of data sources from cloud, on-prem, endpoint, network and application layers Create and maintain detection rules, correlation logic and alerts tailored to specific threat scenarios Provide technical leadership and mentorship to team members Work closely with SOC teams to align SIEM capabilities with business objectives Conduct SIEM health … more major SIEM platforms (e.g. Splunk, Sentinel etc.) Deep understanding of log ingestion, parsing, normalisation and enrichment Strong grasp of MITRE ATT&CK framework, threat detection and alert logic Solid scripting/automation skills (e.g., Python, PowerShell, Bash) Experience with cloud logging and monitoring (AWS CloudTrail, Azure Monitor, GCP … etc.) Experience with threatmodelling, cloud security or Identity and Access Management is desirable More ❯
secure coding guidance, reviewing code and architecture, and ensuring effective DevSecOps practices. Key Responsibilities: Guide development teams in secure coding best practices through workshops, threatmodelling, and code reviews. Define and enforce security checkpoints across the DevOps lifecycle (SAST, DAST, SCA). Champion secure API design, including robust More ❯
the Blockchain space as a DevSecOps Engineer or Platform Engineer Expertise in AWS and experience with Infrastructure-as-Code Understanding of risk assessment and threatmodelling to identify threats within the digital trading space across the public cloud Security awareness with the ability to understand requirements from the More ❯
the Blockchain space as a DevSecOps Engineer or Platform Engineer Expertise in AWS and experience with Infrastructure-as-Code Understanding of risk assessment and threatmodelling to identify threats within the digital trading space across the public cloud Security awareness with the ability to understand requirements from the More ❯
development lifecycle. Enhancing DevSecOps practices with tools like SAST, DAST, and SCA—making sure security isn’t just an afterthought. Leading secure code reviews, threatmodelling sessions, and providing practical guidance on secure design. Reviewing APIs, cloud-native applications, and infrastructure for security weaknesses—and helping remediate them. More ❯
Networks, VMware, etc. Excellent knowhow of common cyber threats and vulnerabilities (e.g., malware, phishing, DDoS attacks). Sound knowledge of emerging security threats and threatmodelling will be advantage. Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
drive remediation with development and operations teams. Secure Development Practices Partner with software and hardware engineers to integrate secure coding and design principles (e.g., threatmodelling, secure-by-design). Perform security code reviews, provide guidance on secure libraries and frameworks. Standards & Compliance Ensure products meet regulatory and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Frontier Resourcing Ltd
drive remediation with development and operations teams. Secure Development Practices Partner with software and hardware engineers to integrate secure coding and design principles (e.g., threatmodelling, secure-by-design). Perform security code reviews, provide guidance on secure libraries and frameworks. Standards & Compliance Ensure products meet regulatory and More ❯
complex infrastructure environments A strong technical background across Networks, Security, Firewall, Vulnerability Management, SIEM and EDR technologies Experience with cyber security concepts, such as ThreatModelling, Incident Response, Penetration Testing (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft 365 Emotionally intelligent and able More ❯
customer experience. Understanding of mobile app vulnerabilities. Provide challenge and assessment of potential technology risks including information and cyber security control weaknesses by performing threatmodelling exercises. Provide technology risk subject matter expertise and communicate the risk environment to management and other key stakeholders. Build solid professional relationships More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
all industries. The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance, social engineering, vulnerability assessments, penetration testing, threatmodelling, cyber-attack simulation exercises, and more to high profile clients across all industries. You'll benefit from ongoing coaching, career mentoring, and More ❯
with some exposure to parallel processing environments used for large-scale analytics. An appreciation of security best practice in areas such as network security, threatmodelling, vulnerability assessment, IAM, SIEM and incident response. Skills in system monitoring, performance tuning, and troubleshooting infrastructure and micro-service-based architectures. Understanding More ❯
into the entire development lifecycle, including software and infrastructure. Lead the DevSecOps engagement plan, promoting security awareness, scaling security champions, establishing best practice frameworks, threat modeling, and participating in design reviews. Prioritize automation to ensure effective feedback loops during deployment processes. Adopt a risk-based approach to balance business More ❯
