London, England, United Kingdom Hybrid / WFH Options
Client Server
Azure, hybrid infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threatmodelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Client Server
Azure, hybrid infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threatmodelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide More ❯
expertise in areas such as AWS security controls, policies, automation, CLI tools, role and attribute-based access controls, cryptographic protocols, secure key lifecycle management, threatmodelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerability scanning, patching, and vendor management. Hands-on experience in penetration testing and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
RSM UK
trends, cyber threats, and industry issues. Excellent written and oral communication, report writing, and presentation skills. Experience of executing security testing techniques such as threatmodelling, reconnaissance, social engineering, enumeration, attack path mapping, exploitation, and clean up from a variety of adversarial perspectives (white/grey/black More ❯
You'll be responsible for the DevSecOps engagement plan, to educate engineers by scaling up security champions, implementing a framework for security best practice, threatmodelling, and input into design reviews. Automation will be a top priority, ensuring there are valuable feedback loops for engineers during the deployment More ❯
and assessing operationally resilient technology services. Principal Accountabilities: Business Impact Assessments & Risk Identification: Develop asset management strategies, lead business impact and vulnerability assessments, conduct threatmodelling, and maintain risk identification frameworks. Risk Assessment & Evaluation: Ensure compliance with governance policies, provide expertise on operational resilience, and support risk assessments More ❯
Cloud environments (AWS or GCP, ideally both). Have experience with Terraform or another IaC tool. Solid understanding of DevSecOps practices, including vulnerability scanning, threatmodelling, or compliance frameworks (GDPR, PCI DSS, ISO 27001). Thrive in a fast-moving, sometimes ambiguous environment where you can have a More ❯
securely and efficiently. Perform thorough security assessments on GCP environments, utilizing GCP-specific security tools and technologies, to identify and address potential vulnerabilities. Conduct threat modeling and risk assessments for GCP deployments, designing effective security solutions tailored to GCP services. Collaborate with cross-functional teams to respond to GCP More ❯
development. We collaborate with product teams to enable secure user engagement with the onchain world. Responsibilities: Develop onchain security strategies, perform security assessments, and threat modeling of blockchain protocols. Lead proactively, identify top security risks, and develop mitigation strategies. Provide technical guidance in building frameworks, analysis tools, and security More ❯
infrastructure teams to embed security into everything they build. Responsibilities: Lead secure architecture and design reviews for critical products and digital finance infrastructure Conduct threat modeling, risk assessments, and security controls reviews across trading, custody, and DeFi platforms Build and implement security test plans and pipelines using modern tools More ❯
infrastructure teams to embed security into everything they build. Responsibilities: Lead secure architecture and design reviews for critical products and digital finance infrastructure Conduct threat modeling, risk assessments, and security controls reviews across trading, custody, and DeFi platforms Build and implement security test plans and pipelines using modern tools More ❯
collaborate with diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency More ❯
collaborate with diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency More ❯
collaborate with diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency More ❯
collaborate with diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Pertemps
practices, ensuring products meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure … Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
practices, ensuring products meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure … Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and More ❯
all product teams/tribes. In this role, you will be directly managing a 3-person team. The role will see you working on threatmodelling, building security into the SDLC, and managing the full product security life cycle including cloud security (AWS) and supply chain security. The More ❯
or source code review experience in one or more of these languages: C/C++, C#, VB.NET, ASP, PHP, Python or Java. Familiarity with threatmodelling and security design review methodologies. A good understanding of Unix, Windows and network security. CREST Certified Tester (CCT) or equivalent. Excellent written More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Carrington Recruitment Solutions Limited
Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at More ❯