strategy that aligns with the firm's risk tolerance and regulatory requirements. Drive and prioritise high-impact initiatives, including cloud and infrastructure hardening, application security for proprietary systems, advanced threat detection and response, and safeguarding of crypto assets. Build, mentor, and retain a top-tier team of security engineers, fostering a culture of excellence and innovation. Lead the design … detection, and exploit simulation frameworks. Proficient in modern programming languages such as Python, Go, or Rust, with strong familiarity with micro services and distributed system architectures. Experienced in conducting threatmodelling for high-value, low-latency trading platforms or digital asset custody systems. More ❯
development work. Key Job Responsibilities Your responsibilities will include: Security reviews for new products, technologies, and services Secure design, architecture, and implementation Secure development life-cycle (SDLC) practices including threat modeling and security testing Influence decision-makers and stakeholders to achieve a consistently high security bar Conduct network and/or application penetration testing Create security guidance and documentation … DNS and TCP/IP - Experience programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat modeling More ❯
integration and delivery (CI/CD) pipelines, ensuring rapid, secure, and reliable deployment of JavaScript applications. Develop and maintain automated security tools for static code analysis, penetration testing, and threat modelling. Implement real-time monitoring, alerting, and response strategies for security incidents. About You: Strong proficiency in Cloud Environment ideally in GCP services (Compute Engine, Cloud Functions, IAM, Kubernetes … on experience with security practices like vulnerability scanning, encryption, authentication, and secrets management (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when working as part of a team, are comfortable in a fast-paced environment, have excellent written and verbal English skills, and last but not least More ❯
operates, where C and C++ reign supreme. Other tasks and responsibilities: Defining and developing our security frameworks Rotating between cross-functional platform teams to educate and validate solutions Modeling threat scenarios continuously and automating/dispatching remediation tasks Designing and running contingency plans for security events Implementing and automating software security practice within Go, C/C++ and Web … security, the challenges are ever changing, and as such, you have a particularly flexible and solution-oriented mindset. You have knowledge of or are interested in CIAM (e.g. Auth0), threat modeling, vulnerability analysis (e.g. Google Secure Command Center), CSPM (e.g. scrut.io) and SIEM (e.g. Chronicle) systems You have a relevant Bachelor's degree (or higher) You have worked with More ❯
the safety of all onchain development. We collaborate with product teams to enable secure user engagement with the onchain world. Responsibilities: Develop onchain security strategies, perform security assessments, and threat modeling of blockchain protocols. Lead proactively, identify top security risks, and develop mitigation strategies. Provide technical guidance in building frameworks, analysis tools, and security products. Establish best practices and More ❯
multidisciplinary, and mission-driven team; Develop and deliver a strategy for building a cutting-edge crime and social destabilisation research agenda; Develop cutting edge evaluations which relate to these threat-models which can reliably assess the capability of Frontier AI systems; Deliver additional impactful research by overseeing a diverse portfolio of research projects, potentially including a portfolio of externally More ❯
experience and expertise in programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language experience. - Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience. - Experience using Large Language Models (LLM) in security engineering. PREFERRED QUALIFICATIONS - Master More ❯
infrastructure. Reporting directly to the CTO, this is not a purely strategic or oversight role. You’ll be owning the security vision, building the roadmap, writing code, reviewing architecture, threatmodelling, and automating at scale, while building a high-performance team around you. This is what you will own: Security Engineering Strategy Define and execute the security vision … Technical Execution Design and implement secure-by-default patterns in AWS, Kubernetes, CI/CD pipelines, and crypto-native systems. Own IaC scanning, secrets detection, and automated control implementation. ThreatModelling & Incident Readiness Lead technical reviews of high-value trading and custody systems. Translate threat intel into proactive engineering solutions. Cross-Functional Collaboration Work closely with Engineering More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
infrastructure. Reporting directly to the CTO, this is not a purely strategic or oversight role. You’ll be owning the security vision, building the roadmap, writing code, reviewing architecture, threatmodelling, and automating at scale, while building a high-performance team around you. This is what you will own: Security Engineering Strategy Define and execute the security vision … Technical Execution Design and implement secure-by-default patterns in AWS, Kubernetes, CI/CD pipelines, and crypto-native systems. Own IaC scanning, secrets detection, and automated control implementation. ThreatModelling & Incident Readiness Lead technical reviews of high-value trading and custody systems. Translate threat intel into proactive engineering solutions. Cross-Functional Collaboration Work closely with Engineering More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Iceberg
