security controls across architecture, infrastructure and code (AWS Serverless, CDK/SST, React/TypeScript). Shift security left. Embed SAST/DAST, IaC scanning, secure coding standards and threat-modeling into every stage of our CI/CD pipeline. Own compliance & audits. Run our Vanta instance end-to-end (SOC 2 Type II, ISO 27001, GDPR, etc.) and More ❯
West Malling, Kent, United Kingdom Hybrid / WFH Options
Lumina Energy
threats are evolving, and our team is at the heart of protecting critical infrastructure and data. As a Cyber Security Engineer, you'll help lead our proactive efforts in threat detection, response, and mitigation. This role is vital to safeguarding the confidentiality, integrity, and availability of systems and services. What you'll be doing Act on security alerts, incidents … ensure timely responses. Diagnose and investigate security incidents following agreed procedures. Escalate and document unresolved incidents and support recovery efforts. Operate within our enterprise-level SOC and collaborate on threat intelligence. Utilise tools like Microsoft E5, Sentinel, and Darktrace to monitor and prevent threats. Analyse malware and respond to high-priority incidents. Support vulnerability management and threat analysis … equivalent function. Proficiency with Microsoft Security Suite (including Sentinel) and Darktrace or similar. Must have an understanding of cyber threats including malware, ransomware, DDoS, insider threats. Strong knowledge of threatmodelling, security monitoring, and cloud environments. Familiarity with GDPR, data protection, and privacy impact assessments. Excellent communication and collaboration skills with a proactive mindset. Industry certifications (e.g., CISSP More ❯
use of cloud services and performance optimization across environments. Ensure cloud architectures support observability, fault tolerance, and high availability. Data Engineering & Intelligent Systems Guide the engineering team in data modelling, data access patterns, and efficient use of databases (MSSQL, PostgreSQL, MySQL). Work with data engineers to enable secure, efficient data movement between systems, including real-time and batch … through the engineering of clean, reliable data sources and APIs. Security Engineering & Governance Partner with security engineers to integrate security throughout the software lifecycle (shift-left security, secure coding, threatmodelling). Own the implementation of secure authentication/authorization practices, audit logging, encryption at rest/in transit, and other application security standards. Ensure software and infrastructure More ❯
use of cloud services and performance optimization across environments. Ensure cloud architectures support observability, fault tolerance, and high availability. Data Engineering & Intelligent Systems Guide the engineering team in data modelling, data access patterns, and efficient use of databases (MSSQL, PostgreSQL, MySQL). Work with data engineers to enable secure, efficient data movement between systems, including Real Time and batch … the engineering of clean, reliable data sources and APIs. Security Engineering & Governance Partner with security engineers to integrate security throughout the software life cycle (shift-left security, secure coding, threatmodelling). Own the implementation of secure authentication/authorization practices, audit logging, encryption at rest/in transit, and other application security standards. Ensure software and infrastructure More ❯
while integrating with network controls, such as firewalls and ACLs Experience working with Security Operations Centres to deploy IDS/IPS and NDR systems, ensuring real-time monitoring and threat detection Ability to implement comprehensive security controls, from proactive threatmodelling (using frameworks like STRIDE or MITRE ATT&CK) to low-overhead in-kernel monitoring, using tools More ❯
Easter Howgate, Midlothian, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
they pertain to the cyber domain. Experience working with cyber and security requirements down to the system control level. Experience conducting cyber and information security risk assessment activities including threatmodelling, vulnerability analysis and analysis of mitigations. Scoping and managing security verification & validation activities and remedial action plans. Experience working with product engineers, system architects, and developers to More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
AVEVA Denmark
developers and data scientists to establish service-level quality metrics and observability hooks. Validate services against AI regulatory frameworks and ensure traceability, fairness, and robustness in outcomes. Participate in threatmodelling and security validation of exposed APIs and AI services. Provide feedback early in the lifecycle to reduce defects and improve design. Mentor junior testers, encourage continuous learning More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Square One Resources
solutions, integrating security measures throughout the lifecycle, from data ingestion to model deployment. Required Skills/Experience The ideal candidate will have the following: Strong understanding of cybersecurity principles, threat modeling, vulnerability assessment, and penetration testing. Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Knowledge of data privacy regulations (GDPR, CCPA) and industry standards. Ability to More ❯
practices into DevOps workflows (e.g., SAST, DAST, SCA, secrets management).* Collaborate with development, operations, and security teams to implement and ensure secure coding and deployment practices.* Advise on threat modeling, risk assessments, and vulnerability management.* Provide expert guidance on cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes).* Develop and enforce security policies, standards, and best More ❯
Collaborate with development teams (Go and Node.js) to remediate security issues. Evaluate and Test TEE solutions (e.g., AWS Nitro Enclaves, Azure Confidential Computing and Google Confidential Computing.). Conduct threat modeling and risk assessments. Develop and maintain security testing tools and automation scripts. Stay current with emerging security threats, vulnerabilities, and mitigation techniques. Proven experience in penetration testing and More ❯
