London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
with scripting languages like PowerShell, YAML, JSON Expertise in application security tools and DevSecOps processes Understanding of key frameworks and standards (e.g. OWASP, NIST SSDF, ISO27001, NCSC) Experience with threatmodelling, risk assessments, and secure design reviews Comfortable owning security strategy and tooling across complex, modern product landscapes Strong communicator. Able to engage confidently with both engineers and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
with scripting languages like PowerShell, YAML, JSON- Expertise in application security tools and DevSecOps processes- Understanding of key frameworks and standards (e.g. OWASP, NIST SSDF, ISO27001, NCSC)- Experience with threatmodelling, risk assessments, and secure design reviews- Comfortable owning security strategy and tooling across complex, modern product landscapes- Strong communicator - able to engage confidently with both engineers and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
with scripting languages like PowerShell, YAML, JSON Expertise in application security tools and DevSecOps processes Understanding of key frameworks and standards (e.g. OWASP, NIST SSDF, ISO27001, NCSC) Experience with threatmodelling, risk assessments, and secure design reviews Comfortable owning security strategy and tooling across complex, modern product landscapes Strong communicator - able to engage confidently with both engineers and More ❯
and security roadmap. Manage information security projects and initiatives across IT and business units. Collaborate with senior leadership to align security goals with business objectives. Lead risk assessments and threatmodelling exercises for internal systems and third-party services. Manage the deployment and maintenance of security solutions (SIEM, firewalls, endpoint protection, DLP, etc.). Oversee the organization's More ❯
Yeovil, Somerset, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
security designs as they pertain to the cyber domain. Decomposing cyber and security requirements down to the system control level. Conducting cyber and information security risk assessment activities including threatmodelling, vulnerability analysis and analysis of mitigations, including technical understanding. Scoping and managing security verification and validation activities and remedial action plans. Coordinating with product engineers, system architects More ❯
with IaC tools and automating security controls and processes. The role requires the applicant to hold and maintain Developed Vetting (DV) UK Security Clearance. Preferred qualifications: Experience leading comprehensive threat modeling exercises and conducting detailed risk assessments to identify and prioritize security vulnerabilities across the platform. Experience securing modern cloud-native architectures, including containerization technologies (e.g., Kubernetes, Docker) and More ❯
due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the most dynamic fields in defence. Key Responsibilities … The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform … Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threatMore ❯
due to an increase in demand. We are looking for both mid-level and senior engineers. The role will support the cyber security operations centre (SOC), assisting with vital threat detection and analysis in a constantly evolving cyber environment. This contract position offers an exciting opportunity to work within one of the most dynamic fields in defence. Key Responsibilities … The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform … Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threatMore ❯
Mid level= £45 UMB Job Title: SOC Analyst Overview of department: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in … an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. Responsibilities: To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team … and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies. The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
security controls, tools, monitoring, and incident response processes. Work with modern cloud technologies, especially Microsoft Azure, to secure scalable microservices and infrastructure. Help shape and implement security best practices, threat detection, and incident response strategies. What you'll be doing Designing and implementing security controls & tooling across our hybrid-based infrastructure, with a focus on Microsoft Azure. Monitoring and … cloud environments such as Microsoft Azure. A broad understanding of common infrastructure services and operating systems (Windows based, AD, DNS, DHCP, etc) Familiarity with SIEM and XDR tools for threat detection, monitoring, and incident response. A solid understanding of network security, identity and access management (IAM), and vulnerability management. A proactive mindset with a passion for staying ahead of … A recognised Cyber Security qualification (SEC+, CISSP etc) Knowledge of cloud-native security best practices, including container security, infrastructure as code (IaC) scanning, and secure configuration management. Exposure to threatmodelling, penetration testing, or security automation tools. We take our inspiration from pets in embracing people from all walks of life, and we value, respect and celebrate difference. More ❯
West Malling, Kent, United Kingdom Hybrid / WFH Options
Lumina Energy
threats are evolving, and our team is at the heart of protecting critical infrastructure and data. As a Cyber Security Engineer, you'll help lead our proactive efforts in threat detection, response, and mitigation. This role is vital to safeguarding the confidentiality, integrity, and availability of systems and services. What you'll be doing Act on security alerts, incidents … ensure timely responses. Diagnose and investigate security incidents following agreed procedures. Escalate and document unresolved incidents and support recovery efforts. Operate within our enterprise-level SOC and collaborate on threat intelligence. Utilise tools like Microsoft E5, Sentinel, and Darktrace to monitor and prevent threats. Analyse malware and respond to high-priority incidents. Support vulnerability management and threat analysis … equivalent function. Proficiency with Microsoft Security Suite (including Sentinel) and Darktrace or similar. Must have an understanding of cyber threats including malware, ransomware, DDoS, insider threats. Strong knowledge of threatmodelling, security monitoring, and cloud environments. Familiarity with GDPR, data protection, and privacy impact assessments. Excellent communication and collaboration skills with a proactive mindset. Industry certifications (e.g., CISSP More ❯
IIBA (International Institute of Business Analysis)