infrastructure. Reporting directly to the CTO, this is not a purely strategic or oversight role. You’ll be owning the security vision, building the roadmap, writing code, reviewing architecture, threatmodelling, and automating at scale, while building a high-performance team around you. This is what you will own: Security Engineering Strategy Define and execute the security vision … Technical Execution Design and implement secure-by-default patterns in AWS, Kubernetes, CI/CD pipelines, and crypto-native systems. Own IaC scanning, secrets detection, and automated control implementation. ThreatModelling & Incident Readiness Lead technical reviews of high-value trading and custody systems. Translate threat intel into proactive engineering solutions. Cross-Functional Collaboration Work closely with Engineering More ❯
s data. You will work will engineering teams to create solutions that solve or remediate security problems. This will involve a range of activities, including (but not limited to) threatmodelling, selection and configuration of DevSecOps tools, high-level and detailed security designs. Key Responsibilities: We are seeking a Senior Security Engineer who has experience in the design … and implementation of secure software. You should possess verifiable experience in: Strong technical knowledge - a comprehensive understanding of software engineering principles, system architecture, and contemporary development frameworks. Threat modeling, as well as the design and implementation of security controls (either in a cloud environment or on-premises). Familiarity with cryptographic primitives and protocols. Proficiency in at least one More ❯
s data. You will work will engineering teams to create solutions that solve or remediate security problems. This will involve a range of activities, including (but not limited to) threatmodelling, selection and configuration of DevSecOps tools, high-level and detailed security designs. Key Responsibilities: We are seeking a Senior Security Engineer who has experience in the design … and implementation of secure software. You should possess verifiable experience in: Strong technical knowledge - a comprehensive understanding of software engineering principles, system architecture, and contemporary development frameworks. Threat modeling, as well as the design and implementation of security controls (either in a cloud environment or on-premises). Familiarity with cryptographic primitives and protocols. Proficiency in at least one More ❯
Conduct secure code reviews and collaborate with engineering teams to drive fixes Integrate security tools (SAST, DAST, SCA) into CI/CD pipelines and optimise their use Contribute to threatmodelling and help teams design with security in mind Develop proof-of-concepts (PoCs) to demonstrate the impact of security flaws Support secure development through documentation, training, and More ❯
and the management of enterprise risks across a dynamic business with a good understanding of technology and service delivery management. Experience of recovery and resilience planning incorporating risk assessments, threatmodelling and cyber security incident management. Proven leadership skills including performance management and improvement, measurement of KPIs, situational leadership, issue resolution, negotiation and motivating others Demonstrable experience in More ❯
tools (e.g. Splunk, New Relic) that provide operational insight into the health of live applications and systems. Experience in applying a range of cloud security tools and techniques (e.g. threatmodelling, vulnerability scanning, dependency checking, reducing attack surface area), ideally incorporating these tools and techniques into automated pipelines. The desire to upskill and enable product engineering squads to More ❯
professional services context. Understand technology trends, cyber threats, and industry issues. Excellent written and oral communication, report writing and presentation skills. Experience of executing security testing techniques such as threatmodelling, reconnaissance, social engineering, enumeration, attack path mapping, exploitation, and clean up from a variety of adversarial perspectives (white/grey/black box testing). What we More ❯
assessments and more to high profileclients across all industries. The purpose of this role is to deliver our offensivesecurity services including digital footprint reconnaissance, socialengineering, vulnerability assessments, penetration testing, threatmodelling,cyber-attack simulation exercises, and more to high profile clients across allindustries. The purpose of this role is to deliver our Cyber Security services across our broad More ❯
and analyze security alerts from various sources to detect and respond to potential threats in real-time. Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. Conduct in-depth investigations of security incidents, perform forensic analysis, and coordinate incident response activities. Maintain and optimize security information and event management systems and other security … tools used in the SOC. Collaborate with other teams to enhance threat intelligence, improve incident response procedures, and provide regular reports on security posture. A day in the life As a Security Engineer in Detections, your day revolves around safeguarding our digital assets. This position supports other AWS Security Engineers with security engineering, security operations and incident response activities. … You will be responsible for coordinating and facilitating security response activities, fine-tuning detection rules. You'll investigate potential incidents, collaborate with threat intelligence teams, and develop new detection algorithms. About the team AWS-SOC Team manages security issues across the globe. A security engineer within the team is responsible for maintaining physical and logical security for customers. Diverse More ❯
