3 of 3 Threat Modelling Jobs in Hampshire

SBD Specialist - Secure By Design

Hiring Organisation
CBSbutler Holdings Limited trading as CBSbutler
Location
Andover, Hampshire, United Kingdom
Employment Type
Contract
Contract Rate
£500 - £550/day
Embed Secure by Design principles across system and solution delivery Conduct security design reviews and provide risk-based recommendations Support development of: Security architectures Threat models and risk assessments Security design documentation Ensure alignment with MOD and UK Government security standards Work with architects and delivery teams to integrate … Experience Proven experience implementing Secure by Design within MOD, Defence, or Government environments Strong background in security architecture and secure system design Experience conducting threat modelling and security risk assessments Knowledge of: NCSC Secure by Design guidance ISO 27001 or equivalent frameworks Secure SDLC methodologies Experience working within ...

Security Platform Engineer (DevSecOps) - SC (MOD/Defence)

Hiring Organisation
Talent Locker
Location
Aldershot, Hampshire, South East, United Kingdom
Employment Type
Permanent
Salary
£75,000
embedded properly into how things are built and run. You'll spend your time securing Kubernetes environments, running and tuning Splunk for logging and threat detection, and managing Nessus to track and drive vulnerability remediation. A big part of the role is integrating security into CI/CD pipelines … Splunk and Nessus. You'll understand container security, have some scripting or automation capability, and be comfortable working with security frameworks . Awareness of threat frameworks like ATT&CK is useful. It would help if you've worked with other SIEM tools, Microsoft Defender or DevSecOps pipelines ...

Senior IT Support

Hiring Organisation
IT Talent Solutions Ltd
Location
Waterlooville, Hampshire, England, United Kingdom
Employment Type
Full-Time
Salary
£40,000 - £50,000 per annum
Cyber Essentials Plus. Manage and optimise security platforms covering: Endpoint protection Identity protection Defender XDR Conditional access and device compliance Lead vulnerability assessments, threat modelling, incident response planning, and recovery testing. Strengthen information governance, data protection, and secure configuration baselines. Own security-focused change control, coordinate penetration testing ...