26 to 28 of 28 Threat Modelling Jobs in London

Cryptographer

Hiring Organisation
microTECH Global LTD
Location
London Area, United Kingdom
requirements set by the government agencies. The security assessment task includes testing applications in line with well-known industry standards including: OWASP MASVS testing, threat modelling, tool relating to data flow analysis within the device and to the network; static and dynamic testing using tools such as MobSF ...

Senior Security Engineer

Hiring Organisation
Develop
Location
London, United Kingdom
Employment Type
Permanent
Salary
£80,000
runbooks. Conduct technical assessments across identity, endpoint, cloud posture, logging, and security operations. Develop, optimise, and tune KQL queries for detection engineering and threat hunting. Review and enhance security configurations across cloud and SIEM/SOAR platforms. Manage engagements through architecture, deployment, tuning, documentation, and customer enablement. Identify security … gaps and recommend improvements across logging, identity, endpoint hardening, cloud posture, and threat detection. Platform & Engineering Understand how endpoints, servers, domain controllers, and cloud workloads operate, and how security controls integrate with them. Support remediation of misconfigurations and optimisation of security deployments. Leverage scripting, APIs, and automation to streamline ...

Microsoft Security Engineer - up to £70,000 + Bonus - Hybrid

Hiring Organisation
Involved Solutions
Location
London, South East, England, United Kingdom
Employment Type
Full-Time
Salary
£60,000 - £70,000 per annum
onsite) Job Type: PermanentA globally established organisation is seeking a Microsoft Security Engineer to strengthen its security capability across identity, endpoint, data protection and threat detection. This role will focus on leveraging the Microsoft security stack, including Defender XDR, Purview and Entra ID, to protect enterprise systems, manage risk … using Microsoft Entra ID, including Conditional Access and MFA Implement and maintain Privileged Identity Management (PIM/PAM) and secure access policies Conduct proactive threat hunting and support incident response activities Secure cloud applications and endpoints, ensuring alignment with security best practices Support eDiscovery, audit and data governance requirements ...