and analyze security alerts from various sources to detect and respond to potential threats in real-time. - Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. - Conduct in-depth investigations of security incidents, perform forensic analysis, and coordinate incident response activities. - Maintain and optimize security information and event management systems and other security … tools used in the SOC. - Collaborate with other teams to enhance threat intelligence, improve incident response procedures, and provide regular reports on security posture. A day in the life As a Security Engineer in Detections, your day revolves around safeguarding our digital assets. This position supports other AWS Security Engineers with security engineering, security operations and incident response activities. … You will be responsible for coordinating and facilitating security response activities, fine-tuning detection rules. You'll investigate potential incidents, collaborate with threat intelligence teams, and develop new detection algorithms. About the team Diverse Experiences Amazon Security values diverse experiences. Even if you do not meet all of the qualifications and skills listed in the job description, we encourage More ❯
team spend their time on the highest-value tasks. Join the stores AppSec organization to work hard, have fun, and make history! Key job responsibilities Creating, updating, and maintaining threat models for a wide variety of software projects. Manual and Automated Secure Code Review, primarily in Java, Python and Javascript. Development of security automation tools. Adversarial security analysis using … QUALIFICATIONS BS in Computer Science or equivalent qualification or extensive years of demonstrated experience in areas such as application security, offensive security and/or systems security. Understanding of threat modeling, manual source code review, security vulnerabilities, attacker exploit techniques, and methods for their remediation. Excellent written and verbal communication skills with the ability to adapt messaging to executive More ❯
other security product like Trivy Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Carrington Recruitment Solutions Limited
security product like Trivy preferred Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
in securing complex, cloud-first environments within a data-rich, high-scale business — helping protect critical infrastructure and client data across global platforms. What You’ll Be Doing Leading threat detection and incident response across GCP environments Building and refining cloud-native detections using Kusto Query Language (KQL) Driving security automation and Infrastructure-as-Code practices Enhancing cloud visibility … through effective logging, monitoring, and threatmodelling Collaborating with SOC analysts, engineers, and data teams to secure workloads and services Performing proactive threat hunts and maturing detection logic over time Key skills and experience include: Cloud security expertise in Google Cloud Platform Hands-on experience with cloud-native tools (e.g., Defender for Cloud, GCP Security Command Center … Detection engineering using KQL, particularly with Microsoft Sentinel Familiarity with Kubernetes, Docker, and securing containerised services Understanding of Zero Trust Architecture, MITRE ATT&CK, and cloud threat models Experience with SOAR platforms and automation pipelines Scripting or programming skills (Python, PowerShell, Bash, etc.) Interviews are moving fast — apply now or reach out to learn more. More ❯
in securing complex, cloud-first environments within a data-rich, high-scale business — helping protect critical infrastructure and client data across global platforms. What You’ll Be Doing Leading threat detection and incident response across GCP environments Building and refining cloud-native detections using Kusto Query Language (KQL) Driving security automation and Infrastructure-as-Code practices Enhancing cloud visibility … through effective logging, monitoring, and threatmodelling Collaborating with SOC analysts, engineers, and data teams to secure workloads and services Performing proactive threat hunts and maturing detection logic over time Key skills and experience include: Cloud security expertise in Google Cloud Platform Hands-on experience with cloud-native tools (e.g., Defender for Cloud, GCP Security Command Center … Detection engineering using KQL, particularly with Microsoft Sentinel Familiarity with Kubernetes, Docker, and securing containerised services Understanding of Zero Trust Architecture, MITRE ATT&CK, and cloud threat models Experience with SOAR platforms and automation pipelines Scripting or programming skills (Python, PowerShell, Bash, etc.) Interviews are moving fast — apply now or reach out to learn more. More ❯
in securing complex, cloud-first environments within a data-rich, high-scale business — helping protect critical infrastructure and client data across global platforms. What You’ll Be Doing Leading threat detection and incident response across GCP environments Building and refining cloud-native detections using Kusto Query Language (KQL) Driving security automation and Infrastructure-as-Code practices Enhancing cloud visibility … through effective logging, monitoring, and threatmodelling Collaborating with SOC analysts, engineers, and data teams to secure workloads and services Performing proactive threat hunts and maturing detection logic over time Key skills and experience include: Cloud security expertise in Google Cloud Platform Hands-on experience with cloud-native tools (e.g., Defender for Cloud, GCP Security Command Center … Detection engineering using KQL, particularly with Microsoft Sentinel Familiarity with Kubernetes, Docker, and securing containerised services Understanding of Zero Trust Architecture, MITRE ATT&CK, and cloud threat models Experience with SOAR platforms and automation pipelines Scripting or programming skills (Python, PowerShell, Bash, etc.) Interviews are moving fast — apply now or reach out to learn more. More ❯