NIST. Implement third-party security tools and assist in incident response, working with the CSOC team on Cloud threats and events. Build and enforce Cloud-native security tools, conduct threatmodelling, and architectural reviews to improve security practices. Support risk, compliance, and governance initiatives, promote Cloud security, and identify platform improvements. Map attack paths and lead the implementation More ❯
development and maintenance of a secure software development lifecycle (SDLC) with a focus on secure coding practices in languages like Python, C++, Rust, Go and Kotlin/Java. Conduct threat modeling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle. Provide mentorship, guidance, and training on security best … and ensure compliance with QRT's standards. Integration of security scanning tools (SAST, DAST, etc.) into CI/CD pipelines and runtime environments to ensure continuous security monitoring and threat detection across Alibaba Cloud, AWS, Azure, and on-prem systems. Proactively identify security risks and develop strategies for risk mitigation in a fast-paced high-stakes environment. At least … and Linux-based systems. Extensive experience with one or more cloud platforms such as AWS, Microsoft Azure and Alibaba Cloud used in a hybrid environment. In-depth knowledge of threat modeling, risk assessment and development of mitigation strategies for large-scale, complex systems in a fast-paced environment. Experience integrating security scanning tools into CI/CD pipelines and More ❯
OIDC, OAuth) and their implementations. Experience with Google Identity and containerization technologies (e.g., Docker, Kubernetes) is a plus. Strong understanding of security principles and best practices (e.g., secure coding, threat modeling). Excellent problem-solving and analytical skills. Ability to work effectively in a fast-paced, collaborative environment. Excellent written and verbal communication skills. Preferred Qualifications: Google Cloud certifications More ❯
develop creative network solutions to address security challenges. Security and Firewall Management: Manage firewall configurations for the CyberEnergianetwork based on operational requirements. Develop and implement network security tools, produce threat models, and assess risks around existing configurations. Provide subject matter expertise on network security, firewalls, and industry best practices. Document and formalize security processes. Automation and Infrastructure Management: Drive More ❯
a fast-growing FinTech that is reshaping the payments landscape. You will collaborate with engineering teams to build security into products from day one, focusing on secure cloud architecture, threatmodelling, and risk management. This is not a hands-off role. You will be the go-to advisor for product teams, helping them understand risk, make informed security … assessments and drive a secure-by-design culture Collaborate with engineering teams on cloud-native architecture (GCP, AWS, Azure) Analyse vulnerabilities, prioritise risks, and manage remediation through Jira Lead threatmodelling and architecture reviews Shape security tooling and process improvements What you will bring 3 to 5 years in Cyber Security, Product Security, or Secure Software Development Strong … knowledge of GCP (primary), AWS, Azure Experience with threatmodelling, AppSec, and security in CI/CD pipelines Ability to communicate security concepts clearly and balance risk with business priorities A collaborative, pragmatic approach Why join Shape security at scale in a high-growth FinTech Work in a fast-paced, collaborative environment Salary £80,000 to More ❯
a fast-growing FinTech that is reshaping the payments landscape. You will collaborate with engineering teams to build security into products from day one, focusing on secure cloud architecture, threatmodelling, and risk management. This is not a hands-off role. You will be the go-to advisor for product teams, helping them understand risk, make informed security … assessments and drive a secure-by-design culture Collaborate with engineering teams on cloud-native architecture (GCP, AWS, Azure) Analyse vulnerabilities, prioritise risks, and manage remediation through Jira Lead threatmodelling and architecture reviews Shape security tooling and process improvements What you will bring 3 to 5 years in Cyber Security, Product Security, or Secure Software Development Strong … knowledge of GCP (primary), AWS, Azure Experience with threatmodelling, AppSec, and security in CI/CD pipelines Ability to communicate security concepts clearly and balance risk with business priorities A collaborative, pragmatic approach Why join Shape security at scale in a high-growth FinTech Work in a fast-paced, collaborative environment Salary £80,000 to More ❯
We are looking for a skilled Detection Engineer to join our Cyber Security team. In this role, you will be responsible for developing and maintaining high-fidelity threat detections across our security platforms. You’ll work at the intersection of threat intelligence, telemetry and security operations to build scalable, reliable and effective detection capabilities. Key Responsibilities Design, develop … and deploy detection logic across SIEM, EDR and cloud security platforms. Build detections aligned with frameworks such as MITRE ATT&CK and continuously tune for accuracy and performance. Conduct threatmodelling and participate in purple team exercises to assess and improve detection effectiveness. Use Detection-as-Code principles to manage detection rules via version control, CI/CD … pipelines and automated testing frameworks. Reduce false positives through tuning, enrichment and contextual awareness. Skills 3+ years of experience in security operations, detection engineering, threat hunting, or a related Cyber Security field. Proficiency in query languages such as SPL (Splunk), KQL (Microsoft), Sigma, or similar. Experience with SIEM platforms (e.g. Splunk, Sentinel, Elastic), EDR tools (e.g. CrowdStrike, SentinelOne), and More ❯