robust program of vulnerability testing, penetration testing, and security reviews Manage security-related infrastructure across AWS, GCP, Google Workspace, and other related platforms Lead threat modeling exercises with the product engineering teams Manage and lead our pentesters and engineering audits Lead security- and privacy-related incident response Develop security More ❯
Develop and deliver a strategy for building a cutting-edge crime and social destabilisation research agenda; Develop cutting edge evaluations which relate to these threat-models which can reliably assess the capability of Frontier AI systems; Deliver additional impactful research by overseeing a diverse portfolio of research projects, potentially More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
慨正橡扯
tools. Excellent understanding and experience with manual security testing to find vulnerabilities and logical issues. Knowledge and understanding of OWASP and its utilisation within threat modelling. Experience of software development and languages. Working knowledge of CI and CD pipelines and associated security tooling. Use of planned structured methodologies for … considered throughout the lifecycle. Identifying and managing any security flaws within our software through appropriately liaising with external bodies where necessary. Performing risk assessments, threatmodelling and design reviews to ensure effective security controls. Identifying opportunities for converting manual tasks into automated processes and identify tooling to support More ❯
manchester, north west england, United Kingdom Hybrid / WFH Options
bet365
tools. Excellent understanding and experience with manual security testing to find vulnerabilities and logical issues. Knowledge and understanding of OWASP and its utilisation within threat modelling. Experience of software development and languages. Working knowledge of CI and CD pipelines and associated security tooling. Use of planned structured methodologies for … considered throughout the lifecycle. Identifying and managing any security flaws within our software through appropriately liaising with external bodies where necessary. Performing risk assessments, threatmodelling and design reviews to ensure effective security controls. Identifying opportunities for converting manual tasks into automated processes and identify tooling to support More ❯
stoke-on-trent, midlands, United Kingdom Hybrid / WFH Options
bet365
tools. Excellent understanding and experience with manual security testing to find vulnerabilities and logical issues. Knowledge and understanding of OWASP and its utilisation within threat modelling. Experience of software development and languages. Working knowledge of CI and CD pipelines and associated security tooling. Use of planned structured methodologies for … considered throughout the lifecycle. Identifying and managing any security flaws within our software through appropriately liaising with external bodies where necessary. Performing risk assessments, threatmodelling and design reviews to ensure effective security controls. Identifying opportunities for converting manual tasks into automated processes and identify tooling to support More ❯
and governance for Azure Landing Zones. Provide expert security advisory to cloud architects, engineers, and operational teams. Conduct security architecture reviews, risk assessments, and threatmodelling activities. Design and embed security controls within Azure Landing Zone frameworks and services. Maintain and evolve security patterns, guardrails, and reference architectures. More ❯
design and cloud-native architecture Acting as a key escalation point for vulnerability triage and remediation Delivering developer enablement through workshops and hands-on threatmodelling What you’ll bring: 3+ years in application or product security roles Strong grasp of application-level threats, secure design, and remediation More ❯
design and cloud-native architecture Acting as a key escalation point for vulnerability triage and remediation Delivering developer enablement through workshops and hands-on threatmodelling What you’ll bring: 3+ years in application or product security roles Strong grasp of application-level threats, secure design, and remediation More ❯
Portsmouth, yorkshire and the humber, United Kingdom
TalentHawk
through formal tender process, feasibilities phases, design phases, implementation, and validation phases, including risk assessments Security Architecture and Design- Review of design documents, performing threatmodelling and risk assessments, incorporating security non-functional requirements and be a standing member of Technical Design Authority Be the Security touchpoint for More ❯
portsmouth, hampshire, south east england, United Kingdom
TalentHawk
through formal tender process, feasibilities phases, design phases, implementation, and validation phases, including risk assessments Security Architecture and Design- Review of design documents, performing threatmodelling and risk assessments, incorporating security non-functional requirements and be a standing member of Technical Design Authority Be the Security touchpoint for More ❯
practice to assist with baking security into architectural standards. Essential Skills & Experience: Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct More ❯
practice to assist with baking security into architectural standards. Essential Skills & Experience: Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct More ❯