infrastructure. You'll also have the opportunity to influence our product roadmap by utilizing Wiz-for-Wiz to assess, monitor, and harden our environments. WHAT YOU'LL DO Lead threat modeling and security review exercises across Wiz's production and CI/CD environments - identifying and mitigating risks in our products and the cloud services that support them Drive More ❯
scripting Experience with application security tools (SAST, DAST, IAST and SCA) Strong technical knowledge of development and production release process, including CI/CD Experience with the application of threat modeling and other risk identification techniques Scripting (Perl, python, PowerShell, bash), RegEx and PCRE experience is desirable Purple Perks Medical, dental and vision coverage Generous PTO and observed holidays More ❯
such as CISSP, CISM, AWS Security Specialty, or Certified Identity and Access Manager (CIAM). Agile (Scrum Master, SAFe) and cloud (AWS Cloud Practitioner) certifications. Experience in security assessments, threat modeling, or governance/risk/compliance (GRC) tooling. Benefits Pension company contribution = 3% Incentive scheme up to 10% of annual salary , based on company performance. Your wellbeing is More ❯
such as CISSP, CISM, AWS Security Specialty, or Certified Identity and Access Manager (CIAM). Agile (Scrum Master, SAFe) and cloud (AWS Cloud Practitioner) certifications. Experience in security assessments, threat modeling, or governance/risk/compliance (GRC) tooling. Pension company contribution = 3% Incentive scheme up to 10% of annual salary , based on company performance. Your wellbeing is paramount More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
OLI Systems
term maintainability. Build and maintain CI/CD pipelines, use containerization where it makes sense, and create infrastructure that makes deployments smooth, reliable, and repeatable. Strengthen services through thoughtful threat modeling, hands-on code audits, and automated security scanning. Spot vulnerabilities early and address them head-on. Collaborate with DevOps to ensure infrastructure is resilient and ready to scale More ❯
CYBER SECURITY ANALYST | SECURITY OPERATIONS CENTER |HIGH THREAT GOVERNMENT Summer-Browning Associates is supporting our client in the Central Government who is seeking a Cyber Security Analyst for an initial 12-month assignment, with the possibility of extension. Location: London | Hybrid| Remote The ideal candidates will possess an active DV Security clearance and have a solid background in Cyber … Security, with the following skills and experience: Proficiency in Security Information and Event Management (SIEM), including tools such as Splunk, Defender, and Tenable ThreatModelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incident response, and forensic analysis. Ability to perform triage of security events to determine their scope, priority More ❯
continuous improvement in secure software engineering practices. In this role you will be responsible for: Advising clients on complex cybersecurity issues and building robust solutions collaboratively Performing risk and threat analyses, as well as penetration tests to uncover vulnerabilities Supporting internal and client teams with best practices for secure system and process development Facilitating workshops and security training sessions … Germany with occasional travel to client site Essential: Professional experience in a similar role such as Security Engineer, Penetration Tester, DevSecOps etc. Knowledge of the following areas: Penetration Testing, ThreatModelling, Application Security, Security by Design etc. Solid understanding of software development and system architecture basics Strong communication and interpersonal skills Self-driven, solution-oriented approach to identifying More ❯
controls from day one Review and guide third-party risk assessments and product security compliance Support DPIAs and ensure alignment with Cyber Essentials, ISO 27001, and NIST frameworks Lead threatmodelling, risk assessments, and support documentation of potential vulnerabilities Influence strategic investment decisions based on risk and business impact What You'll Need: Proven experience advising on security More ❯
in identifying and mitigating security risks# Ability to make actionable recommendations for security improvements Experience with GDPR and data protection, together with knowledge of IS standards Security assessment frameworks (threatmodelling, controls assessment, risk assessment) Relevant qualifications; CISSP, CISM or similar would be beneficial. Based in Central London, 4 days per week onsite initially dropping to 3 once More ❯
in identifying and mitigating security risks# Ability to make actionable recommendations for security improvements Experience with GDPR and data protection, together with knowledge of IS standards Security assessment frameworks (threatmodelling, controls assessment, risk assessment) Relevant qualifications; CISSP, CISM or similar would be beneficial. Based in Central London, 4 days per week onsite initially dropping to 3 once More ❯
requirements and ensure the integration of security controls during the product development lifecycle Some of what you will be involved in: Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure by Design principles Identify security More ❯
requirements and ensure the integration of security controls during the product development lifecycle Some of what you will be involved in: Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure by Design principles Identify security More ❯
background as a Cloud technologist with hands-on experience in data science platforms and AI/ML use cases. Demonstrated expertise in implementing security by design principles and conducting threatmodelling and translating this into designs mitigations for delivered patterns. Ability to translate complex security requirements into practical and scalable architectural solutions. Some other highly valued skills may More ❯
Stoke Gifford, Gloucestershire, United Kingdom Hybrid / WFH Options
Synoptix
requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threatmodelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects More ❯
Bristol, Stoke Gifford, Gloucestershire, United Kingdom Hybrid / WFH Options
Synoptix
requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threatmodelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects More ❯