We are looking for a skilled Detection Engineer to join our Cyber Security team. In this role, you will be responsible for developing and maintaining high-fidelity threat detections across our security platforms. You’ll work at the intersection of threat intelligence, telemetry and security operations to build scalable, reliable and effective detection capabilities. Key Responsibilities Design, develop … and deploy detection logic across SIEM, EDR and cloud security platforms. Build detections aligned with frameworks such as MITRE ATT&CK and continuously tune for accuracy and performance. Conduct threatmodelling and participate in purple team exercises to assess and improve detection effectiveness. Use Detection-as-Code principles to manage detection rules via version control, CI/CD … pipelines and automated testing frameworks. Reduce false positives through tuning, enrichment and contextual awareness. Skills 3+ years of experience in security operations, detection engineering, threat hunting, or a related Cyber Security field. Proficiency in query languages such as SPL (Splunk), KQL (Microsoft), Sigma, or similar. Experience with SIEM platforms (e.g. Splunk, Sentinel, Elastic), EDR tools (e.g. CrowdStrike, SentinelOne), and More ❯
We are looking for a skilled Detection Engineer to join our Cyber Security team. In this role, you will be responsible for developing and maintaining high-fidelity threat detections across our security platforms. You’ll work at the intersection of threat intelligence, telemetry and security operations to build scalable, reliable and effective detection capabilities. Key Responsibilities Design, develop … and deploy detection logic across SIEM, EDR and cloud security platforms. Build detections aligned with frameworks such as MITRE ATT&CK and continuously tune for accuracy and performance. Conduct threatmodelling and participate in purple team exercises to assess and improve detection effectiveness. Use Detection-as-Code principles to manage detection rules via version control, CI/CD … pipelines and automated testing frameworks. Reduce false positives through tuning, enrichment and contextual awareness. Skills 3+ years of experience in security operations, detection engineering, threat hunting, or a related Cyber Security field. Proficiency in query languages such as SPL (Splunk), KQL (Microsoft), Sigma, or similar. Experience with SIEM platforms (e.g. Splunk, Sentinel, Elastic), EDR tools (e.g. CrowdStrike, SentinelOne), and More ❯
will have Recent experience in a relation to Application Security, Pen testing, Application Development, or a DevOps Internship/Apprenticeship. Understanding of application security concepts, including secure coding practices, threatmodelling, vulnerability management, and access control mechanisms. Previous Experience with CheckMarx or similar application security tools and API Security. Proficiency in programming languages such as Python. Supplementary Information … Degree Experience Recent experience in a relation to Application Security, Pen testing, Application Development, or a DevOps Internship/Apprenticeship. Understanding of application security concepts, including secure coding practices, threatmodelling, vulnerability management, and access control mechanisms. Previous Experience with CheckMarx or similar application security tools and API Security. Technical skills required Proficiency in programming languages such as More ❯
strategy that aligns with the firm's risk tolerance and regulatory requirements. Drive and prioritise high-impact initiatives, including cloud and infrastructure hardening, application security for proprietary systems, advanced threat detection and response, and safeguarding of crypto assets. Build, mentor, and retain a top-tier team of security engineers, fostering a culture of excellence and innovation. Lead the design … detection, and exploit simulation frameworks. Proficient in modern programming languages such as Python, Go, or Rust, with strong familiarity with micro services and distributed system architectures. Experienced in conducting threatmodelling for high-value, low-latency trading platforms or digital asset custody systems. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Oliver Bernard
Event Hub Practical experience with Infrastructure as Code tools like Terraform and Bicep Excellent communication skills and the ability to support and mentor junior colleagues Desirable Skills Experience with threatmodelling Background working on globally distributed systems Exposure to financial services or highly regulated environments Who Should Apply: This role is suited to individuals seeking a challenging, high More ❯
East London, London, United Kingdom Hybrid / WFH Options
Oliver Bernard
Event Hub Practical experience with Infrastructure as Code tools like Terraform and Bicep Excellent communication skills and the ability to support and mentor junior colleagues Desirable Skills Experience with threatmodelling Background working on globally distributed systems Exposure to financial services or highly regulated environments Who Should Apply: This role is suited to individuals seeking a challenging, high More ❯
Central London / West End, London, United Kingdom Hybrid / WFH Options
Oliver Bernard
Event Hub Practical experience with Infrastructure as Code tools like Terraform and Bicep Excellent communication skills and the ability to support and mentor junior colleagues Desirable Skills Experience with threatmodelling Background working on globally distributed systems Exposure to financial services or highly regulated environments Who Should Apply: This role is suited to individuals seeking a challenging, high More ❯
minimum, you must be eligible and willing to undergo these checks. Expert knowledge of leading innovation in protective security, balancing security requirements against service innovation. Expert in combining external threat information, organizational context, and situational awareness to provide a holistic threat understanding capability, including the use of threat models. Ability to communicate tailored threat information to More ❯
