3 of 3 Threat Analysis Jobs in the South East

Security Architect

Hiring Organisation
Pontoon
Location
Wokingham, Berkshire, United Kingdom
Employment Type
Contract
product teams to ensure security is integrated into design and development activities. Provide architectural guidance across agile sprints and feature releases. Security Risk & Threat Analysis Conduct threat modelling independently across application and platform designs. Perform risk assessments to identify vulnerabilities and architectural weaknesses. Design appropriate security controls … Practice, supporting the maturity of the clients security architecture capability. Help identify capability gaps and support the development of consistent approaches across teams, including: Threat modelling frameworks Secure development lifecycle practices Security architecture standards Provide ad-hoc security architecture support across other programmes where needed. Essential Skills & Experience Active ...

SOC Analyst T2

Hiring Organisation
Oscar Technology
Location
London, South East, England, United Kingdom
Employment Type
Full-Time
Salary
£45,000 - £52,000 per annum
investigating security incidents, improving detection capabilities and supporting the wider incident response process. Key Responsibilities: Investigate and respond to security alerts and incidents Perform threat analysis and incident investigation Analyse security logs and events using SIEM platforms Support the development of detection rules and threat monitoring Work ...

IT Trainer (Cyber Security) - SC Cleared

Hiring Organisation
Lorien
Location
Shrivenham, Oxfordshire, United Kingdom
Employment Type
Contract
Contract Rate
GBP 550 - 600 Daily
Delivery & Subject Matter Expertise Deliver high-quality cyber security and incident response training to learners with varying experience levels. Translate real-world cyber operations, threat analysis, and incident handling into clear, practical instruction. Act as an in-house SME, providing credible, up-to-date guidance on cyber operations … threats. Ensure training content aligns with MOD and industry standards. Training Design & Development Develop tailored cyber training content based on specialist tools, environments and threat profiles. Produce accessible and engaging learning materials including presentations, workbooks, labs, and simulations. Create realistic scenario-based exercises that mirror real operational incidents. Support ...