DevOps and Engineering teams to implement DevSecOps practices, secure pipelines, and infrastructure-as-code standards. Promote Security by Design principles in product planning, including threat modeling, risk assessments, and secure feature development. Collaborate with Product and Customer teams to support customer-facing security, including responding to security questionnaires and More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Dynamic Search Solutions
DevOps and Engineering teams to implement DevSecOps practices, secure pipelines, and infrastructure-as-code standards. Promote Security by Design principles in product planning, including threat modeling, risk assessments, and secure feature development. Collaborate with Product and Customer teams to support customer-facing security, including responding to security questionnaires and More ❯
or equivalent. The candidate should be well-versed in Information security principles at an Intermediate level. Exposure to application security testing (source code review, threat modeling, security testing). Understanding of OWASP, CVSS, the MITRE ATT&CK framework, and the software development lifecycle (SLDC). What is it like More ❯
or equivalent. The candidate should be well-versed in Information security principles at an Intermediate level. Exposure to application security testing (source code review, threat modeling, security testing). Understanding of OWASP, CVSS, the MITRE ATT&CK framework, and the software development lifecycle (SLDC). What is it like More ❯
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … and network protocols (e.g., TCP/IP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
Newbury, England, United Kingdom Hybrid / WFH Options
Hays
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … network protocols (e.g., TCP/IP, HTTP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
newbury, south east england, United Kingdom Hybrid / WFH Options
Hays
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … network protocols (e.g., TCP/IP, HTTP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
Newbury, south west england, United Kingdom Hybrid / WFH Options
Hays
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … network protocols (e.g., TCP/IP, HTTP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Proactive.IT Appointments Limited
/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of the information security standards domain Experience of working with external audit and certification More ❯
secure coding guidance, reviewing code and architecture, and ensuring effective DevSecOps practices. Key Responsibilities: Guide development teams in secure coding best practices through workshops, threatmodelling, and code reviews. Define and enforce security checkpoints across the DevOps lifecycle (SAST, DAST, SCA). Champion secure API design, including robust More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Proactive.IT Appointments Limited
Security/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of information security standards Experience working with external audit and certification organizations Familiarity with More ❯