define and manage GCP resources securely and efficiently. Perform thorough security assessments on GCP environments, utilizing GCP-specific security tools and technologies, to identify and address potential vulnerabilities. Conduct threat modeling and risk assessments for GCP deployments, designing effective security solutions tailored to GCP services. Collaborate with cross-functional teams to respond to GCP-specific security incidents promptly, conduct More ❯
work closely with architecture, DevOps, and engineering teams to embed robust security controls across the cloud estate. The ideal candidate will be a hands-on practitioner with experience in threatmodelling, and a solid understanding of DevSecOps principles. Key Responsibilities: • Design, implement, and maintain security controls across GCP services • Lead threatmodelling activities for new and … compliance initiatives across GCP environments • Monitor and respond to security incidents and vulnerabilities in GCP Skills & Experience Required: • Extensive hands-on experience with Google Cloud Platform (GCP) security services • Threatmodelling experience in cloud-native environments • Strong knowledge of Google BigQuery, SQL, and data access governance • CISSP certification (or equivalent experience in cloud security) • Proven track record of More ❯
London, England, United Kingdom Hybrid / WFH Options
Creatify
a Senior Cybersecurity Risk Analyst to support during a critical period. This is a hands-on, technically focused interim contract — ideal for someone with strong experience in risk assessment, threatmodelling, and stakeholder communication. You’ll be working closely with IT, SOC, and business teams to identify and manage technical risks, translate vulnerabilities into business impact, and support … risk during tenders. Producing risk reports and presenting findings to technical and non-technical stakeholders. What We’re Looking For: Strong hands-on experience in cybersecurity risk assessment and threatmodelling . Deep knowledge of network, endpoint, and cloud security principles. Comfortable working alongside or within a Security Operations Centre (SOC) . Able to communicate technical risks in More ❯
or similar object-oriented language Information security professional certification Knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits or equivalent Experience applying threat modeling or other risk identification techniques or equivalent Experience implementing security solutions at the business division level or equivalent PREFERRED QUALIFICATIONS Experience with AWS products and services Experience with … any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Experience in cyber security incident response within corporate and cloud environments. Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our More ❯
integration and delivery (CI/CD) pipelines, ensuring rapid, secure, and reliable deployment of JavaScript applications. Develop and maintain automated security tools for static code analysis, penetration testing, and threat modelling. Implement real-time monitoring, alerting, and response strategies for security incidents. About You: Strong proficiency in Cloud Environment ideally in GCP services (Compute Engine, Cloud Functions, IAM, Kubernetes … on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working as part of a team, are comfortable in a fast-paced environment, have excellent written and verbal English skills, and last but not least More ❯
with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on secure architecture Completion of ForgeRock 4xx-level More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JCW
with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetration testing , threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on secure architecture Completion of ForgeRock 4xx-level More ❯
multidisciplinary, and mission-driven team; Develop and deliver a strategy for building a cutting-edge crime and social destabilisation research agenda; Develop cutting edge evaluations which relate to these threat-models which can reliably assess the capability of Frontier AI systems; Deliver additional impactful research by overseeing a diverse portfolio of research projects, potentially including a portfolio of externally More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
infrastructure. Reporting directly to the CTO, this is not a purely strategic or oversight role. You’ll be owning the security vision, building the roadmap, writing code, reviewing architecture, threatmodelling, and automating at scale, while building a high-performance team around you. This is what you will own: Security Engineering Strategy Define and execute the security vision … Technical Execution Design and implement secure-by-default patterns in AWS, Kubernetes, CI/CD pipelines, and crypto-native systems. Own IaC scanning, secrets detection, and automated control implementation. ThreatModelling & Incident Readiness Lead technical reviews of high-value trading and custody systems. Translate threat intel into proactive engineering solutions. Cross-Functional Collaboration Work closely with Engineering More ❯
infrastructure. Reporting directly to the CTO, this is not a purely strategic or oversight role. You’ll be owning the security vision, building the roadmap, writing code, reviewing architecture, threatmodelling, and automating at scale, while building a high-performance team around you. This is what you will own: Security Engineering Strategy Define and execute the security vision … Technical Execution Design and implement secure-by-default patterns in AWS, Kubernetes, CI/CD pipelines, and crypto-native systems. Own IaC scanning, secrets detection, and automated control implementation. ThreatModelling & Incident Readiness Lead technical reviews of high-value trading and custody systems. Translate threat intel into proactive engineering solutions. Cross-Functional Collaboration Work closely with Engineering More ❯