Bristol, Stoke Gifford, Gloucestershire, United Kingdom Hybrid / WFH Options
Synoptix
requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threatmodelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Synoptix Limited
requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threatmodelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects More ❯
newport, wales, united kingdom Hybrid / WFH Options
Synoptix Limited
requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threatmodelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Synoptix Limited
requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threatmodelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Synoptix Limited
requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threatmodelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
Synoptix Limited
requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threatmodelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects More ❯
key findings to board-level executives and stakeholders. Managing, mentoring, and growing Gartner consultants Developing thought leadership in at least one core security domain (e.g, Strategy, Operating model, SOC, ThreatModelling, or Security Architecture) Developing, building, and enhancing the Gartner brand with CISOs and leaders across our clients in UKI What you'll need Proven security consulting experience More ❯
risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
risks Embed yourself within multidisciplinary delivery teams to support secure-by-design practices from the earliest stages of project initiation through to deployment and operation. Conduct detailed risk assessments, threatmodelling, and architecture reviews to help teams understand and mitigate potential vulnerabilities before they impact live environments. Collaborate closely with the Strategic Security Architect and technical stakeholders Act More ❯
What You'll Be Working On: ️ Implementing secure development practices and conducting threat modeling for software applications ️ Performing static and dynamic application security testing (SAST/DAST) to identify vulnerabilities in code ️ Collaborating with DevOps and development teams to integrate security into the CI/CD pipeline ️ Conducting regular application security assessments, including penetration testing and vulnerability scanning ️ Providing More ❯
services and best practices. Solid understanding of cloud security principles, including shared responsibility model, cloud native security controls, and infrastructure as code security. Experience with security incident response and threat modelling. Google Professional Cloud Security Engineer Azure Security Engineer Associate (AZ-500) Certified Cloud Security Professional (CCSP) This is very much a hands-on role requiring GCP and Azure More ❯
services and best practices. Solid understanding of cloud security principles, including shared responsibility model, cloud native security controls, and infrastructure as code security. Experience with security incident response and threat modelling. Google Professional Cloud Security Engineer Azure Security Engineer Associate (AZ-500) Certified Cloud Security Professional (CCSP) This is very much a hands-on role requiring GCP and Azure More ❯
Business to identify and mitigate risks. Translate complex technical risks into business-friendly language for executive audiences. Improve and evolve security risk assessment methodologies for advanced AI systems. Develop threat models and propose compensatory controls. Present findings to internal governance groups and help shape AI risk frameworks. Required Skills & Experience 10+ years of professional experience, including demonstrable AI/ More ❯
other security product like Trivy Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
security product like Trivy preferred Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
security product like Trivy preferred Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
Experience performing secure application configurations of other large ERP type Software packages. Knowledge of configuration and integration security (API, etc.) for SaaS solutions Understanding Secure Architecture Design (Zero Trust, Threat Modeling) Understanding of Application Security (OWASP Top 10) Experience in programming languages and technologies used in web development Proficiency with AGILE techniques, preferably tools: Atlassian/Jira Proficiency in More ❯
Utilizing real-time dashboards to facilitate tracking and reporting to the Technology Leadership Team and the wider organization. Become fully embedded into our engineering teams and practices to: Lead threat modeling, vulnerability prioritization, and hold risk assessment exercises. Monitor zero-day threats and vulnerabilities, ensuring they are properly prioritized and resolved by responsible teams. Guide architectural security reviews to More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise and coordinate with technology and business stakeholders in relation to cybersecurity patching and vulnerability management issues/actions. Maintain a cyber threat assessment methodology, align to evolving industry standards and integrate into BAU and project-based business processes. Support with proactive threat hunting for new and emerging cyber threats. Develop … and maintain dashboards with cybersecurity threat and vulnerability metrics. Support compliance with relevant industry standards, regulations, and best practices, such as GDPR, NIS and ISO 27001. Base location - Hybrid - Clearwater Court Reading. Working pattern - 36 hours Monday to Friday. What you should bring to the role Strong knowledge of manual penetration testing techniques and confident with operating systems and More ❯
of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerability management and ensure threat exposure is minimised. Provide hands-on leadership in data and asset management , including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of … OT environments. Hands-on knowledge of OT technologies and protocols , including experience managing configuration changes. Experience working within incident response frameworks -from coordination to containment and recovery. Familiarity with threatmodelling and architectural reviews , particularly in critical national infrastructure. Relevant certifications or credentials in IEC62443 or cyber security frameworks applicable to OT environments. Understanding of the NCSC Cyber More ❯
Employment Type: Permanent
Salary: £57000 - £60000/annum Pension,Medical,Incentive plan,25 Ho
Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerability management and ensure threat exposure is minimised. Provide hands-on leadership in data and asset management , including backup and removable media deployments. Apply and track security metrics to ensure the ongoing effectiveness of … OT environments. Hands-on knowledge of OT technologies and protocols , including experience managing configuration changes. Experience working within incident response frameworks -from coordination to containment and recovery. Familiarity with threatmodelling and architectural reviews , particularly in critical national infrastructure. Relevant certifications or credentials in IEC62443 or cyber security frameworks applicable to OT environments. Understanding of the NCSC Cyber More ❯
architectures. Review technical designs for security compliance and risk. Establish secure-by-design guidelines and support DevSecOps practices. Evaluate new technologies and lead security tool POCs and integrations. Perform threatmodelling and security risk assessments. Collaborate with cross-functional teams on secure architecture and governance. Provide security expertise, training, and mentorship to technical teams. Support security monitoring and More ❯