security culture with your product technology and business colleagues. Products that have the right security culture will strive to prioritize sustainable controls and driving real risk reduction outcomes. Embed threatmodelling, security design & architecture reviews into product and application teams so they adopt our control products and create products that are secure from the start. • Know your product … by technology partners, with a focus on Cloud computing/emerging technologies. Required qualifications, capabilities and skills: Hands-on practical experience delivering enterprise level cybersecurity solutions and controls via Threat Modeling and Security Design & Architecture Reviews Advanced knowledge of cybersecurity architecture, applications, and technical processes with considerable, in-depth knowledge in one or more technical disciplines (e.g., public cloud More ❯
enforce pipeline and platform security. Familiarity with compliance requirements (e.g., NIST, ISO 27001, CIS Benchmarks) and their implementation via code. Ability to lead and mentor teams on secure coding, threatmodelling, and secure architecture patterns. Experience with monitoring, logging, and security telemetry platforms (e.g., Prometheus, Loki, ELK, XDR/SIEM integrations). Please note candidates must hold or More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
in architectures, codebases, and configurations; drive remediation with development and operations teams. Secure Development Practices Partner with software and hardware engineers to integrate secure coding and design principles (e.g., threatmodelling, secure-by-design). Perform security code reviews, provide guidance on secure libraries and frameworks. Standards & Compliance Ensure products meet regulatory and defence standards (ISO 27001/ More ❯
enforce pipeline and platform security. Familiarity with compliance requirements (e.g., NIST, ISO 27001, CIS Benchmarks) and their implementation via code. Ability to lead and mentor teams on secure coding, threatmodelling, and secure architecture patterns. Experience with monitoring, logging, and security telemetry platforms (e.g., Prometheus, Loki, ELK, XDR/SIEM integrations). Damia Group Limited acts as an More ❯
to help embed risk-conscious technical security controls in our services and products, development workflows and activities. You'll act as a subject matter expert on application security, run ThreatModelling exercises with engineering teams, and work on cloud native security tooling, automating our work, and leveraging infrastructure as code. Bringing your experience of writing and reviewing code More ❯
NIST. Implement third-party security tools and assist in incident response, working with the CSOC team on Cloud threats and events. Build and enforce Cloud-native security tools, conduct threatmodelling, and architectural reviews to improve security practices. Support risk, compliance, and governance initiatives, promote Cloud security, and identify platform improvements. Map attack paths and lead the implementation More ❯
Bournemouth, Dorset, United Kingdom Hybrid / WFH Options
Nourish Care
principles across the software development lifecycle Own DevSecOps processes: shift-left security, secrets management, CI/CD hardening, container security, vulnerability scanning Collaborate with Product and Engineering teams on threatmodelling, penetration testing, and remediation efforts Select, implement, and manage key SaaS security tooling (e.g. SAST/DAST, SIEM, CSPM, endpoint protection, IAM) Ensure alignment with cloud-native More ❯
of experience in cloud or information security. Proven experience securing Google Cloud Platform (GCP) environments. Strong understanding of cloud security principles and native controls. Experience with incident response and threat modelling. Relevant certifications such as: Google Professional Cloud Security Engineer Azure Security Engineer Associate (AZ-500) Certified Cloud Security Professional (CCSP) Key Attributes Strong verbal and written communication skills. More ❯
of experience in cloud or information security. Proven experience securing Google Cloud Platform (GCP) environments. Strong understanding of cloud security principles and native controls. Experience with incident response and threat modelling. Relevant certifications such as: Google Professional Cloud Security Engineer Azure Security Engineer Associate (AZ-500) Certified Cloud Security Professional (CCSP) Key Attributes Strong verbal and written communication skills. More ❯
develop creative network solutions to address security challenges. Security and Firewall Management: Manage firewall configurations for the CyberEnergianetwork based on operational requirements. Develop and implement network security tools, produce threat models, and assess risks around existing configurations. Provide subject matter expertise on network security, firewalls, and industry best practices. Document and formalize security processes. Automation and Infrastructure Management: Drive More ❯
the secure financial transactions space. Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience in regulatory reporting. 3-5 years of experience in GRC, risk management More ❯
and leading-edge projects. You will play an active role in transforming our client's Cyber Defence strategy, capabilities, and operations through the design and implementation of predominantly Microsoft Threat Protection technologies. You will also be part of the Avanade Security presales and Architecture function, creating proposals and solutions for our largest, most complex enterprise clients. This role will … Develop and maintain long-term strategic client relationships. • Design, implement, and integrate security, incident, and event management solutions into Security Operations, with a particular interest in Azure Sentinel. • Understand threatmodelling, risk, and how to mitigate risks concerning applications from internal and external threat actors. • Have a deep understanding of incident response processes and techniques for cyber … recovery. • Understand security operations centres, their functions, and roles. • Have a good understanding of the Microsoft platforms across Windows, Microsoft 365, and Azure. • Understand techniques and approaches used by threat actors to compromise companies. • Apply the MITRE ATT&CK framework to help customers improve their cyber defence. • Understand the business, privacy, security, and compliance challenges surrounding client data and More ❯
endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional. BASIC QUALIFICATIONS - 3+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience - Knowledge of commonly found software security vulnerabilities (like OWASP top 10) and … in one of the following or similar: Python, Ruby, Go, Swift, Java, .Net, C++. PREFERRED QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threatmodelling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with Security Engineering (building tools) and Assurance methodologies e.g. fuzzing, static and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Opus Recruitment Solutions Ltd
occasional travel to London for key meetings.Key Responsibilities: Design and implement secure cloud architectures within Microsoft Azure Lead the integration and optimisation of SIEM solutions, particularly Microsoft Sentinel Conduct threatmodelling, risk assessments, and security architecture reviews Collaborate with engineering, DevOps, and compliance teams to embed security best practices Define and enforce security standards across Azure IaaS, PaaS More ❯